Freigeben über


Microsoft Security Bulletin: July 2014 Release

3823_7103_securitybulletin_thumb_32407BF9_thumb_12CC8186

Welcome to the first security bulletin of the new financial year! The table below list the updates in order of severity. Please make sure you check them out and apply to your environments as necessary.

Bulletin ID

Bulletin Title and Executive Summary

Maximum Severity Rating and Vulnerability Impact

Restart Requirement

Affected Software

MS14-037

Cumulative Security Update for Internet Explorer (2975687) This security update resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Critical Remote Code Execution

Requires restart

Microsoft Windows, Internet Explorer

MS14-038

Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical Remote Code Execution

May require restart

Microsoft Windows

MS14-039

Vulnerability in On-Screen Keyboard Could Allow Elevation of Privilege (2975685) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses a vulnerability in a low integrity process to execute the On-Screen Keyboard (OSK) and upload a specially crafted program to the target system.

Important Elevation of Privilege

Requires restart

Microsoft Windows

MS14-040

Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege (2975684) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs onto a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Important Elevation of Privilege

Requires restart

Microsoft Windows

MS14-041

Vulnerability in DirectShow Could Allow Elevation of Privilege (2975681) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker first exploits another vulnerability in a low integrity process and then uses this vulnerability to execute specially crafted code in the context of the logged on user. By default, the modern, immersive browsing experience on Windows 8 and Windows 8.1 runs with Enhanced Protected Mode (EPM). For example, customers using the touch-friendly Internet Explorer 11 browser on modern Windows tablets are using Enhanced Protected Mode by default. Enhanced Protected Mode uses advanced security protections that can help mitigate against exploitation of this vulnerability on 64-bit systems.

Important Elevation of Privilege

May require restart

Microsoft Windows

MS14-042

Vulnerability in Microsoft Service Bus Could Allow Denial of Service (2972621) This security update resolves one publicly disclosed vulnerability in Microsoft Service Bus for Windows Server. The vulnerability could allow denial of service if a remote authenticated attacker creates and runs a program that sends a sequence of specially crafted Advanced Message Queuing Protocol (AMQP) messages to the target system. Microsoft Service Bus for Windows Server is not shipped with any Microsoft operating system. For an affected system to be vulnerable Microsoft Service Bus must first be downloaded, installed, and configured, and then its configuration details (farm certificate) shared with other users.

Moderate Denial of Service

Does not require restart

Microsoft Server Software

For more information make sure you check out the Security Update guidance for management and if you are an IT Pro interested in improving your security posture make sure you check out the IT Pro Security Community on TechNet.

Jeffa

Technorati Tags: Security,Patching,updates