Trend Analysis
Transcription
Trend Analysis
SAINTwriter Assessment Report Report Generated: March 20, 2013 1.0 Introduction On March 20, 2013, at 10:38 AM, a heavy vulnerability assessment was conducted using the SAINT 7.15.7 vulnerability scanner. The scan discovered a total of two live hosts, and detected 18 critical problems, 195 areas of concern, and 48 potential problems. The hosts and problems detected are discussed in greater detail in the following sections. 2.0 Summary The following vulnerability severity levels are used to categorize the vulnerabilities: CRITICAL PROBLEMS Vulnerabilities which pose an immediate threat to the network by allowing a remote attacker to directly gain read or write access, execute commands on the target, or create a denial of service. AREAS OF CONCERN Vulnerabilities which do not directly allow remote access, but do allow privilege elevation attacks, attacks on other targets using the vulnerable host as an intermediary, or gathering of passwords or configuration information which could be used to plan an attack. POTENTIAL PROBLEMS Warnings which may or may not be vulnerabilities, depending upon the patch level or configuration of the target. Further investigation on the part of the system administrator may be necessary. SERVICES Network services which accept client connections on a given TCP or UDP port. This is simply a count of network services, and does not imply that the service is or is not vulnerable. The following host and vulnerability status categories are used to categorize the hosts and vulnerabilities across data sets for trend analysis: NEW Present in the current scan but none of the previous scans. REMOVED Present in a previous scan but not the current scan. PREEXISTING (or REMAINING) Present in the current scan and also the preceding scan. REINTRODUCED Present in the current scan and a previous scan, but not the scan preceding the current scan. 1 The sections below summarize the results of the scan. 2.1 Status of Current Vulnerabilities Includes critical problems, areas of concern, and potential problems. 2.2 Status of Old Vulnerabilities Includes critical problems, areas of concern, and potential problems. 2.3 Status of All Vulnerabilities Includes critical problems, areas of concern, and potential problems. 2 2.4 Vulnerability Status by Severity 2.5 Vulnerability History 3 2.6 Host History 4 hosts detected Mar 19 2013 Mar 20 2013 2 2 hosts with critical problems 2 2 hosts with areas of concern 0 0 hosts with potential problems 0 0 hosts with services only 0 0 hosts with no services 0 0 2.7 History of Vulnerabilities by Class This section shows the number of vulnerabilities detected per scan in each of the following classes. Class Web Mail File Transfer Login/Shell Print Services RPC DNS Databases Networking/SNMP Windows OS Passwords Other Description Vulnerabilities in web servers, CGI programs, and any other software offering an HTTP interface Vulnerabilities in SMTP, IMAP, POP, or web-based mail services Vulnerabilities in FTP and TFTP services Vulnerabilities in ssh, telnet, rlogin, rsh, or rexec services Vulnerabilities in lpd and other print daemons Vulnerabilities in Remote Procedure Call services Vulnerabilities in Domain Name Services Vulnerabilities in database services Vulnerabilities in routers, switches, firewalls, or any SNMP service Missing hotfixes or vulnerabilities in the registry or SMB shares Missing or easily guessed user passwords Any vulnerability which does not fit into one of the above classes Mar 19 2013 Mar 20 2013 5 3.0 Overview The following tables present an overview of the hosts discovered on the network and the vulnerabilities contained therein. 3.1 Host List This table presents an overview of the hosts discovered on the network. Host Name Netbios Name win2003unpatch.sainttest.l WIN2003UNP ocal ATCH mandrake32 IP Address 10.7.0.11 10.7.0.153 Host Type Windows Server 2003 SP2 Linux 2.4.22-10mdksmp - Mandriva 9.2 Critical Problems 11 7 Areas of Concern 187 Potential Problems 32 8 16 Status preexisting preexisting 3.2 Vulnerability List This table presents an overview of the vulnerabilities detected on the network. Host Name Severity Vulnerability / Service Status CVE win2003unpatch.sainttest.local critical preexisting win2003unpatch.sainttest.local critical Microsoft IIS ASP Remote Code Execution vulnerability Microsoft Remote Desktop Protocol Denial of Service Vulnerability (MS11-065) preexisting 6 Exploit Available? CVE-2008-0075 Max. CVSSv2 Base Score 10.0 CVE-2011-1968 7.1 no no win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local critical win2003unpatch.sainttest.local concern Microsoft Windows TCP/IP remote code execution vulnerability (MS09-048) Multiple buffer overflows in SMB preexisting CVE-2006-2379 CVE-2008-4609 CVE-2009-1926 9.3 no preexisting 10.0 no SSL and TLS Protocols Vulnerable Implementation (MS12-006) Windows RPC authentication denial of service Windows SMB Server Transaction Vulnerability