las vulnerabilidades más últimas de la persona notable de Advisories

  • November 2010 - Microsoft Releases 3 Security Advisories
     Fecha recomendada:  09 de noviembre de 2010

    Microsoft addresses the following vulnerabilities in its November batch of patches:


    • (MS10-087) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)
      Risk Rating: Critical

      This security update addresses vulnerabilities in Microsoft Office that could allow remote execution when an unsuspecting user opens a specially crafted .RTF email message. Read more here.

    • (MS10-088) Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2293386)
      Risk Rating: Important

      This update resolves two vulnerabilities in Microsoft Office that could allow a malicious user to execute code remotely when users open a specially crafted PowerPoint file. Read more here.

    • (MS10-089) Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Elevation of Privilege (2316074)
      Risk Rating: Important

      This security update resolves four vulnerabilities in Forefront Unified Access Gateway (UAG). Read more here.
  • Vulnerability in Internet Explorer Could Allow Remote Code Execution (2458511)
     Gravedad:    
     Fecha recomendada:  03 de noviembre de 2010
    Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue, as exploited in the wild in November 2010.
  • October 2010 - Microsoft Releases 16 Advisories
     Fecha recomendada:  13 de octubre de 2010

    Microsoft addresses the following vulnerabilities in its October batch of patches:

    • (MS10-071) Cumulative Security Update for Internet Explorer (2360131)
      Risk Rating: Critical

      This security update addresses vulnerabilities in Internet Explorer that could allow remote code execution once a user views a specially crafted Web page using Internet Explorer.

      User with administrative rights are more affected by this vulnerability than those with fewer rights on the system. Read more here.

    • (MS10-072) Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)
      Risk Rating: Important

      This security update addresses vulnerabilities in Microsoft SharePoint and Windows SharePoint Services. If successfully exploited via a specially crafted script to a target site using SafeHTML, it could lead to information disclosure. Read more here.

    • (MS10-073) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)
      Risk Rating: Important

      This security update addresses vulnerabilities in Windows kernel-mode drivers that could increase in the privilege when an attacker is log on and is running a specially crafted application. To be able to exploit this vulnerability, the attacker must be log on locally as this could not be done remotely. Read more here.

    • (MS10-074) Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution (2387149)
      Risk Rating: Critical

      This security update addresses a vulnerability in the Microsoft Foundation Class (MFC) Library that could allow remote code execution if a user is logged on with administrative user rights and opens an application built with the MFC Library. Read more here.

    • (MS10-075) Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution (2281679)
      Risk Rating: Critical

      This security update addresses the vulnerability in the Microsoft Windows Media Player Network Sharing Service that could allow remote code execution once an attacker sends a specially crafted RTSP packet to an affected system. Read more here.

    • (MS10-076) Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132)
      Risk Rating: Critical

      This security update addresses the vulnerability in the Embedded OpenType (EOT) Font Engine (a Microsoft Windows component) that could allow remote code execution. If successfully exploited, the attacker could remotely access the affected user system. Read more here.

    • (MS10-077) Vulnerability in .NET Framework Could Allow Remote Code Execution (2160841)
      Risk Rating: Critical

      This security update addresses a vulnerability in Microsoft .NET Framework. Once a user views a specially crafted Web page via a Web browser that can run XAML Browser Applications (XBAPs), this could allow remote code execution. Moreover, it could also allow remte code execution on a server system running IIS when an attacker uploads a specially crafted ASP.NET page to that server as well as allow the processing of ASP.NET pages. Read more here.

    • (MS10-078) Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Elevation of Privilege (2279986)
      Risk Rating: Important

      This security update addresses vulnerabilities in the Windows OpenType Font (OTF) format driver that could allow elevation of privilege once a user views content rendered in a specially crafted OpenType font.

      This vulnerability could only be exploited when the attacker is log on locally and not remotely. Read more here.

    • (MS10-079) Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2293194)
      Risk Rating: Important

      This security update addresses 11 vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Word file.

      Once an attacker successfully exploited any of these vulnerabilities, he gains user rights to the system. Read more here.

    • (MS10-080) Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2293211)
      Risk Rating: Important

      This security update addresses thirteen vulnerabilities in Microsoft Office. More specifically, it resolves issues that could allow remote code execution if a user opens a specially crafted Excel file or a specially crafted Lotus 1-2-3 file. Read more here.

    • (MS10-081) Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2296011)
      Risk Rating:Important

      This security update addresses a vulnerability in the Windows common control library that could allow remote code execution if a user visited a specially crafted Web page. Read more here.

    • (MS10-082) Vulnerability in Windows Media Player Could Allow Remote Code Execution (2378111)
      Risk Rating:Important

      This security update addresses a vulnerability in Windows Media Player that could allow remote code execution if Windows Media Player opened specially crafted media content hosted on a malicious Web site. Read more here.

    • (MS10-083) Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution (2405882)
      Risk Rating:Important

      This security update addresses a vulnerability in Microsoft Windows that could allow remote code execution if a user opens a specially crafted file using WordPad or selects or opens a shortcut file that is on a network or WebDAV share. Read more here.

    • (MS10-084) Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (2360937)
      Risk Rating: Important

      This security update addresses a vulnerability in Microsoft Windows that could allow elevation of privilege if an attacker logs on to an affected system and runs specially crafted code that sends an LPC message to the local LRPC Server. The message could then allow an authenticated user to access resources that are running in the context of the NetworkService account. Read more here.

    • (MS10-085) Vulnerability in SChannel Could Allow Denial of Service (2207566)
      Risk Rating:Important

      This security update addresses a vulnerability in the Secure Channel (SChannel) security package in Windows that could allow denial of service if an affected Internet Information Services (IIS) server hosting a Secure Sockets Layer (SSL)-enabled Web site received a specially crafted packet message. By default, IIS is not configured to host SSL Web sites. Read more here.

    • (MS10-086) Vulnerability in Windows Shared Cluster Disks Could Allow Tampering (2294255)
      Risk Rating: Moderate

      This security update addresses a vulnerability in Windows Server 2008 R2 when used as a shared failover cluster. More specifically, this vulnerability could allow data tampering on the administrative shares of failover cluster disks. Read more here.

  • Vulnerability in ASP.NET Could Allow Information Disclosure (2416728)
     Gravedad:    
     Fecha recomendada:  21 de septiembre de 2010

    Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."

  • September 2010 - Microsoft Releases 9 Security Advisories
     Fecha recomendada:  14 de septiembre de 2010

    Microsoft addresses the following vulnerabilities in its September batch of patches:

    (MS10-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290)
    Risk Rating: Critical

    This security update addresses a vulnerability in the Print Spooler service. Once successfully exploited, this could result to remote code execution when an attacker sends a specially crafted print request to a system with a print spooler interface exposed over RPC. Read more here.

    (MS10-062) Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution (975558)
    Risk Rating: Critical

    This security update addresses vulnerability in MPEG-4 codec that when exploited could give an attacker user rights as the user. Read more here.

    (MS10-063) Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2320113)
    Risk Rating: Critical

    This security update addresses a vulnerabillity in the Unicode Scripts Processor. Read more here.

    (MS10-064) Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2315011)
    Risk Rating: Critical

    This security update addresses a vulnerability that could allow remote code execution once a user opened a specially crafted email message via an affected version of Microsoft Outlook. Read more here.

    (MS10-065) Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution (2267960)
    Risk Rating: Important

    This security update addresses vulnerability in Internet Information Services (IIS) that could allow remote code execution once a sends a specially crafted HTTP request to the server. Read more here.

    (MS10-066) Vulnerability in Remote Procedure Call Could Allow Remote Code Execution (982802)
    Risk Rating: Important

    This security update addresses a vulnerability in Microsoft Windows. When successfully exploited, it could execute arbitrary code and take full control of an affected system. Read more here.

    (MS10-067) Vulnerability in WordPad Text Converters Could Allow Remote Code Execution (2259922)
    Risk Rating: Important

    This security update addresses a vulnerability in Microsoft Windows that could allow remote code execution if a user opened a specially crafted file using WordPad. Read more here.

    (MS10-068) Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege (983539)
    Risk Rating: Important

    This security update addresses a vulnerability in Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). Read more here.

    (MS10-069) Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege (2121546)
    Risk Rating: Important

    This security update addresses a vulnerability in Microsoft Windows. Once exploited, it could elevate the privilege of an attacker who is logged on to an affected system configure with a Chinese, Japanese, or Korean system. Read more here.

  • Adobe Flash Player Remote Code Execution
     Gravedad:    
     Fecha recomendada:  14 de septiembre de 2010
    Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
  • Adobe Reader and Acrobat .PDF Vulnerability
     Gravedad:    
     Fecha recomendada:  09 de septiembre de 2010
    Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
  • August 2010 - Microsoft Releases 14 Security Advisories
     Fecha recomendada:  10 de agosto de 2010

    Microsoft addresses the following vulnerabilities in its August batch of patches:

    • (MS10-046) Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)

      Risk Rating: Critical

      This security update addresses a publicly disclosed vulnerability in Windows Shell, which may allow remote code execution once icon of a specially crafted shortcut is displayed. Read more here.


