MS13-098 - Critical: Vulnerability in Windows Could Allow Remote Code Execution (2893294) - Version: 1.6

Severity Rating: CriticalRevision Note: V1.6 (July 29, 2014): Revised bulletin to announce that Microsoft no longer plans to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. It remains available as an opt-in feature.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system.

Posted by on 29 July 2014 | 2:00 am

MS14-037 - Critical: Cumulative Security Update for Internet Explorer (2975687) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (July 29, 2014): Corrected the severity table and vulnerability information to add CVE-2014-4066 as a vulnerability addressed by this update. This is an informational change only. Customers who have already successfully installed the update do not have to take any action.Summary: This security update resolves one publicly disclosed vulnerability and twenty-four privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 29 July 2014 | 2:00 am

MS14-036 - Critical: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487) - Version: 1.2

Severity Rating: CriticalRevision Note: V1.2 (July 28, 2014): Corrected the update replacements for the Windows Vista (Windows GDI+) (2957503) update and the Windows Server 2008 (Windows GDI+) (2957503) update. This is an informational change only.Summary: This security update resolves two privately reported vulnerabilities in Microsoft Windows, Microsoft Office, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user opens a specially crafted file or webpage. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Posted by on 28 July 2014 | 2:00 am

MS14-039 - Important: Vulnerability in On-Screen Keyboard Could Allow Elevation of Privilege (2975685) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (July 16, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses a vulnerability in a low integrity process to execute the On-Screen Keyboard (OSK) and upload a specially crafted program to the target system.

Posted by on 16 July 2014 | 2:00 am

MS14-009 - Important: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege - Version: 1.2

Severity Rating: ImportantRevision Note: V1.2 (July 16, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".Summary: This security update resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft .NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website.

Posted by on 16 July 2014 | 2:00 am

MS14-030 - Important: Vulnerability in Remote Desktop Could Allow Tampering (2969259) - Version: 1.2

Severity Rating: ImportantRevision Note: V1.2 (July 16, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes"Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow tampering if an attacker gains access to the same network segment as the targeted system during an active RDP session, and then sends specially crafted RDP packets to the targeted system.

Posted by on 16 July 2014 | 2:00 am

MS14-033 - Important: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (July 10, 2014): Bulletin revised to remove the prerequisite requirement for the MSXML 6.0 update on Windows Server 2003 systemsSummary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a logged on user visits a specially crafted website that is designed to invoke MSXML through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website.

Posted by on 10 July 2014 | 2:00 am

MS14-042 - Moderate: Vulnerability in Microsoft Service Bus Could Allow Denial of Service (2972621) - Version: 1.0

Severity Rating: ModerateRevision Note: V1.0 (July 8, 2014): Bulletin publishedSummary: This security update resolves one publicly disclosed vulnerability in Microsoft Service Bus for Windows Server. The vulnerability could allow denial of service if a remote authenticated attacker creates and runs a program that sends a sequence of specially crafted Advanced Message Queuing Protocol (AMQP) messages to the target system. Microsoft Service Bus for Windows Server is not shipped with any Microsoft operating system. For an affected system to be vulnerable Microsoft Service Bus must first be downloaded, installed, and configured, and then its configuration details (farm certificate) shared with other users.

Posted by on 8 July 2014 | 2:00 am

MS14-038 - Critical: Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (July 8, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link that takes them to the attacker's site, and then convince them to open the specially crafted Journal file.

Posted by on 8 July 2014 | 2:00 am

MS14-040 - Important: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege (2975684) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (July 8, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege an attacker logs onto a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Posted by on 8 July 2014 | 2:00 am

MS14-041 - Important: Vulnerability in DirectShow Could Allow Elevation of Privilege (2975681) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (July 8, 2014): Bulletin publishedSummary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker first exploits another vulnerability in a low integrity process and then uses this vulnerability to execute specially crafted code in the context of the logged on user. By default, the modern, immersive browsing experience on Windows 8 and Windows 8.1 runs with Enhanced Protected Mode (EPM). For example, customers using the touch-friendly Internet Explorer 11 browser on modern Windows tablets are using Enhanced Protected Mode by default. Enhanced Protected Mode uses advanced security protections that can help mitigate against exploitation of this vulnerability on 64-bit systems.