Windows Server Service MS08-067 buffer overflow Windows networking components remote code execution (MS12-054) Windows print spooler remote code execution vulnerability (MS12-054) preexisting CVE-2008-4114 CVE-2008-4834 CVE-2008-4835 CVE-2011-3389 4.3 no preexisting CVE-2007-2228 7.8 no preexisting CVE-2011-0661 10.0 no preexisting CVE-2008-4250 10.0 yes preexisting CVE-2012-1850 5.0 no preexisting CVE-2012-1851 10.0 no vulnerable version of SMB Server (MS10-012) dated 2007-2-17 IIS file update notification privilege elevation preexisting CVE-2010-0020 CVE-2010-0021 CVE-2010-0022 CVE-2010-0231 CVE-2008-0074 10.0 no 7.2 no preexisting 7 win2003unpatch.sainttest.local concern Internet Explorer 6 vulnerable version, mshtml.dll dated 2007-2-17 preexisting 8 CVE-2007-0218 CVE-2007-0942 CVE-2007-0944 CVE-2007-0945 CVE-2007-1091 CVE-2007-1750 CVE-2007-1751 CVE-2007-2216 CVE-2007-2221 CVE-2007-2222 CVE-2007-3027 CVE-2007-3041 CVE-2007-3091 CVE-2007-3826 CVE-2007-3892 CVE-2007-3893 CVE-2007-3902 CVE-2007-3903 CVE-2007-4790 CVE-2007-5158 CVE-2007-5344 CVE-2007-5347 CVE-2008-0076 CVE-2008-0077 CVE-2008-0078 CVE-2008-1085 CVE-2008-1442 CVE-2008-1544 CVE-2008-2254 CVE-2008-2255 CVE-2008-2256 CVE-2008-2257 CVE-2008-2258 CVE-2008-2259 CVE-2008-2947 CVE-2008-3472 CVE-2008-3473 CVE-2008-3474 CVE-2008-3475 CVE-2008-3476 CVE-2008-4261 CVE-2008-4844 CVE-2009-0550 CVE-2009-0551 CVE-2009-0552 CVE-2009-0553 CVE-2009-0554 CVE-2009-1140 CVE-2009-1141 CVE-2009-1528 CVE-2009-1547 CVE-2009-1917 CVE-2009-1918 CVE-2009-1919 CVE-2009-2493 CVE-2009-2529 CVE-2009-2530 CVE-2009-2531 CVE-2009-3672 CVE-2010-0244 CVE-2010-0247 CVE-2010-0248 CVE-2010-0249 CVE-2010-0255 CVE-2010-0267 CVE-2010-0488 CVE-2010-0489 CVE-2010-0490 CVE-2010-0491 CVE-2010-0494 CVE-2010-0805 CVE-2010-0806 CVE-2010-0808 CVE-2010-1258 CVE-2010-1259 CVE-2010-1262 CVE-2010-2556 CVE-2010-2557 CVE-2010-2558 CVE-2010-2560 CVE-2010-3325 CVE-2010-3326 CVE-2010-3327 CVE-2010-3328 CVE-2010-3330 CVE-2010-3331 CVE-2010-3340 CVE-2010-3342 CVE-2010-3343 CVE-2010-3346 CVE-2010-3348 CVE-2010-3962 CVE-2010-3971 CVE-2011-0035 CVE-2011-0036 CVE-2011-0094 CVE-2011-0346 CVE-2011-1244 CVE-2011-1245 CVE-2011-1250 CVE-2011-1254 CVE-2011-1255 CVE-2011-1256 CVE-2011-1257 CVE-2011-1258 CVE-2011-1261 CVE-2011-1345 CVE-2011-1960 CVE-2011-1961 CVE-2011-1962 CVE-2011-1964 CVE-2011-1993 CVE-2011-1995 CVE-2011-1996 CVE-2011-1997 CVE-2011-2000 CVE-2011-2001 CVE-2011-2383 CVE-2011-3404 CVE-2012-0010 CVE-2012-0168 CVE-2012-0170 CVE-2012-0171 CVE-2012-0172 CVE-2012-1523 CVE-2012-1526 9 CVE-2012-1872 CVE-2012-1876 CVE-2012-1877 CVE-2012-1878 CVE-2012-1879 CVE-2012-1880 CVE-2012-1882 CVE-2012-2521 CVE-2012-2522 CVE-2012-4781 CVE-2012-4792 CVE-2012-4969 CVE-2013-0087 CVE-2013-0088 CVE-2013-0089 CVE-2013-0090 CVE-2013-0092 CVE-2013-0093 CVE-2013-0094 10.0 yes 9.3 no 9.3 no win2003unpatch.sainttest.local concern Internet Explorer 6 vulnerable version, mshtmled.dll dated 2007-2-17 preexisting win2003unpatch.sainttest.local concern preexisting win2003unpatch.sainttest.local concern Internet Explorer VBScript and JScript decoding vulnerability Internet Explorer VBScript and JScript memory reallocation vulnerability (MS11-031) CVE-2013-0015 CVE-2013-0018 CVE-2013-0021 CVE-2013-0027 CVE-2013-0028 CVE-2013-0029 CVE-2008-0083 preexisting CVE-2011-0663 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2007-1749 CVE-2011-1266 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2009-1920 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2013-0030 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2007-0675 7.6 no win2003unpatch.sainttest.local concern preexisting CVE-2007-5587 6.9 no win2003unpatch.sainttest.local concern preexisting CVE-2011-1978 4.3 no win2003unpatch.sainttest.local concern preexisting CVE-2010-3958 9.3 no win2003unpatch.sainttest.local concern Internet Explorer vulnerable VML version dated 2007-2-17 Jscript.dll buffer overflow vulnerability Microsoft Vector Markup Language Remote Code Execution Vulnerability (MS13-010) sapi.dll ActiveX vulnerability Macrovision SafeDisc driver local privilege elevation Information disclosure vulnerability in .NET Framework MS11-028 Vulnerability in .NET Framework Could Allow Remote Code Execution MS11-039 Vulnerability in .NET Framework Could Allow Remote Code Execution preexisting CVE-2011-0664 9.3 no 10 win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern MS11-044 Vulnerability in .NET Framework Could Allow Remote Code Execution MS11-078 Vulnerability in .NET Framework Could Allow Remote Code Execution Microsoft .NET CLR virtual method delegate vulnerability Microsoft .NET Common Language Runtime Could Allow Remote Code Execution Microsoft .NET Framework 1.1 privilege elevation vulnerabilities (MS13-004) Microsoft .NET Framework 1.1 remote code execution vulnerability (MS12-074) preexisting CVE-2011-1271 5.1 no preexisting CVE-2011-1253 9.3 no preexisting CVE-2010-1898 9.3 no preexisting CVE-2009-0090 CVE-2009-0091 CVE-2009-2497 9.3 no preexisting