12345

8/28/2012

Microsoft Security Bulletin Summary for August 2012

1. Introduction

Microsoft(MS)'s regular security updates were released for August 2012.
Users who use MS OS strongly recommended update to be safe from Vulnerability in Remote Desktop Could Allow Remote Code Execution, Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution, Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege, Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution, Vulnerability in Microsoft Office Could Allow Remote Code Execution, Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution, Vulnerability in Microsoft Visio Could Allow Remote Code Execution, and Vulnerability in Windows Common Controls Could Allow Remote Code Execution.



2. Update details

[Critical]
[MS12-052] Cumulative Security Update for Internet Explorer (2722913)

Vulnerability: Layout Memory Corruption Vulnerability - CVE-2012-1526
Asynchronous NULL Object Access Remote Code Execution Vulnerability - CVE-2012-2521
Virtual Function Table Corruption Remote Code Execution Vulnerability - CVE-2012-2522
JavaScript Integer Overflow Remote Code Execution Vulnerability - CVE-2012-2523 


This security update resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Softwares

- Internet Explorer 6 with Windows XP Service Pack 3
- Internet Explorer 6 with Windows XP Professional x64 Edition SP2
- Internet Explorer 6 with Windows Server 2003 SP2
- Internet Explorer 6 with Windows Server 2003 x64 Edition SP2
- Internet Explorer 6 with Windows Server 2003 with SP2 for Itanium-based Systems
- Internet Explorer 7 with Windows XP SP3
- Internet Explorer 7 with Windows XP Professional x64 Edition SP2
- Internet Explorer 7 with Windows Server 2003 SP2
- Internet Explorer 7 with Windows Server 2003 x64 Edition SP2
- Internet Explorer 7 with Windows Server 2003 with SP2 for Itanium-based Systems
- Internet Explorer 7 whit Windows Vista SP2
- Internet Explorer 7 with Windows Vista x64 Edition SP2
- Internet Explorer 7 with Windows Server 2008 for 32-bit Systems SP2
- Internet Explorer 7 with Windows Server 2008 for x64-based Systems SP2
- Internet Explorer 7 with Windows Server 2008 for Itanium-based Systems SP2
- Internet Explorer 8 with Windows XP SP3
- Internet Explorer 8 with Windows XP Professional x64 Edition SP2
- Internet Explorer 8 with Windows Server 2003 SP2
- Internet Explorer 8 with Windows Server 2003 x64 Edition SP2
- Internet Explorer 8 with Windows 7 for 32-bit and Windows 7 for 32-bit SP1
- Internet Explorer 8 with Windows 7 for x64-based and Windows 7 for x64-based SP1
- Internet Explorer 8 whit Windows Vista SP2
- Internet Explorer 8 with Windows Vista x64 Edition SP2
- Internet Explorer 8 with Windows Server 2008 for 32-bit Systems SP2
- Internet Explorer 8 with Windows Server 2008 for 64-bit Systems SP2
- Internet Explorer 8 with Windows 2008 R2 for x64-based Systems SP1
- Internet Explorer 8 with Windows 2008 R2 for Itanium-based Systems SP1
- Internet Explorer 9 with Windows Vista SP2
- Internet Explorer 9 with Windows Vista x64 Edition SP2
- Internet Explorer 9 with Windows Server 2008 for 32-bit SP2
- Internet Explorer 9 with Windows Server 2008 for 64-bit Itanium-based Systems SP2
- Internet Explorer 9 with Windows 7 for 32-bit and Windows 7 for 32-bit SP1
- Internet Explorer 9 with Windows 7 for x64-based and Windows 7 for x64-based SP1
- Internet Explorer 9 with Windows Server 2008 R2 for 64-bit and Windows Server 2008 R2 for 64-bit SP1

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-052



[Critical]
[MS12-053] Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135)

Vulnerability: Remote Desktop Protocol Vulnerability - CVE-2012-2526 


This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.

Affected Softwares

- Windows XP SP3

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-053




[Critical]
[MS12-054] Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
Vulnerability: Remote Administration Protocol Denial of Service Vulnerability - CVE-2012-1850
Print Spooler Service Format String Vulnerability - CVE-2012-1851
Remote Administration Protocol Heap Overflow Vulnerability - CVE-2012-1852
Remote Administration Protocol Stack Overflow Vulnerability - CVE-2012-1853 


This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed.

Affected Softwares

- Windows XP SP3
- Windows XP Professional x64 Edition SP2
- Windows Server 2003 SP2
- Windows Server 2003 x64 Edition SP2
- Windows Server 2003 Itanium-based SP2
- Windows Vista SP2
- Windows Vista x64 Edition SP2
- Windows Server 2008 for 32bit and Windows 2008 for 32bit SP2
- Windows Server 2008 for x64-based and Windows Server 2008 for x64-based SP2
- Windows Server 2008 for Itanium-based and Windows Server 2008 for Itanium SP2
- Windows 7 for 32-bit and Windows 7 for 32bit SP1
- Windows 7 for x64-based and Windows 7 for x64-based SP1
- Windows Server 2008 R2 for x64-based and Windows Server R2 for x64-based SP1
- Windows Server 2008 R2 for Itanium-based and Windows Server 2008 R2 for Itanium SP1

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-054



[Important]
[MS12-055] Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)

