As mentioned in the advanced notification, this month there are seven security bulletins addressing twenty three vulnerabilities:
This bulletin covers:
72 Microsoft operating systems / service pack combinations
31 Microsoft .NET installation versions and types
9 Microsoft Office installation versions and types
6 Microsoft Silverlight installation versions and types
This month’s security bulletins are one of the largest ever released by Microsoft. Out of the seven vulnerabilities addressed three of the vulnerabilities are already publically disclosed. The most likely scenario in which an attacker could exploit the vulnerabilities would be from a user browsing to a malicious website triggering remote code execution on an unpatched system.
Due to the .NET patches this month we are expecting a longer than usual patch cycle
Bulletin ID |
Bulletin Title and Executive Summary |
Maximum Severity Rating and Vulnerability Impact |
Restart Requirement |
Affected Software |
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352) This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Critical |
May require restart |
Microsoft Office |
|
Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578) This security update resolves three publicly disclosed vulnerabilities and seven privately reported vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker’s website. |
Critical |
May require restart |
Microsoft Windows, Microsoft .NET Framework, Microsoft Silverlight, |
|
Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2693777) This security update resolves two privately reported vulnerabilities in the .NET Framework. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Critical |
May require restart |
Microsoft Windows, Microsoft .NET Framework |
|
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2663830) This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Important |
May require restart |
Microsoft Office |
|
Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2597981) This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Important |
May require restart |
Microsoft Office |
|
Vulnerability in TCP/IP Could Allow Elevation of Privilege (2688338) This security update resolves one privately reported and one publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. |
Important |
Requires restart |
Microsoft Windows |
|
Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege (2690533) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. |
Important |
Requires restart |
Microsoft Windows |
The following link shows the Microsoft recommended Bulletin Deployment Priority and Severity and Exploitability Index
In summary, we are likely to see updates requiring reboots of servers this month. As usual, as a UKFast customer, you will benefit from these updates being applied automaticallyunless you have opted out of this service.