CVE-2013-0001 CVE-2013-0002 CVE-2013-0004 9.3 no preexisting CVE-2012-1895 CVE-2012-2519 9.3 no Microsoft .NET Framework 1.1 serialization vulnerabilities (MS12-035) Microsoft .NET Framework 2.0 remote code execution vulnerability (MS12-074) preexisting CVE-2012-0160 CVE-2012-0161 9.3 no preexisting CVE-2012-1895 CVE-2012-1896 CVE-2012-2519 CVE-2012-4776 9.3 no Microsoft .NET Framework 2.0 serialization vulnerabilities (MS12-035) Microsoft .NET Framework Could Allow Tampering Microsoft .NET Framework Parameter Validation Vulnerability (MS12-025) Microsoft .NET Framework WinForms Callback Elevation vulnerability (MS13-015) preexisting CVE-2012-0160 CVE-2012-0161 9.3 no preexisting CVE-2009-0217 5.0 no preexisting CVE-2012-0163 9.3 no preexisting CVE-2013-0073 10.0 no Microsoft .NET Framework privilege elevation vulnerabilities (MS13-004) Microsoft .NET Framework remote code execution vulnerability (MS12-038) preexisting CVE-2013-0001 CVE-2013-0002 CVE-2013-0003 CVE-2013-0004 CVE-2012-1855 9.3 no 9.3 yes 11 preexisting win2003unpatch.sainttest.local concern Microsoft .NET Framework unmanaged objects vulnerability (MS12-016) vulnerabilities in .NET Framework (MS11-100) preexisting CVE-2012-0014 CVE-2012-0015 9.3 no win2003unpatch.sainttest.local concern preexisting 9.3 no concern Microsoft outlook ATL vulnerability (MS09-037) preexisting 10.0 yes win2003unpatch.sainttest.local concern preexisting 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2008-1448 7.1 no win2003unpatch.sainttest.local concern preexisting 5.8 no win2003unpatch.sainttest.local concern preexisting 5.8 no win2003unpatch.sainttest.local concern preexisting 5.8 no win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Outlook Express Could Allow Remote Code Execution (MS10-030) Windows MHTML protocol handler vulnerability fraudulent Comodo certificates not in disallowed store fraudulent DigiNotar certificates not in disallowed store fraudulent Enforced Licensing certificates not in disallowed store Telnet Authentication Reflection Insecure Library Loading in Outlook Express WAB.EXE Could Allow Remote Code Execution Outlook Express vulnerable version, inetcomm.dll dated 2007-2-17 Elevation of Privilege Vulnerabilities in Windows Kerberos (MS11-013) Ancillary Function Driver Vulnerability (MS11-046) Ancillary Function Driver Vulnerability (MS11-080) Blended threat privilege elevation vulnerability DirectX MJPEG decompression remote code execution vulnerability DirectX SAMI-MJPEG parsing remote code execution for DirectX 9.0c CVE-2011-3414 CVE-2011-3415 CVE-2011-3416 CVE-2011-3417 CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-0816 win2003unpatch.sainttest.local 12 preexisting CVE-2009-1930 10.0 yes preexisting CVE-2010-3147 9.3 no preexisting 9.3 no preexisting CVE-2006-2111 CVE-2007-2225 CVE-2007-2227 CVE-2007-3897 CVE-2011-0043 7.2 no preexisting CVE-2011-1249 7.2 no preexisting CVE-2011-2005 7.2 no preexisting CVE-2008-2540 9.3 no preexisting CVE-2009-0084 9.3 no preexisting CVE-2008-0011 9.3 no win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern DirectX parsing remote code execution for DirectX 9.0c Elevation of Privilege Vulnerabilities in Windows (MS09-012) Elevation of Privilege Vulnerabilities in Windows (MS10-015) Elevation of Privilege Vulnerabilities in Windows (MS11-062) Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution Kernel-Mode Drivers vulnerabilities preexisting CVE-2007-3895 9.3 no preexisting CVE-2008-1436 CVE-2009-0078 CVE-2009-0079 CVE-2010-0232 CVE-2010-0233 9.0 no 7.2 no preexisting CVE-2011-1974 7.2 no preexisting CVE-2010-3144 9.3 no preexisting 7.2 no MDAC ADO cachesize heap overflow (MS12-045) MHTML Mime-formatted information disclosure MPEG 4 codec remote code execution vulnerability (MS10-062) preexisting CVE-2011-0086 CVE-2011-0087 CVE-2011-0088 CVE-2011-0089 CVE-2011-0090 CVE-2012-1891 9.3 no preexisting CVE-2011-1894 4.3 no preexisting CVE-2010-0818 9.3 no MS Windows DirectPlay Heap Overflow Vulnerabilities (MS12-082) MS Windows Kernel-Mode Drivers Elevation of Privilege vulnerabilities (MS12-041) MS Windows Kernel-Mode Drivers Elevation of Privilege vulnerabilities (MS12-047) preexisting CVE-2012-1537 9.3 no preexisting CVE-2012-1864 CVE-2012-1865 CVE-2012-1866 CVE-2012-1867 7.2 no preexisting CVE-2012-1890 CVE-2012-1893 7.2 no 13 preexisting win2003unpatch.sainttest.local concern MS Windows Kernel-Mode Drivers Elevation of Privilege vulnerabilities (MS13-016) preexisting win2003unpatch.sainttest.local concern MS Windows Kernel-Mode Drivers Elevation of Privilege vulnerability (MS12-055) preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern MS Windows Kernel-Mode Drivers Font Parsing Vulnerabilities (MS12-078) MS Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (MS12-008) MS Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (MS12-018) MS Windows Kernel-Mode Drivers Remote Code Execution vulnerabilities (MS12-075) 14 CVE-2013-1248 CVE-2013-1249 CVE-2013-1250 CVE-2013-1251 CVE-2013-1252 CVE-2013-1253 CVE-2013-1254 CVE-2013-1255 CVE-2013-1256 CVE-2013-1257 CVE-2013-1258 CVE-2013-1259 CVE-2013-1260 CVE-2013-1261 CVE-2013-1262 CVE-2013-1263 CVE-2013-1264 CVE-2013-1265 CVE-2013-1266 CVE-2013-1267 CVE-2013-1268 CVE-2013-1269 CVE-2013-1270 CVE-2013-1271 CVE-2013-1272 CVE-2013-1273 CVE-2013-1274 CVE-2013-1275 CVE-2013-1276 CVE-2013-1277 CVE-2012-2527 4.9 no 7.2 no preexisting CVE-2012-2556 CVE-2012-4786 10.0 no preexisting CVE-2011-5046 CVE-2012-0154 9.3 no preexisting CVE-2012-0157 7.2 no preexisting CVE-2012-2530 CVE-2012-2553 CVE-2012-2897 10.0 no win2003unpatch.sainttest.local concern MS11-034 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege preexisting win2003unpatch.sainttest.local concern preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern MS11-077 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution MS11-087 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution MS12-001 Vulnerability in Windows Kernel Could Allow Security Feature Bypass MS12-009 Vulnerabilities in Ancillary Function Driver Could Allow Elevation of Privilege Microsoft AFD Kernel Overwrite vulnerability Microsoft Active Accessibility Insecure Library Loading Vulnerability (MS11-075) win2003unpatch.sainttest.local concern Microsoft Agent URL parsing vulnerability 15 CVE-2011-0662 CVE-2011-0665 CVE-2011-0666 CVE-2011-0667 CVE-2011-0670 CVE-2011-0671 CVE-2011-0672 CVE-2011-0674 CVE-2011-0675 CVE-2011-0676 CVE-2011-0677 CVE-2011-1225 CVE-2011-1226 CVE-2011-1227 CVE-2011-1228 CVE-2011-1229 CVE-2011-1230 CVE-2011-1231 CVE-2011-1232 CVE-2011-1233 CVE-2011-1234 CVE-2011-1235 CVE-2011-1236 CVE-2011-1237 CVE-2011-1238 CVE-2011-1239 CVE-2011-1240 CVE-2011-1241 CVE-2011-1242 CVE-2011-1985 CVE-2011-2003 CVE-2011-2011 7.2 no 9.3 no preexisting CVE-2011-3402 9.3 no preexisting CVE-2012-0001 9.3 no preexisting CVE-2012-0148 CVE-2012-0149 7.2 no preexisting CVE-2008-3464 7.2 no preexisting CVE-2011-1247 9.3 no preexisting CVE-2007-1205 9.3 no win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Microsoft Data Access Component remote code execution (MS11-002) Microsoft DirectShow Quartz AVI buffer overflow Microsoft DirectShow QuickTime Movie Parsing Code Execution Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow Microsoft Image Color Management System vulnerable version, mscms.dll dated 2007-2-17 Microsoft Office ClickOnce Vulnerability (MS12-005) Microsoft Paint Integer Overflow vulnerability Microsoft Video ActiveX Control Stack Buffer Overflow Microsoft Windows DHTML remote code execution vulnerability (MS09-046) Microsoft Windows OpenType CFF vulnerability (MS11-032) preexisting CVE-2011-0026 CVE-2011-0027 9.3 no preexisting CVE-2010-0250 9.3 no preexisting CVE-2009-1537 CVE-2009-1538 CVE-2009-1539 9.3 yes preexisting CVE-2010-3970 9.3 yes preexisting CVE-2008-2245 9.3 no preexisting CVE-2012-0013 9.3 yes preexisting CVE-2010-0028 9.3 no preexisting CVE-2008-0015 9.3 yes preexisting CVE-2009-2519 9.3 no preexisting CVE-2011-0034 9.3 no Microsoft Windows OpenType Compact Font Format driver Remote Code Execution Vulnerability Microsoft Windows Shell remote code execution vulnerability, shell32.dll dated 2007-2-17 Microsoft Windows vulnerable version, msconv97.dll dated 2006-3-22 Microsoft XML Core Services vulnerable version dated 2007-2-17 preexisting CVE-2011-0033 9.3 no preexisting CVE-2010-2568 CVE-2012-0175 9.3 yes preexisting CVE-2009-2506 9.3 no preexisting CVE-2007-0099 CVE-2007-2223 CVE-2008-4029 CVE-2008-4033 CVE-2010-2561 CVE-2012-1889 CVE-2013-0006 CVE-2013-0007 9.3 yes 16 win2003unpatch.sainttest.local concern Multiple GDI vulnerabilities fixed by MS07-017 preexisting win2003unpatch.sainttest.local concern preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Object Linking and Embedding Vulnerability (MS11-093) OpenType Font format driver remote code execution Over-the-network SMB packet vulnerabilities in Windows system (MS10-054) Shell32.dll Windows URI handling Remote Code Execution Uniscribe Font Parsing Engine Memory Corruption (MS10-063) Vulnerabilities in SChannel could allow Remote Code Execution Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (MS11-054) win2003unpatch.sainttest.local concern preexisting win2003unpatch.sainttest.local concern Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (MS13-027) Vulnerability in TLS Could Disclose Information (MS12-049) win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Vulnerability in the OpenType Compact Font Format Driver Could Allow Elevation of Privilege Vulnerable ActiveX Control enabled (MS11-090) Win32 API parameter validation vulnerability 17 CVE-2006-5586 CVE-2006-5758 CVE-2007-0038 CVE-2007-1211 CVE-2007-1212 CVE-2007-1213 CVE-2007-1215 CVE-2011-3400 9.3 yes 9.3 yes CVE-2010-3956 CVE-2010-3957 CVE-2010-3959 CVE-2010-2550 CVE-2010-2551 CVE-2010-2552 9.3 no 10.0 no preexisting CVE-2007-3896 9.3 yes preexisting CVE-2010-2738 9.3 no preexisting CVE-2009-3555 CVE-2010-2566 9.3 no preexisting CVE-2011-1874 CVE-2011-1875 CVE-2011-1876 CVE-2011-1877 CVE-2011-1878 CVE-2011-1879 CVE-2011-1880 CVE-2011-1881 CVE-2011-1882 CVE-2011-1883 CVE-2011-1884 CVE-2011-1885 CVE-2011-1886 CVE-2011-1887 CVE-2011-1888 CVE-2013-1285 CVE-2013-1286 CVE-2013-1287 7.2 no 7.2 no preexisting CVE-2012-1870 4.3 no preexisting CVE-2010-0819 CVE-2010-2740 CVE-2010-2741 7.2 no preexisting CVE-2011-3397 9.3 no preexisting CVE-2007-2219 9.3 no preexisting preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Windows 2003 GDI vulnerable version, gdi32.dll dated 2007-2-17 Windows ASN1 spoofing vulnerability Windows Authenticode Signature Verification (MS10-019) version, wintrust.dll dated 2007-2-17 Windows Authenticode Signature Verification (MS12-024) Windows Briefcase remote code execution vulnerabilities (MS12-072), synceng.dll dated 2007-2-17 preexisting 9.3 yes 7.5 no preexisting CVE-2008-1083 CVE-2008-1087 CVE-2008-2249 CVE-2008-3465 CVE-2009-2510 CVE-2009-2511 CVE-2010-0486 9.3 no preexisting CVE-2012-0151 9.3 no preexisting CVE-2012-1527 CVE-2012-1528 9.3 no Windows CSRSS (MS11-010) vulnerable version, csrsrv.dll dated 2007-2-17 Windows CSRSS (MS11-056) vulnerable version, winsrv.dll dated 2007-2-17 preexisting CVE-2011-0030 4.7 no preexisting 7.2 no Windows CSRSS (MS11-063) vulnerable version, winsrv.dll dated 2007-2-17 Windows CSRSS (MS11-097) vulnerable version, csrsrv.dll dated 2007-2-17 Windows CSRSS (MS12-003) vulnerable version Windows CSRSS Local (MS10-011) vulnerable version, csrsrv.dll dated 2007-2-17 Windows CSRSS remote code execution Windows Cabinet File Viewer (MS10-019) version, cabview.dll dated 2007-2-17 Windows Client Server Runtime Subsystem Could Allow Elevation of Privilege Windows DNS Client Spoofing vulnerability (MS08-037) Windows DNS Resolution Vulnerability preexisting CVE-2011-1281 CVE-2011-1282 CVE-2011-1283 CVE-2011-1284 CVE-2011-1870 CVE-2011-1967 7.2 no preexisting CVE-2011-3408 7.2 no preexisting CVE-2012-0005 6.9 no preexisting CVE-2010-0023 6.9 no preexisting 6.9 no preexisting CVE-2006-6696 CVE-2006-6797 CVE-2010-0487 9.3 no preexisting CVE-2010-1891 6.9 no preexisting CVE-2008-1447 6.4 no preexisting CVE-2011-0657 7.5 no 18 preexisting win2003unpatch.sainttest.local concern Windows DNS Spoofing vulnerability Windows DirectShow AVI Filter buffer overflow Windows DirectShow Media Decompression vulnerability (MS13-011) preexisting CVE-2008-0087 8.8 no win2003unpatch.sainttest.local concern preexisting CVE-2010-0250 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2013-0077 9.3 no win2003unpatch.sainttest.local concern Windows DirectShow media file parsing vulnerability (MS12-004) preexisting CVE-2012-0004 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2009-0231 CVE-2009-0232 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2010-3974 CVE-2010-4701 7.6 yes win2003unpatch.sainttest.local concern preexisting CVE-2010-1885 9.3 yes win2003unpatch.sainttest.local concern preexisting CVE-2011-1991 9.3 no win2003unpatch.sainttest.local concern Windows Embedded OpenType Font Engine vulnerabilities Windows Fax Cover Page Remote Code Execution Vulnerability (MS11-024) Windows Help and Support Center trusted document whitelist bypass (MS10-042) Windows IME vulnerable to library injection (MS11-071) Windows ISATAP Component spoofing vulnerability (MS10-029) preexisting CVE-2010-0812 6.4 no win2003unpatch.sainttest.local concern preexisting CVE-2009-3677 10.0 no win2003unpatch.sainttest.local concern preexisting CVE-2007-1206 7.2 no win2003unpatch.sainttest.local concern preexisting CVE-2012-0180 CVE-2012-1848 7.2 no win2003unpatch.sainttest.local concern Windows Internet Authentication Service vulnerabilities Windows Kernel privilege elevation (ms07-022) vulnerability Windows Kernel-Mode Drivers vulnerability (MS12-034) Windows LPC Elevation of Privilege vulnerability (MS10-084) preexisting CVE-2010-3222 7.2 no win2003unpatch.sainttest.local concern preexisting CVE-2009-3675 6.8 no win2003unpatch.sainttest.local concern preexisting CVE-2011-0039 7.2 no win2003unpatch.sainttest.local concern preexisting CVE-2007-5352 7.2 no win2003unpatch.sainttest.local concern Windows LSASS IPSEC Denial-of-Service Vulnerability Windows LSASS length validation vulnerability Windows LSASS vulnerability Windows MHTML script injection vulnerability (MS11-026) preexisting CVE-2011-0096 4.3 no 19 win2003unpatch.sainttest.local concern Windows MPEG Layer-3 Audio Decoder vulnerable version, l3codecx.ax dated 2006-3-22 Windows MPEG layer 3 codec vulnerable version, l3codecx.ax dated 2006-3-22 Windows Media Format ASF file parsing vulnerability Windows Media Player ASX Playlist Parsing Buffer Overflow Windows Media Player Memory Corruption Vulnerability (MS10-082) preexisting CVE-2010-1882 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2010-0480 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2007-0064 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2006-4702 CVE-2006-6134 7.5 no