Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Threat Encyclopedia

May 2014 - Microsoft Releases 8 Security Advisories

SEVERITY

HIGH

//  ADVISORY DATE

13 MAY 2014


DESCRIPTION

Microsoft addresses the following vulnerabilities in its May batch of patches:

  • (MS14-021) Security Update for Internet Explorer (2965111)
    Risk Rating: Critical

    This security update resolves a publicly disclosed vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using an affected version of Internet Explorer.


  • (MS14-029) Security Update for Internet Explorer (2962482)
    Risk Rating: Critical

    This security update resolves two privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.


  • (MS14-022) Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2952166)
    Risk Rating: Critical

    This security update resolves multiple privately reported vulnerabilities in Microsoft Office server and productivity software. The most severe of these vulnerabilities could allow remote code execution if an authenticated attacker sends specially crafted page content to a target SharePoint server.


  • (MS14-023) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2961037)
    Risk Rating: Important

    This security update resolves two privately reported vulnerabilities in Microsoft Office. The most severe vulnerability could allow remote code execution if a user opens an Office file that is located in the same network directory as a specially crafted library file.


  • (MS14-025) Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486)
    Risk Rating: Important

    This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if Active Directory Group Policy preferences are used to distribute passwords across the domain - a practice that could allow an attacker to retrieve and decrypt the password stored with Group Policy preferences.

  • (MS14-026) Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732)
    Risk Rating: Important

    This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an unauthenticated attacker sends specially crafted data to an affected workstation or server that uses .NET Remoting.


  • (MS14-027) Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege (2962488)
    Risk Rating: Important

    This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application that uses ShellExecute.


  • (MS14-028) Vulnerability in iSCSI Could Allow Denial of Service (2962485)
    Risk Rating: Important

    This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends large amounts of specially crafted iSCSI packets over the target network.


  • (MS14-024) Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass (2961033)
    Risk Rating: Important

    This security update resolves one privately reported vulnerability in an implementation of the MSCOMCTL common controls library. The vulnerability could allow security feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer.

TREND MICRO PROTECTION INFORMATION

Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using the Vulnerability Protection product or OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.

MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date Vulnerability and IDF Compatibility
MS14-022 CVE-2014-1754 1000552 Generic Cross Site Scripting(XSS) Prevention 05-Jul-06 NO
MS14-029 CVE-2014-0310 1006034 Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2014-0310) 13-May-14 YES
MS14-029 CVE-2014-1815 1006056 Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2014-1815) 13-May-14 YES

SOLUTION

Featured Stories

Connect with us on