HI All,

Microsoft plans to ship 16 bulletins to patch 49 vulnerabilities across its
product line, including Windows, Internet Explorer, Office and the .NET
Framework.

The previous record number of patches was set in August, when Microsoft
pushed out fixes for 34 flaws.

A quarter of the 16 patches are labeled "critical", while 10 carry a less
severe "important" rating and two others are listed as "moderate."

There are a number of publicly known issues affecting Microsoft, namely two
zero-day, privilege-escalation vulnerabilities being leveraged by Stuxnet
attackers. Stuxnet is a pernicious worm that has been used to attack
critical infrastructure facilities, mainly in Iran, India and Indonesia.

It also is possible that some of the patches will resolve a new attack
vector, involving a class of vulnerabilities, known as DLL preloading, that
can be used to infect PCs when an application is tricked into loading a
malicious library.

In addition, Microsoft last month began investigating a data-stealing
vulnerability impacting its newest web browser, Internet Explorer 8.

*
Here are some of them*

*
Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code
Execution*
This security update resolves a privately reported vulnerability in a
Microsoft Windows component, the Embedded OpenType (EOT) Font Engine.

*
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege*
This security update resolves several publicly disclosed vulnerabilities in
the Windows kernel-mode drivers. The most severe of these vulnerabilities
could allow elevation of privilege if an attacker logs on to an affected
system and runs a specially crafted application.
An attacker must have valid logon credentials and be able to log on locally
to exploit this vulnerability. The vulnerability could not be exploited
remotely or by anonymous users.

*
Vulnerability in SChannel Could Allow Denial of Service*
This security update resolves a privately reported vulnerability in the
Secure Channel (SChannel) security package in Windows. The vulnerability
could allow denial of service if an affected Internet Information Services
(IIS) server hosting a Secure Sockets Layer (SSL)-enabled Web site received
a specially crafted packet message. By default, IIS is not configured to
host SSL Web sites*.
*
*Cumulative Security Update for Internet Explorer*
This security update resolves seven privately reported vulnerabilities and
three publicly disclosed vulnerabilities in Internet Explorer. The most
severe vulnerabilities could allow remote code execution

*Vulnerability in Media Player Network Sharing Service Could Allow Remote
Code Execution*
This security update resolves a privately reported vulnerability in the
Microsoft Windows Media Player network sharing service. The vulnerability
could allow remote code execution if an attacker sent a specially crafted
RTSP packet to an affected system. However, Internet access to home media is
disabled by default. In this default configuration, the vulnerability can be
exploited only by an attacker within the same subnet.
*
**
Vulnerability in .NET Framework Could Allow Remote Code Execution*
This security update resolves a privately reported vulnerability in
Microsoft .NET Framework.  vulnerability could allow remote code execution
on a client system if a user views a specially crafted Web page using a Web
browser that can run XAML Browser Applications (XBAPs).
*
Vulnerabilities in SafeHTML Could Allow Information Disclosure*
This security update resolves one publicly disclosed vulnerability and one
privately reported vulnerability in Microsoft SharePoint and Windows
SharePoint Services. The vulnerabilities could allow information disclosure
if an attacker submits specially crafted script to a target site using
SafeHTML.
*
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege*
This security update resolves several publicly disclosed vulnerabilities in
the Windows kernel-mode drivers. The most severe of these vulnerabilities
could allow elevation of privilege if an attacker logs on to an affected
system and runs a specially crafted application.
An attacker must have valid logon credentials and be able to log on locally
to exploit this vulnerability. The vulnerability could not be exploited
remotely or by anonymous users.
*
Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow
Elevation of Privilege*
This security update resolves two privately reported vulnerabilities in the
Windows OpenType Font (OTF) format driver. vulnerabilities could allow
elevation of privilege if a user views content rendered in a specially
crafted OpenType font. An attacker must have valid logon credentials and be
able to log on locally to exploit this vulnerability. The vulnerability
could not be exploited remotely or by anonymous users.This security update
is rated Important for all supported editions of Windows XP and Windows
Server 2003. All supported editions of Windows Vista, Windows Server 2008,
Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.
*
Vulnerabilities in Microsoft Word Could Allow Remote Code Execution*
This security update resolves eleven privately reported vulnerabilities in
Microsoft Office. The vulnerabilities could allow remote code execution if a
user opens a specially crafted Word file. An attacker who successfully
exploited any of these vulnerabilities could gain the same user rights as
the local user. Users whose accounts are configured to have fewer user
rights on the system could be less impacted than users who operate with
administrative user rights.
*
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution*
This security update resolves thirteen privately reported vulnerabilities in
Microsoft Office. The vulnerabilities could allow remote code execution if a
user opens a specially crafted Excel file or a specially crafted Lotus 1-2-3
file. An attacker who successfully exploited any of these vulnerabilities
could gain the same user rights as the local user. Users whose accounts are
configured to have fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
*
Vulnerability in Windows Common Control Library Could Allow Remote Code
Execution*
This security update resolves a privately reported vulnerability in the
Windows common control library. The vulnerability could allow remote code
execution if a user visited a specially crafted Web page. If a user is
logged on with administrative user rights, an attacker who successfully
exploited this vulnerability could take complete control of an affected
system. An attacker could then install programs; view, change, or delete
data; or create new accounts with full user rights. Users whose accounts are
configured to have fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
*
Vulnerability in Windows Media Player Could Allow Remote Code Execution*
This security update resolves a privately reported vulnerability in Windows
Media Player. The vulnerability could allow remote code execution if Windows
Media Player opened specially crafted media content hosted on a malicious
Web site. An attacker who successfully exploited this vulnerability could
gain the same user rights as the local user. Users whose accounts are
configured to have fewer user rights on the system could be less impacted
than users who operate with administrative user rights.
*
Vulnerability in COM Validation in Windows Shell and WordPad Could Allow
Remote Code Execution*
This security update resolves a privately reported vulnerability in
Microsoft Windows. The vulnerability could allow remote code execution if a
user opens a specially crafted file using WordPad or selects or opens a
shortcut file that is on a network or WebDAV share.

*
Vulnerability in Windows Local Procedure Call Could Cause Elevation of
Privilege*
This security update resolves a publicly disclosed vulnerability in
Microsoft Windows.Thi vulnerability could allow elevation of privilege if an
attacker logs on to an affected system and runs specially crafted code that
sends an LPC message to the local LRPC Server. The message could then allow
an authenticated user to access resources that are running in the context of
the NetworkService account. An attacker must have valid logon credentials
and be able to log on locally to exploit this vulnerability.This security
update is rated Important for all supported editions of Windows XP and
Windows Server 2003. All supported editions of Windows Vista, Windows Server
2008, Windows 7, and Windows Server 2008 R2 are not affected by the
vulnerability.
*
Vulnerability in Microsoft Foundation Classes Could Allow Remote Code
Execution*
This security update resolves a publicly disclosed vulnerability in the
Microsoft Foundation Class (MFC) Library. This vulnerability could allow
remote code execution
*
Vulnerability in Windows Shared Cluster Disks Could Allow Tampering*
This security update resolves a privately reported vulnerability in Windows
Server 2008 R2 when used as a shared failover cluster. The vulnerability
could allow data tampering on the administrative shares of failover cluster
disks. By default, Windows Server 2008 R2 servers are not affected by this
vulnerability. This vulnerability only applies to the cluster disks

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to