win2003unpatch.sainttest.local concern preexisting CVE-2010-2745 9.3 no win2003unpatch.sainttest.local concern Windows Media Player Skin parsing and decompression remote code execution Windows Media decompression vulnerabilities Windows Multimedia Library MIDI vulnerability (MS12-004) preexisting CVE-2007-3035 CVE-2007-3037 7.6 no win2003unpatch.sainttest.local concern preexisting CVE-2010-1879 CVE-2010-1880 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2012-0003 9.3 yes win2003unpatch.sainttest.local concern Windows OLE Automation Underflow vulnerability (MS11-038) preexisting CVE-2011-0658 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2007-0065 CVE-2007-2224 CVE-2013-1313 10.0 no win2003unpatch.sainttest.local concern Windows OLE Automation remote code execution vulnerability, oleaut32.dll dated 2007-2-17 Windows Object Packager Insecure Executable Launching Vulnerability (MS12-002) preexisting CVE-2012-0009 9.3 yes win2003unpatch.sainttest.local concern Windows RDP Remote Code Execution Vulnerability (MS12-036) preexisting CVE-2012-0173 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2009-0568 10.0 no win2003unpatch.sainttest.local concern preexisting CVE-2010-2567 9.3 no win2003unpatch.sainttest.local concern preexisting CVE-2009-1133 CVE-2009-1929 9.3 no win2003unpatch.sainttest.local concern Windows RPC Marshalling Engine vulnerability Windows RPC Memory Corruption vulnerability Windows Remote Desktop Connection vulnerabilities Windows SMB Client vulnerabilities (MS10-006) preexisting CVE-2010-0016 9.3 no 20 win2003unpatch.sainttest.local concern Windows SMB Client vulnerabilities (MS10-020) preexisting win2003unpatch.sainttest.local concern preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Windows SMB Client vulnerabilities (MS11-019) Windows SMB Client vulnerabilities (MS11-043) Windows SMB Remote Code Execution Windows SMB credential reflection vulnerability Windows Schannel digital signature parsing vulnerability Windows Schannel spoofing vulnerability Windows Shell Handler vulnerability Windows VB script vulnerable version, vbscript.dll dated 2007-2-17 Windows Virtual Address Descriptor integer overflow Windows WMA Voice codec vulnerability Windows WordPad Converter (MS11-033) vulnerable version, mswrd8.wpc dated 2007-2-17 Windows atl.dll vulnerable (MS09-037) win2003unpatch.sainttest.local concern Windows dhtmled.ocx vulnerable (MS09-037) preexisting win2003unpatch.sainttest.local concern preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern Windows event system subscription request and pointer array vulnerabilities Windows filename parsing vulnerability (MS12-081) Windows kernel GDI validation vulnerabilities 21 CVE-2009-3676 CVE-2010-0269 CVE-2010-0270 CVE-2010-0476 CVE-2010-0477 CVE-2011-0654 CVE-2011-0660 10.0 no 10.0 no preexisting CVE-2011-1268 10.0 no preexisting CVE-2008-4038 10.0 no preexisting CVE-2008-4037 9.3 yes preexisting CVE-2007-2218 9.3 no preexisting CVE-2009-0085 7.1 no preexisting CVE-2010-0027 9.3 no preexisting CVE-2010-0483 CVE-2011-0031 7.6 no preexisting CVE-2008-4036 7.2 no preexisting CVE-2009-0555 CVE-2009-2525 CVE-2011-0028 9.3 no 9.3 no CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2008-1456 CVE-2008-1457 10.0 yes 10.0 yes 9.0 no preexisting CVE-2012-4774 9.3 no preexisting CVE-2009-0081 CVE-2009-0082 CVE-2009-0083 9.3 no preexisting preexisting win2003unpatch.sainttest.local concern Windows kernel NDProxy privilege elevation vulnerability (MS10-099) Windows kernel desktop validation vulnerabilities preexisting CVE-2010-3963 7.2 no win2003unpatch.sainttest.local concern preexisting 7.2 no Windows kernel embedded font vulnerabilities Windows kernel exception handler vulnerability (MS11-098), ntoskrnl.exe dated 2007-2-17 preexisting 9.3 no preexisting CVE-2009-1123 CVE-2009-1124 CVE-2009-1125 CVE-2009-1126 CVE-2009-1127 CVE-2009-2513 CVE-2009-2514 CVE-2011-2018 win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern 7.2 no win2003unpatch.sainttest.local concern Windows kernel integer overflow (MS12-068) Windows kernel integer overflow (MS13-017) preexisting CVE-2012-2529 7.2 no win2003unpatch.sainttest.local concern preexisting 7.2 no concern Windows kernel multiple privilege elevation vulnerabilities (MS10-048) preexisting 7.2 no win2003unpatch.sainttest.local concern preexisting 7.2 no win2003unpatch.sainttest.local concern Windows kernel multiple privilege elevation vulnerabilities (MS10-073) Windows kernel multiple privilege elevation vulnerabilities (MS10-098) CVE-2013-1278 CVE-2013-1279 CVE-2013-1280 CVE-2010-1887 CVE-2010-1894 CVE-2010-1895 CVE-2010-1896 CVE-2010-1897 CVE-2010-2743 CVE-2010-2744 win2003unpatch.sainttest.local 7.2 no win2003unpatch.sainttest.local concern preexisting 7.2 no win2003unpatch.sainttest.local concern preexisting 7.2 no win2003unpatch.sainttest.local concern Windows kernel property validation vulnerabilities Windows kernel user mode callback vulnerability Windows kernel vulnerabilities (MS12-042), ntoskrnl.exe