    • (MS10-047) Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852)

      Risk Rating: Important

      This security update addresses several privately reported vulnerabilities in Microsoft Windows. The most serious of these may allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An unauthorized user must have valid logon credentials and must be logged on locally for exploit to be successful. The vulnerabilities could not be exploited remotely or by anonymous users. Read more here.


    • (MS10-048) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)

      Risk Rating: Important

      This update addresses one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most serious of these may allow elevation of privilege if an unauthorized user logs on to an affected system and runs a specific malicious application. Read more here.


    • (MS10-049) Vulnerabilities in SChannel could allow Remote Code Execution (980436)

      Risk Rating: Critical

      This security update resolves a publicly disclosed vulnerability and one privately reported vulnerability in the Secure Channel (SChannel) security package in Windows. Read more here.


    • (MS10-050) Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (981997)

      Risk Rating: Important

      This security update addresses a privately reported vulnerability in Windows Movie Maker, which may allow remote code execution if an attacker convinces a user to open a specially crafted Movie Maker sent. Read more here.


    • (MS10-051) Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)

      Risk Rating: Critical

      This security update addresses a privately reported vulnerability in Microsoft XML Core Services, which could allow remote code execution if a user viewed a specially crafted Web page via Internet Explorer. Read more here.


    • (MS10-052) Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution (2115168)

      Risk Rating: Critical

      This security update addresses a privately reported vulnerability in Microsoft MPEG Layer-3 audio codecs. Read more here.


    • (MS10-053) Cumulative Security Update for Internet Explorer (2183461)

      Risk Rating: Critical

      This security update resolves six vulnerabilities in Internet Explorer that were reported privately. The most serious vulnerabilities may allow remote code execution if a user views a specially crafted Web site via Internet Explorer. Read more here.


    • (MS10-054) Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214)

      Risk Rating: Critical

      This security update resolves several privately reported vulnerabilities in Microsoft Windows. The most serious of these may allow remote code execution if an attacker made a spefically crafted SMB packet and sent it to an affected system. Read more here.


    • (MS10-055) Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665)

      Risk Rating: Critical

      This security update resolves a privately reported vulnerability in Cinepak Codec, which may allow remote code execution if a user opens a specific media file or receives specially crafted streaming content from a Web site or any application that provides Web content. Read more here.


    • (MS10-056) Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)

      Risk Rating: Critical

      This security update addresses four Microsoft Office vulnerabilities that could allow remote code execution once a user opens a specially crafted .RTF email message. Read more here.


    • (MS10-057) Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707)

      Risk Rating: Important

      This security update addresses the Microsoft Office vulnerability that could allow remote code execution whenever a user opens a specially crafted Excel file. Read more here.


    • (MS10-058) Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

      Risk Rating: Important

      This security update addresses vulnerabilities in Microsoft Windows due to an error in processing buffer overflow. Read more here.


    • (MS10-059) Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799)

      Risk Rating: Important

      This security update addresses vulnerabilities in the the Tracing Feature for Services that could allow increase in privilege once an attacker runs a specially crafted application. Read more here.


    • (MS10-060) Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)

      Risk Rating: Critical

      This security update addresses two vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. Read more here.


  • Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)
     Gravedad:    
     Fecha recomendada:  16 de julio de 2010

    Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.

    Malware related to this vulnerability are already detected by the latest patterns of your Trend Micro product.

  • July 2010 - Microsoft Releases 4 Security Advisories
     Fecha recomendada:  13 de julio de 2010

    Microsoft addresses the following vulnerabilities in its July batch of patches:

    • (MS10-042) Vulnerability in Help and SupportCenter Could Allow Remote Code Execution (2229593)

      Risk Rating: Critical

      This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003.

    • (MS10-043) Vulnerability in Canonical Display Driver Could Allow Remote Code Execution (2032276)

      Risk Rating: Critical

      This security update resolves a publicly disclosed vulnerability in the Canonical Display Driver (cdd.dll). In most scenarios, it is much more likely that an attacker who successfully exploited this vulnerability could cause the affected system to stop responding and automatically restart.

    • (MS10-044) Vulnerabilities in Microsoft Office Access ActiveX Controls Could Allow Remote Code Execution (982335)

      Risk Rating: Critical

      This security update resolves two privately reported vulnerabilities in Microsoft Office Access ActiveX Controls. The vulnerabilities could allow remote code execution if a user opened a specially crafted Office file or viewed a Web page that instantiated Access ActiveX controls.

    • (MS10-045) Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution (978212)

      Risk Rating: Important

      This security update resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened an attachment in a specially crafted e-mail message using an affected version of Microsoft Office Outlook.