Sales
0161 215 3814
0800 953 0642
Support
0800 230 0032
0161 215 3711

June 2011 Security Bulletin Release

As mentioned in June’s Advance notification post this month’s security bulletin releases, are now confirmed to be 16 security bulletins, addressing 34 vulnerabilities, nine of which have a critical rating with four of these critical bulletins listed as Top Priorities. The remaining seven all have been rated as important bulletins.

This month again sees a very large bulletin release from Microsoft covering a large range of affected products including

Windows (XP, Vista, Windows 7, Server 2003 and Server 2008 (including R2))
Office
Internet Explorer (6, 7, 8 and 9)
.NET
SQL (2005 and 2008)
Visual Studios
ISA Server
and Silverlight.

The following table shows affected software by bulletin and the likelihood of an Operating System restart being required and hence impacting on services provided:

Bulletin ID Bulletin Title and Executive Summary Maximum Severity Rating and Vulnerability Impact Restart Requirement Affected Software
MS11-038 Vulnerability in OLE Automation Could Allow Remote Code Execution (2476490) Critical Requires Restart Microsoft Windows
This security update resolves a privately reported vulnerability in Microsoft Windows Object Linking and Embedding (OLE) Automation. The vulnerability could allow remote code execution if a user visits a Web site containing a specially crafted Windows Metafile (WMF) image. In all cases, however, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to convince users to visit a malicious Web site, typically by getting them to click a link in an e-mail message or Instant Messenger request. Remote Code Execution
MS11-039 Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2514842) Critical May Require Restart Microsoft Windows, Microsoft .NET Framework, Microsoft Silverlight
This security update resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. Remote Code Execution
MS11-040 Vulnerability in Threat Management Gateway Firewall Client Could Allow Remote Code Execution (2520426) Critical Requires Restart Microsoft Forefront Threat Management Gateway
This security update resolves a privately reported vulnerability in the Microsoft Forefront Threat Management Gateway (TMG) 2010 Client, formerly named the Microsoft Forefront Threat Management Gateway Firewall Client. The vulnerability could allow remote code execution if an attacker leveraged a client computer to make specific requests on a system where the TMG firewall client is used. Remote Code Execution
MS11-041 Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2525694) Critical Requires Restart Microsoft Windows
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a network share (or visits a web site that points to a network share) containing a specially crafted OpenType font (OTF). In all cases, however, an attacker would have no way to force a user to visit such a web site or network share. Instead, an attacker would have to convince a user to visit the web site or network share, typically by getting them to click a link in an e-mail message or Instant Messenger message. Remote Code Execution
MS11-042 Vulnerabilities in Distributed File System Could Allow Remote Code Execution (2535512) Critical Requires Restart Microsoft Windows
This security update resolves two privately reported vulnerabilities in the Microsoft Distributed File System (DFS). The more severe of these vulnerabilities could allow remote code execution when an attacker sends a specially crafted DFS response to a client-initiated DFS request. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. Remote Code Execution
MS11-043 Vulnerability in SMB Client Could Allow Remote Code Execution (2536276) Critical Requires Restart Microsoft Windows
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server. Remote Code Execution
MS11-044 Vulnerability in .NET Framework Could Allow Remote Code Execution (2538814) Critical May Require Restart Microsoft Windows, Microsoft .NET Framework
This security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. Remote Code Execution
MS11-050 Cumulative Security Update for Internet Explorer (2530548) Critical Requires Restart Microsoft Windows, Internet Explorer
This security update resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Remote Code Execution
MS11-052 Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2544521) Critical May Require Restart Microsoft Windows, Internet Explorer
This security update resolves a privately reported vulnerability in the Microsoft implementation of Vector Markup Language (VML). This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and Moderate for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers. Internet Explorer 9 is not affected by the vulnerability.
The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Remote Code Execution
MS11-037 Vulnerability in MHTML Could Allow Information Disclosure (2544893) Important May Require Restart Microsoft Windows
This security update resolves a publicly disclosed vulnerability in the MHTML protocol handler in Microsoft Windows. The vulnerability could allow information disclosure if a user opens a specially crafted URL from an attacker’s Web site. An attacker would have to convince the user to visit the Web site, typically by getting them to follow a link in an e-mail message or Instant Messenger message. Information Disclosure
MS11-045 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2537146) Important May Require Restart Microsoft Office
This security update resolves eight privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Installing and configuring Office File Validation (OFV) to prevent the opening of suspicious files blocks the attack vectors for exploiting the vulnerabilities described in CVE-2011-1272, CVE-2011-1273, and CVE-2011-1279. Microsoft Excel 2010 is only affected by CVE-2011-1273 described in this bulletin. The automated Microsoft Fix it solution, “Disable Edit in Protected View for Excel 2010,” available in Microsoft Knowledge Base Article 2501584, blocks the attack vectors for exploiting CVE-2011-1273. Remote Code Execution
MS11-046 Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege (2503665) Important Requires Restart Microsoft Windows
This security update resolves a publicly disclosed vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user’s system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. Elevation of Privilege
MS11-047 Vulnerability in Hyper-V Could Allow Denial of Service (2525835) Important Requires Restart Microsoft Windows
This security update resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a specially crafted packet is sent to the VMBus by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. Denial of Service
MS11-048 Vulnerability in SMB Server Could Allow Denial of Service (2536275) Important Requires Restart Microsoft Windows
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit this vulnerability. Denial of Service
MS11-049 Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893) Important Requires Restart Microsoft Office,
Microsoft SQL Server,
Microsoft Visual Studio
This security update resolves a privately reported vulnerability in Microsoft XML Editor. The vulnerability could allow information disclosure if a user opened a specially crafted Web Service Discovery (.disco) file with one of the affected software listed in this bulletin. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise the affected system. Information Disclosure
MS11-051 Vulnerability in Active Directory Certificate Services Web Enrolment Could Allow Elevation of Privilege (2518295) Important May Require Restart Microsoft Windows
This security update resolves a privately reported vulnerability in Active Directory Certificate Services Web Enrolment. The vulnerability is a cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. An attacker who successfully exploited this vulnerability would need to send a specially crafted link and convince a user to click the link. In all cases, however, an attacker would have no way to force a user to visit the Web site. Instead, an attacker would have to persuade a user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the vulnerable Web site. Elevation of Privilege

This month as mentioned Microsoft has highlighted 4 of the critical updates in particular as a top priority these are:

  • MS11-042 (DFS). This bulletin resolves two privately reported issues affecting all versions of Windows with the critical rating applying to Windows XP and Server 2003 systems that utilize DFS (Distributed File Servers) for later editions of windows (vista, windows7 and Server 2008) the severity is listed as Important.
  • MS11-043 (SMB Client). This bulletin resolves one privately reported issue affecting all versions of SMB Client on All versions of Windows.
  • MS11-050 (Internet Explorer). This security bulletin resolves 11 privately reported issues in Internet Explorer (Internet Explorer 9 is only affected by 4 of these issues).
  • MS11-052 (Windows). This bulletin resolves one privately reported issue in Windows and is also Critical – This update does not affect users who use Internet Explorer 9.

Please click the following link to view Microsoft’s deployment priority guidance which assists in deployment planning. You can also follow this link to view the risk and impact graph to visually see an aggregate view of this month’s severity and exploitability index.).

So in summary, we are likely to see updates requiring reboots of servers this month. (as usual, as a UKFast customer, you benefit from these updates being applied automatically unless you have opted out of this service.)
MC.

Share with: