Latest Security Advisories & Notable Vulnerabilities

Microsoft addresses the following vulnerabilities in its May batch of patches:

  • (MS11-035) Vulnerability in WINS Could Allow Remote Code Execution (2524426)
    Risk Rating: Critical

    This security update addresses a privately reported vulnerability in the Windows Internet Name Service (WINS). If successfully exploited, this could allow a remote malicious user to execute arbitrary code onto an affected user's system. Since WINS is not pre-installed on any affected operating system by default, only systems manually installed with WINS are affected by this issue. Read more here.

  • (MS11-036) Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2545814)
    Risk Rating: Important

    This bulletin resolves two privately reported vulnerabilities in Microsoft PowerPoint, which may lead to remote code execution if successfully exploited using a specially crafted PowerPoint file. An attacker could also gain the same user rights as the logged-on user. Users with fewer rights are less impacted compared to those with administrative rights. Installing and configuring Office File Validation (OFV) to prevent the opening of suspicious files can also block attack vectors exploiting these vulnerabilities. Read more here.

Microsoft addresses the following vulnerabilities in its April batch of patches:

  • (MS11-018) Cumulative Security Update for Internet Explorer (2497640)
    Risk Rating: Critical

    This update resolves four privately reported vulnerabilities and a publicly disclosed one in Internet Explorer (IE). It affects IE6 to IE8, but not IE9. Most severe vulnerabilities may lead to remote code execution. Read more here.

  • (MS11-019) Vulnerabilities in SMB Client Could Allow Remote Code Execution (2511455)
    Risk Rating: Critical

    This update resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows and may allow remote code execution. It may lead to remote code execution once attackers send a maliciously crafted SMB response to a client-initiated SMB request. Read more here.

  • (MS11-020) Vulnerability in SMB Server Could Allow Remote Code Execution (2508429)
    Risk Rating: Critical

    This update resolves a privately reported vulnerability in Microsoft Windows, which may lead to remote code execution when attackers create a specially crafted SMB packet and send it to an infected system. Read more here.

  • (MS11-021) Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2489279)
    Risk Rating: Important

    This update resolves nine privately reported vulnerabilities in Microsoft Office Excel that allow remote code execution let attackers gain the same rights as legitimate users when they open a maliciously crafted Excel file. Read more here.

  • (MS11-022) Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2489283)
    Risk Rating: Important

    This update resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and could allow remote code execution once user opens a maliciously crafted PowerPoint file. Attackers, who exploit any of these vulnerabilities, successfully gain the same user rights as local users. Read more here.

  • (MS11-023) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2489293)
    Risk Rating: Important

    This update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Office that allows remote code execution. Attackers can gain the same rights as the legitimate user. Read more here.

  • (MS11-024) Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution (2527308)
    Risk Rating: Important

    This update for one publicly disclosed vulnerability in Microsoft Windows and may lead to remote code execution when users open a specially crafted fax cover page file (.COV) via the Windows Fax Cover Page Editor. Read more here.

  • (MS11-025) Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution (2500212)
    Risk Rating: Important

    This update resolves a publicly disclosed vulnerability related to certain applications built via the Microsoft Foundation Class (MFC) Library that may lead to remote code execution. Read more here.

  • (MS11-026) Vulnerability in MHTML Could Allow Information Disclosure (2503658)
    Risk Rating: Important

    This update addresses a publicly disclosed vulnerability in the MHTML protocol handler in Microsoft Windows and may lead to information disclosure when users visit a maliciously crafted site. In an attack scenario, a website may contain a crafted link that is used to exploit this bug. Attackers use social engineering to convince users to visit the site, which in turn accesses a specially crafted link. Read more here.

  • (MS11-027) Cumulative Security Update of ActiveX Kill Bits (2508272)
    Risk Rating: Critical

    This update resolves a privately reported vulnerability in Microsoft Windows, which may lead to remote code execution when attackers create a specially crafted SMB packet and send it to an infected system. Read more here.

  • (MS11-028) Vulnerability in .NET Framework Could Allow Remote Code Execution (2484015)
    Risk Rating: Critical

    This update resolves a publicly disclosed vulnerability in the Microsoft .NET Framework that allows remote code execution on a system if a user views a specific site via Web browsers that can run XAML Browser Applications (XBAPs). Read more here.