Posted by on 8 July 2014 | 2:00 am

MS14-018 - Critical: Cumulative Security Update for Internet Explorer (2950467) - Version: 1.2

Severity Rating: CriticalRevision Note: V1.2 (June 30, 2014): Corrected the CVE number for CVE-2014-0325. The bulletin incorrectly had listed this CVE number as CVE-2014-0235. This is an informational change only. Summary: This security update resolves six privately reported vulnerabilities in Internet Explorer. These vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Posted by on 30 June 2014 | 2:00 am

MS14-019 - Critical: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (June 27, 2014): Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user runs specially crafted .bat and .cmd files from a trusted or semi-trusted network location. An attacker would have no way to force users to visit the network location or run the specially crafted files. Instead, an attacker would have to convince users to take such action. For example, an attacker could trick users into clicking a link that takes them to the location of the attacker's specially crafted files and subsequently convince them to run them.

Posted by on 27 June 2014 | 2:00 am

MS14-035 - Critical: Cumulative Security Update for Internet Explorer (2969262) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (June 17, 2014): Corrected the severity table and vulnerability information to add CVE-2014-2782 as a vulnerability addressed by this update. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.Summary: This security update resolves two publicly disclosed vulnerabilities and fifty-eight privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 17 June 2014 | 2:00 am

MS14-032 - Important: Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (June 10, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Lync Server. The vulnerability could allow information disclosure if a user tries to join a Lync meeting by clicking a specially crafted meeting URL..

Posted by on 10 June 2014 | 2:00 am

MS14-031 - Important: Vulnerability in TCP Protocol Could Allow Denial of Service (2962478) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (June 10, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a sequence of specially crafted packets to the target system.

Posted by on 10 June 2014 | 2:00 am

MS14-034 - Important: Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (June 10, 2014): Bulletin published.Summary: This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a specially crafted file is opened in an affected version of Microsoft Word. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 10 June 2014 | 2:00 am

MS14-029 - Critical: Security Update for Internet Explorer (2962482) - Version: 1.2

Severity Rating: CriticalRevision Note: V1.2 (May 27, 2014): Bulletin revised to correct the update replacement for the Internet Explorer 11 updates and to announce a detection change in the 2961851 update. This is a detection change only. Customers who have already successfully updated their systems do not need to take any action.Summary: This security update resolves two privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 27 May 2014 | 2:00 am

MS14-024 - Important: Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass (2961033) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (May 13, 2014): Bulletin published.Summary: This security update resolves one privately reported vulnerability in an implementation of the MSCOMCTL common controls library. The vulnerability could allow security feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability that could take advantage of the ASLR bypass to run arbitrary code.

Posted by on 13 May 2014 | 2:00 am

MS14-025 - Important: Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (May 13, 2014): Bulletin published.Summary: This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker uses certain Active Directory Group Policy preferences extensions to configure, distribute and ultimately decrypt the passwords that are stored with Group Policy preferences.

Posted by on 13 May 2014 | 2:00 am

MS14-023 - Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2961037) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (May 13, 2014): V1.1 (May 13, 2014): Corrected the update replacement for the Microsoft Office 2010 (proofing tools) (2878284) update.Summary: This security update resolves two privately reported vulnerabilities in Microsoft Office. The most severe vulnerability could allow remote code execution if a user opens an Office file that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 13 May 2014 | 2:00 am

MS14-026 - Important: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (May 13, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow elevation of privilege if an authenticated attacker sends specially crafted data to an affected workstation or server that uses .NET Remoting. .NET Remoting is not widely used by applications; only custom applications that have been specifically designed to use .NET Remoting would expose a system to the vulnerability.

Posted by on 13 May 2014 | 2:00 am

MS14-022 - Critical: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2952166) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (May 13, 2014): Bulletin published.Summary: This security update resolves multiple privately reported vulnerabilities in Microsoft Office server and productivity software. The most severe of these vulnerabilities could allow remote code execution if an authenticated attacker sends specially crafted page content to a target SharePoint server.

Posted by on 13 May 2014 | 2:00 am

MS14-028 - Important: Vulnerabilities in iSCSI Could Allow Denial of Service (2962485) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (May 13, 2014): Bulletin published.Summary: This security update resolves two vulnerabilities in the Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends large amounts of specially crafted iSCSI packets over the target network. This vulnerability only affects servers for which the iSCSI target role has been enabled.

Posted by on 13 May 2014 | 2:00 am

MS14-027 - Important: Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege (2962488) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (May 13, 2014): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application that uses ShellExecute. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Posted by on 13 May 2014 | 2:00 am