Microsoft Security Bulletin: November 2013
It’s that time again! More updates for you to consider in your environments and if you have a Surface device there is a new firmware update to improve performance and reliability.
The table below show the update details for this month along with a link for more information.
Bulletin ID | Bulletin Title and Executive Summary | Maximum Severity Rating and Vulnerability Impact | Restart Requirement | Affected Software |
---|---|---|---|---|
MS13-088 | Cumulative Security Update for Internet Explorer (2888505) This security update resolves ten privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. | Critical Remote Code Execution | Requires restart | Microsoft Windows, Internet Explorer |
MS13-089 | Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views or opens a specially crafted Windows Write file in WordPad. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. | Critical Remote Code Execution | Requires restart | Microsoft Windows |
MS13-090 | Cumulative Security Update of ActiveX Kill Bits (2900986) This security update resolves a privately reported vulnerability that is currently being exploited. The vulnerability exists in the InformationCardSigninHelper Class ActiveX control. The vulnerability could allow remote code execution if a user views a specially crafted webpage with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. | Critical Remote Code Execution | May require restart | Microsoft Windows |
MS13-091 | Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093) This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted WordPerfect document file is opened in an affected version of Microsoft Office software. An attacker who successfully exploited the most severe vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. | Important Remote Code Execution | May require restart | Microsoft Office |
MS13-092 | Vulnerability in Hyper-V Could Allow Elevation of Privilege (2893986) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker passes a specially crafted function parameter in a hypercall from an existing running virtual machine to the hypervisor. The vulnerability could also allow denial of service for the Hyper-V host if the attacker passes a specially crafted function parameter in a hypercall from an existing running virtual machine to the hypervisor. | Important Elevation of Privilege | Requires restart | Microsoft Windows |
MS13-093 | Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure (2875783) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker logs on to an affected system as a local user, and runs a specially crafted application on the system that is designed to enable the attacker to obtain information from a higher-privileged account. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. | Important Information Disclosure | Requires restart | Microsoft Windows |
MS13-094 | Vulnerability in Microsoft Outlook Could Allow Information Disclosure (2894514) This security update resolves a publicly disclosed vulnerability in Microsoft Outlook. The vulnerability could allow information disclosure if a user opens or previews a specially crafted email message using an affected edition of Microsoft Outlook. An attacker who successfully exploited this vulnerability could ascertain system information, such as the IP address and open TCP ports, from the target system and other systems that share the network with the target system. | Important Information Disclosure | May require restart | Microsoft Office |
MS13-095 | Vulnerability in Digital Signatures Could Allow Denial of Service (2868626) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service when an affected web service processes a specially crafted X.509 certificate. | Important Denial of Service | Requires restart | Microsoft Windows |
Make sure you assess these updates for the relevance in your environments.
Jeffa
Technorati Tags: Security Updates,Patching