dated 2007-2-17 CVE-2010-3939 CVE-2010-3940 CVE-2010-3941 CVE-2010-3942 CVE-2010-3943 CVE-2008-2250 CVE-2008-2251 CVE-2008-2252 CVE-2008-1084 preexisting CVE-2012-1515 8.3 no win2003unpatch.sainttest.local concern Windows kernel vulnerable (MS10-021) version, ntoskrnl.exe dated 2007-2-17 preexisting 7.2 no win2003unpatch.sainttest.local concern Windows kernel vulnerable (MS11-011) version, ntoskrnl.exe dated 2007-2-17 preexisting CVE-2010-0234 CVE-2010-0235 CVE-2010-0236 CVE-2010-0237 CVE-2010-0238 CVE-2010-0481 CVE-2010-0482 CVE-2010-0810 CVE-2010-4398 7.2 no 22 preexisting win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local concern win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential Windows kernel vulnerable version, ntoskrnl.exe dated 2007-2-17 Windows media file processing vulnerable (MS09-038) Windows print spooler vulnerabilities Word 97 Converter vulnerable version, mswrd8.wpc dated 2007-2-17 WordPad Word 97 Text Converter (MS10-067) version, mswrd8.wpc dated 2007-2-17 Wordpad COM validation (MS10-083) version, ole32.dll dated 2007-2-17 Workstation Service Elevation of Privilege comctl32.dll remote code execution vulnerability (MS10-081) mfc40.dll remote code execution vulnerability (MS10-074) t2embed.dll remote code execution vulnerability (MS10-076) AV Information: AntiVirus software not found (AVG F-Secure Forefront McAfee Symantec TrendMicro) Microsoft IIS ASP repeated parameter request denial of service Microsoft IIS Authentication Method Disclosed ICMP timestamp requests enabled ICMP redirects are allowed Internet Explorer Shell.Explorer object enabled last user name shown in login box SMB digital signing is disabled password complexity policy disabled weak account lockout policy (0) 23 preexisting CVE-2009-2515 CVE-2009-2516 CVE-2009-2517 7.2 no preexisting CVE-2009-1545 CVE-2009-1546 9.3 no preexisting CVE-2009-0229 CVE-2009-0230 CVE-2008-4841 CVE-2009-0235 9.0 no 9.3 yes preexisting CVE-2010-2563 9.3 no preexisting CVE-2010-1263 9.3 no preexisting CVE-2009-1544 9.0 no preexisting CVE-2010-2746 7.6 no preexisting CVE-2010-3227 9.3 no preexisting CVE-2010-1883 9.3 no 2.6 no 4.3 no 2.6 no 0.0 no preexisting 2.6 no preexisting 2.6 no 10.0 no 2.6 no preexisting preexisting preexisting CVE-2010-1899 preexisting preexisting preexisting CVE-1999-0524 CVE-1999-0592 preexisting preexisting CVE-1999-0535 10.0 no preexisting CVE-1999-0582 5.0 no win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential win2003unpatch.sainttest.local potential mandrake32 critical mandrake32 critical mandrake32 critical weak minimum password age policy (0 days) weak minimum password length policy (0) weak password history policy (0) non-administrative users can bypass traverse checking non-administrative users can replace a process level token account management auditing disabled account management failure auditing disabled logon failure auditing disabled object access auditing disabled object access failure auditing disabled policy change auditing disabled policy change failure auditing disabled system event auditing disabled system event failure auditing disabled Windows administrator account not renamed Windows guest account not renamed Password never expires for user localuser Windows TCP/IP Stack not hardened Microsoft Windows Insecure Library Loading vulnerability Microsoft Windows Service Isolation Bypass Local Privilege Escalation Multiple Windows TCP /IP vulnerabilities (MS08-001) Windows Embedded OpenType Font Engine Vulnerability default device password (root:attack) Account root has no password Guessed password to account (root:password) 24 preexisting CVE-1999-0535 10.0 no preexisting CVE-1999-0535 10.0 no preexisting CVE-1999-0535 10.0 no preexisting CVE-1999-0534 4.6 no preexisting CVE-1999-0534 4.6 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0575 7.5 no preexisting CVE-1999-0585 2.1 no preexisting 0.9 no preexisting 0.9 no preexisting 2.6 no preexisting 2.6 no preexisting CVE-2010-1886 6.8 no preexisting CVE-2007-0066 CVE-2007-0069 9.3 no preexisting CVE-2010-0018 9.3 no preexisting CVE-1999-0507 CVE-1999-0508 CVE-1999-0502 7.5 no 7.5 yes CVE-1999-0501 CVE-2006-5288 10.0 no preexisting preexisting mandrake32 critical mandrake32 critical mandrake32 critical mandrake32 critical Guessed password to account (root:root) Guessed password to account (testadmin:testadmin) Vulnerable Linux Kernel version: 2.4.22 preexisting CVE-1999-0501 4.6 no removed CVE-1999-0501 4.6 no preexisting 10.0 no OpenSSH 3.6.1p2 is vulnerable preexisting CVE-2008-1673 CVE-2008-2136 CVE-2008-2137 CVE-2008-2812 CVE-2008-3077 CVE-2008-5025 CVE-2008-5079 CVE-2008-5700 CVE-2008-5713 CVE-2009-0031 CVE-2009-0065 CVE-2009-0269 CVE-2009-0322 CVE-2009-0605 CVE-2009-0778 CVE-2009-0859 CVE-2009-0935 CVE-2009-1072 CVE-2009-1360 CVE-2009-1633 CVE-2009-2692 CVE-2009-2903 CVE-2009-2909 CVE-2009-3547 CVE-2009-3621 CVE-2010-4083 CVE-2003-0190 CVE-2003-0386 CVE-2003-0682 CVE-2003-0693 CVE-2003-0695 