MS14-049 - Important: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (2962490) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (August 20, 2014): Bulletin revised to add prerequisite information for customers running Windows Server 2003 who install updates manually. See Update FAQ for more information.Summary: This security update resolves a privately disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application that attempts to repair a previously-installed application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Posted by on 20 August 2014 | 2:00 am

MS14-045 - Important: Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation of Privilege (2984615) - Version: 2.0

Severity Rating: ImportantRevision Note: V2.0 (August 15, 2014): Bulletin revised to remove Download Center links for Microsoft security update 2982791. Microsoft recommends that customers uninstall this update. See the Update FAQ for details.Summary: This security update resolves three privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.

Posted by on 15 August 2014 | 2:00 am

MS14-044 - Important: Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (August 13, 2014): Revised bulletin to correct the Update FAQ that addresses the question, Will these security updates be offered to SQL Server clusters?Summary: This security update resolves two privately reported vulnerabilities in Microsoft SQL Server (one in SQL Server Master Data Services and the other in the SQL Server relational database management system). The more severe of these vulnerabilities, affecting SQL Server Master Data Services, could allow elevation of privilege if a user visits a specially crafted website that injects a client-side script into the user's instance of Internet Explorer. In all cases, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email.

Posted by on 13 August 2014 | 2:00 am

MS14-050 - Important: Vulnerability in Microsoft SharePoint Server Could Allow Elevation of Privilege (2977202) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (August 12, 2014): Bulletin published.Summary: This security update resolves one privately reported vulnerability in Microsoft SharePoint Server. An authenticated attacker who successfully exploited this vulnerability could use a specially crafted app to run arbitrary JavaScript in the context of the user on the current SharePoint site.

Posted by on 12 August 2014 | 2:00 am

MS14-051 - Critical: Cumulative Security Update for Internet Explorer (2976627) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (August 12, 2014): Bulletin published.Summary: This security update resolves one publicly disclosed and twenty-five privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 12 August 2014 | 2:00 am

MS14-043 - Critical: Vulnerability in Windows Media Center Could Allow Remote Code Execution (2978742) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (August 12, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that invokes Windows Media Center resources.

Posted by on 12 August 2014 | 2:00 am

MS14-046 - Important: Vulnerability in .NET Framework Could Allow Security Feature Bypass (2984625) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (August 12, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow security feature bypass if a user visits a specially crafted website. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code.

Posted by on 12 August 2014 | 2:00 am

MS14-047 - Important: Vulnerability in LRPC Could Allow Security Feature Bypass (2978668) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (August 12, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker uses the vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that takes advantage of the ASLR bypass to run arbitrary code.

Posted by on 12 August 2014 | 2:00 am

MS14-036 - Critical: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487) - Version: 2.0

Severity Rating: CriticalRevision Note: V2.0 (August 12, 2014): Rereleased bulletin to announce the offering of update 2881071 to replace update 2767915 for systems running Microsoft Office 2010 Service Pack 1 or Microsoft Office 2010 Service Pack 2. See the Update FAQ for details.Summary: This security update resolves two privately reported vulnerabilities in Microsoft Windows, Microsoft Office, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user opens a specially crafted file or webpage. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Posted by on 12 August 2014 | 2:00 am

MS14-048 - Important: Vulnerability in OneNote Could Allow Remote Code Execution (2977201) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (August 12, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft OneNote. The vulnerability could allow remote code execution if a specially crafted file is opened in an affected version of Microsoft OneNote. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 12 August 2014 | 2:00 am

MS13-098 - Critical: Vulnerability in Windows Could Allow Remote Code Execution (2893294) - Version: 1.6

Severity Rating: CriticalRevision Note: V1.6 (July 29, 2014): Revised bulletin to announce that Microsoft no longer plans to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. It remains available as an opt-in feature.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system.

Posted by on 29 July 2014 | 2:00 am

MS14-037 - Critical: Cumulative Security Update for Internet Explorer (2975687) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (July 29, 2014): Corrected the severity table and vulnerability information to add CVE-2014-4066 as a vulnerability addressed by this update. This is an informational change only. Customers who have already successfully installed the update do not have to take any action.Summary: This security update resolves one publicly disclosed vulnerability and twenty-four privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 29 July 2014 | 2:00 am

MS14-030 - Important: Vulnerability in Remote Desktop Could Allow Tampering (2969259) - Version: 1.2

Severity Rating: ImportantRevision Note: V1.2 (July 16, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes"Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow tampering if an attacker gains access to the same network segment as the targeted system during an active RDP session, and then sends specially crafted RDP packets to the targeted system.