Vulnerability: Win32k Use After Free Vulnerability - CVE-2012-2527 


This security update resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Affected Softwares

- Windows XP SP3
- Windows XP Professional x64 Edition SP2
- Windows Server 2003 SP2
- Windows Server 2003 x64 Edition SP2
- Windows Server 2003 Itanium-based SP2
- Windows Vista SP2
- Windows Vista x64 Edition SP2
- Windows Server 2008 for 32bit and Windows 2008 for 32bit SP2
- Windows Server 2008 for x64-based and Windows Server 2008 for x64-based SP2
- Windows Server 2008 for Itanium-based and Windows Server 2008 for Itanium SP2
- Windows 7 for 32-bit and Windows 7 for 32bit SP1
- Windows 7 for x64-based and Windows 7 for x64-based SP1
- Windows Server 2008 R2 for x64-based and Windows Server R2 for x64-based SP1
- Windows Server 2008 R2 for Itanium-based and Windows Server 2008 R2 for Itanium SP1

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-055


[Important]

[MS12-056] Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution (2706045)

Vulnerability: JavaScript Integer Overflow Remote Code Execution Vulnerability - CVE-2012-2523 


This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website.

Affected Softwares

- Windows XP Professional x64 Edition SP2
- Windows Server 2003 x64 Edition SP2
- Windows Vista x64 Edition SP2
- Windows Server 2008 for x64-based Systems SP2
- Windows 7 for x64-based Systems
- Windows 7 for x64-based Systems SP1
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems SP1
- Windows Server 2008 R2 for Itanium-based Systems
- Windows Server 2008 R2 for Itanium-based Systems SP1

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-056


[Important]

[MS12-057] Vulnerability in Microsoft Office Could Allow Remote Code Execution (2731879)

Vulnerability: CGM File Format Memory Corruption Vulnerability - CVE-2012-2524 


This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Softwares

- Microsoft Office 2007 SP2
- Microsoft Office 2007 SP3
- Microsoft Office 2010 SP1 (32bit)
- Microsoft Office 2010 SP1 (64bit)

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-057



[Important]
[MS12-058] Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)

Vulnerability: Oracle Outside In contains multiple exploitable vulnerabilities 


This security update resolves publicly disclosed vulnerabilities in Microsoft Exchange Server WebReady Document Viewing. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network.

Affected Softwares

- Microsoft Exchange Server 2007 SP3
- Microsoft Exchange Server 2010 SP1
- Microsoft Exchange Server 2010 SP2

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-058


[Important]

[MS12-059] Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2733918)

Vulnerability: Visio DXF File Format Buffer Overflow Vulnerability - CVE-2012-1888 


This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Softwares

- Microsoft Visio 2010 SP1(32bit)
- Microsoft Visio 2010 SP1(64bit)
- Microsoft Visio Viewer 2010 SP1(32bit)
- Microsoft Visio Viewer 2010 SP1(64bit)

- Reference site

http://technet.microsoft.com/en-us/security/bulletin/MS12-059


[Important]

[MS12-060] Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)

Vulnerability: MSCOMCTL.OCX RCE Vulnerability - CVE-2012-1856 


This security update resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability.

Affected Softwares

- Microsoft Office 2003 SP3
- Microsoft Office 2003 Web Components SP3
- Microsoft Office 2007 SP2
- Microsoft Office 2007 SP3
- Microsoft Office 2010 SP1 (32bit)
- Microsoft SQL Server 2000 SP4
- Microsoft SQL Server 2000 Analysis Services SP4
- Microsoft SQL Server 2005 Express Edition with Advanced Services SP4
- Microsoft SQL Server 2005(32bit) SP4
- Microsoft SQL Server 2005 for x64-based Systems SP4
- Microsoft SQL Server 2005 for Itanium-based Systems SP4
- Microsoft SQL Server 2008 for 32-bit Systems SP2
- Microsoft SQL Server 2008 for 32-bit Systems SP3
- Microsoft SQL Server 2008 for x64-based Systems SP2
- Microsoft SQL Server 2008 for x64-based Systems SP3
- Microsoft SQL Server 2008 for Itanium-based Systems SP2
- Microsoft SQL Server 2008 for Itanium-based Systems SP3
- Microsoft SQL Server 2008 R2 for 32-bit Systems
- Microsoft SQL Server 2008 R2 for 32-bit Systems SP1
- Microsoft SQL Server 2008 R2 for 32-bit Systems SP2
- Microsoft SQL Server 2008 R2 for x64-based Systems
- Microsoft SQL Server 2008 R2 for x64-based Systems SP1
- Microsoft SQL Server 2008 R2 for x64-based Systems SP2
- Microsoft SQL Server 2008 R2 for Itanium-based Systems
- Microsoft SQL Server 2008 R2 for Itanium-based Systems SP1
- Microsoft SQL Server 2008 R2 for Itanium-based Systems SP2
- Microsoft Commerce Server 2002 SP4
- Microsoft Commerce Server 2007 SP2
- Microsoft Commerce Server 2009
- Microsoft Commerce Server 2009 R2
- Microsoft Host Integration Server 2004 SP1
- Microsoft Visual FoxPro 8.0 SP1
- Microsoft Visual FoxPro 9.0 SP2
- Visual Basic 6.0 Runtime

No comments:

Post a Comment