Freigeben über


Microsoft Security Bulletin: June 2014 Release!

3823_7103_securitybulletin_thumb_32407BF9_thumb_12CC8186

Welcome to another security bulletin and the final bulletin for the financial year. This time around we have 7 updates that you need to consider for your environments. Check out the details below and apply these where needed.

Bulletin ID

Bulletin Title and Executive Summary

Maximum Severity Rating and Vulnerability Impact

Restart Requirement

Affected Software

MS14-035

Cumulative Security Update for Internet Explorer (2969262) This security update resolves two publicly disclosed vulnerabilities and fifty-seven privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Critical Remote Code Execution

Requires restart

Microsoft Windows, Internet Explorer

MS14-036

Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487) This security update resolves two privately reported vulnerabilities in Microsoft Windows, Microsoft Office, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user opens a specially crafted file or webpage. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical Remote Code Execution

Requires restart

Microsoft Windows, Microsoft Office, Microsoft Lync

MS14-034

Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261) This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a specially crafted file is opened in an affected version of Microsoft Word. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Important Remote Code Execution

May require restart

Microsoft Office

MS14-033

Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a logged on user visits a specially crafted website that is designed to invoke Microsoft XML Core Services (MSXML) through Internet Explorer. In all cases, however, an attacker would have no way to force users to visit such websites. Instead, an attacker would have to convince users to visit a website, typically by getting them to click a link in an email message or in an Instant Messenger request that takes users to the attacker's website.

Important Information Disclosure

May require restart

Microsoft Windows

MS14-032

Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258) This security update resolves a privately reported vulnerability in Microsoft Lync Server. The vulnerability could allow information disclosure if a user tries to join a Lync meeting by clicking a specially crafted meeting URL.

Important Information Disclosure

May require restart

Microsoft Lync Server

MS14-031

Vulnerability in TCP Protocol Could Allow Denial of Service (2962478) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a sequence of specially crafted packets to the target system.

Important Denial of Service

Requires restart

Microsoft Windows

MS14-030

Vulnerability in Remote Desktop Could Allow Tampering (2969259) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow tampering if an attacker gains access to the same network segment as the targeted system during an active Remote Desktop Protocol (RDP) session, and then sends specially crafted RDP packets to the targeted system. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.

Important Tampering

May require restart

Microsoft Windows

I thought I would end the year and give you more information related to patching and updates. Below is where you can go for more information.

Other Information

Follow the security response team on Twitter for the latest information and updates:

https://twitter.com/msftsecresponse

Microsoft Windows Malicious Software Removal Tool:

Microsoft has released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update,Windows Server Update Services, and the Download Center.

Non-Security Updates on MU, WU, and WSUS:

For information about non-security releases on Windows Update and

Microsoft Update, please see:

https://support.microsoft.com/kb/894199: Microsoft Knowledge Base Article 894199, Description of Software Update Services and Windows Server Update Services changes in content.

Includes all Windows content.

https://technet.microsoft.com/wsus/bb456965: Updates from Past Months for Windows Server Update Services. Displays all new, revised, and rereleased updates for Microsoft products other than Microsoft Windows.

Microsoft Active Protections Program (MAPP)

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed at

https://www.microsoft.com/security/msrc/collaboration/mapp.aspx.

Recognize and avoid fraudulent email to Microsoft customers:

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at

https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications on

https://technet.microsoft.com/security/dd252948.

Happy Updating!

Jeffa

Technorati Tags: security Updates,Patching,Updates