  • (MS11-029) Vulnerability in GDI Could Allow Remote Code Execution (2489979)
    Risk Rating: Critical

    This update resolves an undisclosed vulnerability in Microsoft Windows GDI that may lead to arbitrary code execution when a user views a specifically crafted image file using affected software or when users browse sites that contain specially crafted content. Read more here.

  • (MS11-030) Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553)
    Risk Rating: Critical

    This update addresses a privately reported vulnerability in the Windows DNS resolution that may lead remote code execution when attackers gain access to the network and create a program to send malicious Link-local Multicast Name Resolution (LLMNR) broadcast queries to specific systems. Read more here.

  • (MS11-031) Vulnerability in JScript and VBScript Scripting Engines Could Allow Remote Code Execution (2514666)
    Risk Rating: Critical

    This update resolves a privately reported vulnerability in the JScript and VBScript scripting engines that may lead to arbitrary code execution when users visit a specially crafted website. Attackers employ social engineering techniques to convince users to visit such sites. Read more here.

  • (MS11-032) Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2507618)
    Risk Rating: Critical

    This update addresses a privately reported vulnerability in the OpenType Compact Font Format (CFF) driver that allow remote code execution when a user views the content using a crafted CFF font. Attackers use social engineering techniques to convince users to visit maliciously crafted content. Read more here.

  • (MS11-033) Vulnerability in WordPad Text Converters Could Allow Remote Code Execution (2485663)
    Risk Rating: Important

    This update resolves a privately reported vulnerability in Microsoft Windows. Newer versions, such as Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. This may lead to arbitrary code execution once user opens a specially crafted file using WordPad. Read more here.

  • (MS11-034) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2506223)
    Risk Rating: Important

    This update addresses 30 privately reported vulnerabilities in Microsoft Windows that may allow elevation of privilege when locally logged-on attackers run a specially crafted application. Read more here.
March 2011 - Microsoft Releases 3 Advisories
 Advisory Date:  08 Mar 2011
Microsoft addresses the following vulnerabilities in its March batch of patches:

  • (MS11-015) Vulnerabilities in Windows Media Could Allow Remote Code Execution (2510030)
    Risk Rating: Critical

    This security update addresses a vulnerability in DirectShow and a vulnerability in Windows Media Player and Windows Media Center. An attacker could execute arbitrary code if a user opens a specially crafted Microsoft Digital Video Recording (.DVR-MS) file. Read more here.

  • (MS11-016) Vulnerability in Microsoft Groove Could Allow Remote Code Execution (2494047)
    Risk Rating: Important

    This security update resolves a vulnerability in Microsoft Groove, which could allow remote attackers to execute code on the vulnerable system. The attack works if a user opens a legitimate Groove-related file that is located in the same network directory as a specially crafted library file. Read more here.

  • (MS11-017) Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2508062)
    Risk Rating: Important

    This security update addresses a vulnerability in Windows Remote Desktop Client, which could allow remote code execution if a user opens a legitimate Remote Desktop configuration (.RDP) file. Read more here.

Microsoft has just issued an advisory about a vulnerability in the Microsoft Malware Protection Engine. If the said flaw is exploited, elevated privileges are granted to a local user once the engine starts to scan after a system is infiltrated by an attacker using valid login credentials and has created a specially crafted registry key. This, in turn, may grant the attacker the same privileges as the local user. Microsoft has also found that anonymous users could not exploit this vulnerability.

February 2011 - Microsoft Releases 12 Advisories
 Advisory Date:  08 Feb 2011
Microsoft addresses the following vulnerabilities in its February batch of patches:

  • (MS11-003) Cumulative Security Update for Internet Explorer (2482017)
    Risk Rating: Critical

    This security update addresses vulnerabilities in Internet Explorer that could allow remote code execution. The exploit works when a user views a specially crafted Web page using Internet Explorer or opens a legitimate HTML file that loads a specially crafted library file. Read more here.

  • (MS11-004) Vulnerability in Internet Information Services (IIS) FTP Service Could Allow Remote Code Execution (2489256)
    Risk Rating: Important

    This security update addresses a vulnerability in Microsoft Internet Information Services (IIS) FTP Service, which could allow remote code execution if an FTP server receives a specially crafted FTP command. Read more here.

