Microsoft addresses the following vulnerabilities in its November batch of patches:
(MS12-071) Cumulative Security Update for Internet Explorer (2761451) Risk Rating: Critical
This patch addresses vulnerabilities in Internet Explorer that could allow remote code execution via a specially crafted web page. Read more here.
(MS12-072) Vulnerabilities in Windows Shell Could Allow Remote Code Execution (2727528) Risk Rating: Critical
This patch addresses vulnerabilities in Microsoft Windows, which could allow remote code execution via a specially crafted briefcase in Windows Explorer. Read more here.
(MS12-073) Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure (2733829) Risk Rating: Medium
This patch addresses two vulnerabilities affecting Microsoft Internet Information Services (IIS). Read more here.
(MS12-074) Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2745030) Risk Rating: Critical
This patch addresses vulnerabilities existing in the .NET Framework. Read more here.
(MS12-075) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2761226) Risk Rating: Critical
This patch addresses vulnerabilities affecting Microsoft Windows. Read more here.
(MS12-076) Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2720184) Risk Rating: Important
This patch addresses vulnerabilities existing in Microsoft Office, which could allow remote code execution once users opens a specially crafted Excel file. Read more here.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
MS Bulletin ID
DPI Rule Number
DPI Rule Name
Microsoft Internet Explorer CFormElement Use After Free Vulnerability
Microsoft Internet Explorer CTreePos Use After Free Vulnerability
Microsoft Internet Explorer CTreeNode Use After Free Vulnerability
Microsoft Windows Briefcase Integer Underflow Vulnerability
Microsoft Windows Briefcase Integer Overflow Vulnerability
Identified Microsoft DLL File Over Network Share
Identified Suspicious Web Proxy Via Auto-Discovery
Microsoft Windows Font Parsing Vulnerability
Microsoft Excel SerAuxErrBar Heap Overflow Vulnerability
Administrators of NGINX web servers running PHP-FPM are advised to patch a vulnerability (CVE-2019-11043) that can let threat actors execute remote code on vulnerable, NGINX-enabled web servers. Here’s what you need to know.