Posted by on 16 July 2014 | 2:00 am

MS14-009 - Important: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Version: 1.2

Severity Rating: ImportantRevision Note: V1.2 (July 16, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".Summary: This security update resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website.

Posted by on 16 July 2014 | 2:00 am

MS14-039 - Important: Vulnerability in On-Screen Keyboard Could Allow Elevation of Privilege (2975685) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (July 16, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses a vulnerability in a low integrity process to execute the On-Screen Keyboard (OSK) and upload a specially crafted program to the target system.

Posted by on 16 July 2014 | 2:00 am

MS14-033 - Important: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (July 10, 2014): Bulletin revised to remove the prerequisite requirement for the MSXML 6.0 update on Windows Server 2003 systemsSummary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a logged on user visits a specially crafted website that is designed to invoke MSXML through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website.

Posted by on 10 July 2014 | 2:00 am

MS14-040 - Important: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege (2975684) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (July 8, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege an attacker logs onto a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Posted by on 8 July 2014 | 2:00 am

MS14-038 - Critical: Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (July 8, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link that takes them to the attacker's site, and then convince them to open the specially crafted Journal file.

Posted by on 8 July 2014 | 2:00 am

MS14-042 - Moderate: Vulnerability in Microsoft Service Bus Could Allow Denial of Service (2972621) - Version: 1.0

Severity Rating: ModerateRevision Note: V1.0 (July 8, 2014): Bulletin publishedSummary: This security update resolves one publicly disclosed vulnerability in Microsoft Service Bus for Windows Server. The vulnerability could allow denial of service if a remote authenticated attacker creates and runs a program that sends a sequence of specially crafted Advanced Message Queuing Protocol (AMQP) messages to the target system. Microsoft Service Bus for Windows Server is not shipped with any Microsoft operating system. For an affected system to be vulnerable Microsoft Service Bus must first be downloaded, installed, and configured, and then its configuration details (farm certificate) shared with other users.

Posted by on 8 July 2014 | 2:00 am

MS14-041 - Important: Vulnerability in DirectShow Could Allow Elevation of Privilege (2975681) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (July 8, 2014): Bulletin publishedSummary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker first exploits another vulnerability in a low integrity process and then uses this vulnerability to execute specially crafted code in the context of the logged on user. By default, the modern, immersive browsing experience on Windows 8 and Windows 8.1 runs with Enhanced Protected Mode (EPM). For example, customers using the touch-friendly Internet Explorer 11 browser on modern Windows tablets are using Enhanced Protected Mode by default. Enhanced Protected Mode uses advanced security protections that can help mitigate against exploitation of this vulnerability on 64-bit systems.

Posted by on 8 July 2014 | 2:00 am

MS14-018 - Critical: Cumulative Security Update for Internet Explorer (2950467) - Version: 1.2

Severity Rating: CriticalRevision Note: V1.2 (June 30, 2014): Corrected the CVE number for CVE-2014-0325. The bulletin incorrectly had listed this CVE number as CVE-2014-0235. This is an informational change only. Summary: This security update resolves six privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Posted by on 30 June 2014 | 2:00 am

MS14-019 - Critical: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (June 27, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user runs specially crafted .bat and .cmd files from a trusted or semi-trusted network location. An attacker would have no way to force users to visit the network location or run the specially crafted files. Instead, an attacker would have to convince users to take such action. For example, an attacker could trick users into clicking a link that takes them to the location of the attacker's specially crafted files and subsequently convince them to run them.

Posted by on 27 June 2014 | 2:00 am

MS14-035 - Critical: Cumulative Security Update for Internet Explorer (2969262) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (June 17, 2014): Corrected the severity table and vulnerability information to add CVE-2014-2782 as a vulnerability addressed by this update. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.Summary: This security update resolves two publicly disclosed vulnerabilities and fifty-eight privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 17 June 2014 | 2:00 am

MS14-032 - Important: Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (June 10, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Lync Server. The vulnerability could allow information disclosure if a user tries to join a Lync meeting by clicking a specially crafted meeting URL..

Posted by on 10 June 2014 | 2:00 am

MS14-031 - Important: Vulnerability in TCP Protocol Could Allow Denial of Service (2962478) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (June 10, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a sequence of specially crafted packets to the target system.

Posted by on 10 June 2014 | 2:00 am