  • (MS11-005) Vulnerability in Active Directory Could Allow Denial of Service (2478953)
    Risk Rating: Important

    This security update addresses a vulnerability in Active Directory, which could allow denial of service if an attacker sent a specially crafted packet to an affected Active Directory server. Read more here.

  • (MS11-006) Vulnerability in Windows Shell Graphics Processing Could Allow Remote Code Execution (2483185)
    Risk Rating: Critical

    This security update addresses a vulnerability in the Windows Shell graphics processor, which could allow remote code execution if a user views a specially crafted thumbnail image. Read more here.

  • (MS11-007) Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2485376)
    Risk Rating: Critical

    This security update addresses a vulnerability in the Windows OpenType Compact Font Format (CFF) driver, which could allow remote code execution if a user views content rendered in a specially crafted CFF font. Read more here.

  • (MS11-008) Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2451879)
    Risk Rating: Important

    This security update addresses two vulnerabilities in Microsoft Visio, could allow remote code execution if a user opens a specially crafted Visio file. Read more here.

  • (MS11-009) Vulnerability in JScript and VBScript Scripting Engines Could Allow Information Disclosure (2475792)
    Risk Rating: Important

    This security update addresses a vulnerability in the JScript and VBScript scripting engines, which could allow information disclosure if a user visited a specially crafted website. Read more here.

  • (MS11-010) Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2476687)
    Risk Rating: Important

    This security update addresses a vulnerability in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS), which could allow elevation of privilege. Read more here.

  • (MS11-011) Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802)
    Risk Rating: Important

    This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. Read more here.

  • (MS11-012) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628)
    Risk Rating: Important

    This security update addresses vulnerabilities in Microsoft Windows, which could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. Read more here.

  • (MS11-013) Vulnerabilities in Kerberos Could Allow Elevation of Privilege (2496930)
    Risk Rating: Important

    This security update addresses vulnerabilities in Microsoft Windows with the more severe ones capable of allowing elevation of privilege if a local, authenticated attacker installs a malicious service on a domain-joined computer. Read more here.

  • (MS11-014) Vulnerability in Local Security Authority Subsystem Service Could Allow Local Elevation of Privilege (2478960)
    Risk Rating: Important

    This security update addresses a vulnerability in the Local Security Authority Subsystem Service (LSASS), which could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. Read more here.
Vulnerability in MHTML Could Allow Information Disclosure
 Severity:    
 Advisory Date:  02 Feb 2011

This vulnerability is found in Microsoft Windows. When exploited, a remote attacker is able to execute malicious scripts on the infected system when the user visits websites, thus, disclosing any private information from these sites. The impact of exploiting this vulnerability is the same as that caused by server-side cross-site scripting (XSS) vulnerabilities.


Microsoft has noted that this vulnerability existed because of the way MHTML processes requests that are in MIME format. It is possible that a remote attacker can inject a client-side script code as a response to a Web request when users are browsing the Internet using Internet Explorer (IE). The script is capable of spoofing content, disclosing information, or taking any action on affected websites on behalf of the user.

Microsoft addresses the following vulnerabilities in its January batch of patches:

  • (MS11-001) Vulnerability in Windows Backup Manager Could Allow Remote Code Execution (2478935)
    Risk Rating: Important

    This security update resolves a vulnerability in Windows Backup Manager, which could allow remote code execution. Read more here.

  • (MS11-002) Vulnerabilities in Microsoft Data Access Components Could Allow Remote Code Execution (2451910)
    Risk Rating: Critical

    This security update resolves two vulnerabilities in Microsoft Data Access Components (MDAC), which could allow remote code execution. Read more here.

There is a vulnerability found in Windows Graphics Rendering Engine that may lead toexecution of arbitrary code once successfully exploited by a malicious remote user. It may also enable user toinstallation of programs, creation of malicious accounts, and changing, viewing or deleting data. User accounts with lesser user rights are less affected.

