13 AUG 2013
Microsoft addresses the following vulnerabilities in its August batch of patches:
This security updates addresses eleven reported vulnerabilities in Internet Explorer, which may lead to an attacker executing a malware onto vulnerable system. The attacker can also gain user rights similar to the currently logged in user. Read more here.
This security update addresses a reported vulnerability in Microsoft Windows, specifically in the Unicode Scripts Processor. This may allow an attacker to execute a malware once a user open a malware posing as a document or webpage that supports embedded OpenType fonts. Read more here.
This security update addresses three disclosed vulnerabilities in Microsoft Exchange Server, stemming from the WebReady Document viewing and Data Loss Prevention fetures. This may lead to malware execution in an unpatched system.. Read more here.
This security update resolves a privately reported vulnerability in Microsoft Windows that may allow an attacker to gain elevated privilege once an attacker sends a malicious RPC request. Read more here.
This security update resolve a publicly disclosed vulnerability and three undisclosed ones in Microsoft Windows. An attacker must have valid logon credentials to exploit these vulnerabilities and execute a malware. Read more here.
This security update addresses an undisclosed vulnerability in Windows NAT Driver in Microsoft Windows, which can lead to an attacker executing a denial-of-service attack. Read more here.
This security update resolves an undisclosed vulnerability in Microsoft Windows that may allow a denial of service once a remote attacker sends a malicious ICMP packet to a vulnerable system. Read more here.
This security update resolves an undisclosed vulnerability in Active Directory Federation Services (AD FS) that may allow unwanted data disclosure. With this disclosure, an attacker could then attempt to login a targeted network. . Read more here.
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
|MS Bulletin ID||Vulnerability ID||DPI Rule Number||DPI Rule Name||Release Date||IDF Compatibility|
|MS13-059||CVE-2013-3184||1005629||Internet Explorer Memory Corruption Vulnerability (CVE-2013-3184)||13-Aug-13||YES|
|MS13-059||CVE-2013-3187||1005630||Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3187)||13-Aug-13||YES|
|MS13-059||CVE-2013-3188||1005631||Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3188)||13-Aug-13||YES|
|MS13-059||CVE-2013-3189||1005632||Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3189)||13-Aug-13||YES|
|MS13-059||CVE-2013-3191||1005633||Internet Explorer Memory Corruption Vulnerability (CVE-2013-3191)||13-Aug-13||YES|
|MS13-059||CVE-2013-3193||1005634||Internet Explorer Memory Corruption Vulnerability (CVE-2013-3193)||13-Aug-13||YES|
|MS13-059||CVE-2013-3194||1005635||Internet Explorer Memory Corruption Vulnerability (CVE-2013-3194)||13-Aug-13||YES|
|MS13-059||CVE-2013-3199||1005636||Internet Explorer Memory Corruption Vulnerability (CVE-2013-3199)||13-Aug-13||YES|