Vulnerability in Microsoft Internet Explorer 6, 7 and 8 that enables an attacker to gain the same user rights as the logged-on user after exploiting said vulnerability with a malicious website hosting specially-crafted content.If the user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Microsoft addresses the following vulnerabilities in its December batch of patches:

  • (MS10-090) Cumulative Security Update for Internet Explorer (2416400)
    Risk Rating: Critical

    This security update resolves a total of seven vulnerabilities in Internet Explorer (IE). Of these vulnerabilities, the most severe flaws could allow remote users to remotely execute malicious codes on the affected system if a user views a specially crafted Web page via IE. Read more here.

  • (MS10-091) Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199)
    Risk Rating: Critical

    This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code remotely on the affected system. Read more here.

  • (MS10-092) Vulnerability in Task Scheduler Could Allow Elevation of Privilege (2305420)
    Risk Rating: Important

    This security update resolves a vulnerability in Windows Task Scheduler, which could allow elevation of privilege if an attacker is logged on to an affected system and runs a specially crafted application. Read more here.

  • (MS10-093) Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (2424434)
    Risk Rating: Important

    This vulnerability resolves a vulnerability in Windows Movie Maker, which could allow remote users to execute code on the affected system. Read more here.

  • (MS10-094) Vulnerability in Windows Media Encoder Could Allow Remote Code Execution (2447961)
    Risk Rating: Important

    This update resolves a vulnerability in Windows Media Encoder, which could allow remote code execution if an attacker succeeds in convincing users to open a legitimate Windows Media Profile (.PRX) file that is located in the same network folder as a specially crafted library file. Read more here.

  • (MS10-095) Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2385678)
    Risk Rating: Important

    This update resolves a vulnerability in Microsoft Windows, which could allow remote code execution if users open certain files located in the same network folder as a specially crafted library file. Read more here.

  • (MS10-096) Vulnerability in Windows Address Book Could Allow Remote Code Execution (2423089)
    Risk Rating: Important

    This security update resolves a vulnerability in Windows Address Book, which could allow a remote user to execute code on the affected system. Read more here.

  • (MS10-097) Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution (2443105)
    Risk Rating: Important

    This update resolves a vulnerability in the Internet Connection Signup Wizard of Microsoft Windows, which could allow remote code execution. This exploit works if a user opens an .INS or .ISP file located in the same network folder as a specially crafted library file. Read more here.

  • (MS10-098) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2436673)
    Risk Rating: Important

    This update resolves vulnerabilities in Microsoft Windows, which could allow elevation of privilege. The exploit works if an attacker is logged on locally using valid logon credentials and runs a specially crafted application. Read more here.

  • (MS10-099) Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591)
    Risk Rating: Important

    This update resolves a vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows.This update resolves a vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. Read more here.

  • (MS10-100) Vulnerability in Consent User Interface Could Allow Elevation of Privilege (2442962)
    Risk Rating: Important

    This update resolves a vulnerability in the Consent User Interface (UI), which could allow elevation of privilege. Read more here.

  • (MS10-101) Vulnerability in Windows Netlogon Service Could Allow Denial of Service (2207559)
    Risk Rating: Important

    This update resolves a vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. Read more here.

  • (MS10-102) Vulnerability in Hyper-V Could Allow Denial of Service (2345316)
    Risk Rating: Important

    This update resolves a vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. An attacker with valid logon credentials could exploit the vulnerability and allow denial of service. Read more here.

  • (MS10-103) Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2292970)
    Risk Rating: Important

    This update resolves vulnerabilities in Microsoft Publisher that could allow remote code execution. An attacker can exploit the vulnerability by opening a specially crafted Publisher file. Read more here.

  • (MS10-104) Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution (2455005)
    Risk Rating: Important

    This update resolves a vulnerability in Microsoft SharePoint, which could allow remote code execution. The vulnerability is exploited if an attacker sends a specially crafted SOAP request to the Document Conversions Launcher Service in a SharePoint server environment that is using the Document Conversions Load Balancer Service. Read more here.

  • (MS10-105) Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095)
    Risk Rating: Important

    This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view a specially crafted image file using Microsoft Office, an attacker could gain the same user rights as the local user. Read more here.

  • (MS10-106) Vulnerability in Microsoft Exchange Server Could Allow Denial of Service (2407132)
    Risk Rating: Medium

    This update resolves a vulnerability in Microsoft Exchange Server, which could allow denial of service on the affected system. Read more here.