CVE-2003-1562 CVE-2004-2069 CVE-2005-2797 CVE-2005-2798 CVE-2006-0225 CVE-2006-4924 CVE-2006-4925 CVE-2006-5051 CVE-2006-5052 CVE-2007-4752 CVE-2008-1483 CVE-2008-1657 CVE-2008-3259 CVE-2008-5161 10.0 no 25 mandrake32 critical possible vulnerability in ProFTP 1.2.8 preexisting CVE-2003-0831 CVE-2004-0346 CVE-2004-1602 CVE-2005-2390 CVE-2005-4816 CVE-2006-5815 CVE-2006-6170 CVE-2006-6171 CVE-2006-6563 CVE-2007-2165 CVE-2008-4242 CVE-2010-3867 CVE-2010-4652 CVE-2011-4130 CVE-2012-6095 CVE-2010-0405 10.0 no mandrake32 concern preexisting mandrake32 concern bzip2 vulnerable version: 1.0.2 vulnerable Emacs version: 21.3.1 5.1 no 7.8 no 7.5 no 10.0 no 7.5 no 7.5 no preexisting CVE-2007-2833 CVE-2008-1694 CVE-2008-2142 CVE-2006-0300 CVE-2006-6097 CVE-2007-4131 CVE-2007-4476 CVE-2006-3746 CVE-2006-6169 CVE-2006-6235 CVE-2007-1263 CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338 CVE-2009-2624 CVE-2010-0001 CVE-2007-5116 CVE-2008-1927 CVE-2009-3626 CVE-2011-1487 CVE-2011-2728 CVE-2011-2939 CVE-2012-6329 CVE-2007-2953 mandrake32 concern vulnerable GNU tar version: 1.13.25 preexisting mandrake32 concern vulnerability in GnuPG version 1.2.3 preexisting mandrake32 concern vulnerable gzip version: 1.2.4 preexisting mandrake32 concern vulnerable version of perl: 5.8.1 preexisting mandrake32 concern mandrake32 concern mandrake32 potential mandrake32 potential mandrake32 potential mandrake32 potential Vim Helptags remote code execution Vim PySys_SetArgv Remote Command Execution account lockout policy is weak (0) default maximum password age policy is weak (99999 days) default minimum password age policy is weak (0 days) minimum password length policy is weak (6) 6.8 no preexisting CVE-2009-0316 6.9 no preexisting 0.9 no preexisting 0.9 no preexisting 0.9 no preexisting 0.9 no mandrake32 potential password history policy is weak (0) preexisting 0.9 no preexisting 26 mandrake32 potential FTP server does not support AUTH ftp receives cleartext password ICMP timestamp requests enabled ICMP redirects are allowed vulnerable version of Python: 2.3 preexisting 2.6 no mandrake32 potential preexisting 2.6 no mandrake32 potential 0.0 no mandrake32 potential 2.6 no mandrake32 potential 10.0 no mandrake32 mandrake32 potential potential Remote OS available rpc.statd is enabled and may be vulnerable preexisting preexisting 2.6 10.0 no no mandrake32 potential preexisting 7.5 no mandrake32 potential 0.0 no mandrake32 potential 10.0 no mandrake32 potential SSH Protocol Version 1 Supported The sunrpc portmapper service is running sunrpc services may be vulnerable TCP timestamp requests enabled 2.6 no preexisting CVE-1999-0524 preexisting preexisting preexisting preexisting preexisting CVE-2006-4980 CVE-2007-4965 CVE-2008-1721 CVE-2008-1887 CVE-2008-2316 CVE-2008-4864 CVE-2008-5031 CVE-2012-0845 CVE-2012-1150 CVE-1999-0018 CVE-1999-0019 CVE-1999-0210 CVE-1999-0493 CVE-2000-0666 CVE-2000-0800 CVE-2001-0361 CVE-2001-1473 CVE-1999-0632 CVE-2002-0391 CVE-2003-0028 4.0 Details The following sections provide details on the specific vulnerabilities detected on each host. 4.1 Account Policy Impact Weak password policies could make it easier for an attacker to gain unauthorized access to user accounts. Resolution Edit the account policy, which requires different methods on different varieties of Unix-derived systems. Most current UNIX-style systems use the shadow file method to store encrypted passwords and some user settings (in the /etc/shadow file). Most of these systems also use Pluggable Authentication Module (PAM) modules to control minimum password length, password history, password complexity requirements, and account lockout. Linux systems have a file /etc/login.defs that contains various default settings, e.g., for minimum and maximum password age, which are inserted into the /etc/password file when a new user is created. Change the account policy settings to the recommended values. In a typical organization, these are: 27 Minimum password length: 8 characters Enforce password history: 24 passwords remembered Maximum password age: 42 days Minimum password age: 2 days Account lockout threshold: 3 invalid logon attempts PCI requires that passwords contain letters and digits, but a stronger policy is to require three or four different types of characters, e.g., upper case letters, lower case letters, numbers, and symbols. Note that the minimum and maximum password age settings are really defaults that can generally be overridden for individual users. Also note that SAINT currently performs these checks only for Mac OS X starting with 10.5 Leopard, and Linux systems using standard Linux security and PAM modules. Where can I read more about this? See Hitachi ID Systems' white paper Password Policy Guidelines and documentation for your particular operating system. 4.2 AntiVirus Information Impact The system may be susceptible to viruses, worms, and other types of malware. Resolution Install and enable anti-virus software. Turn on automatic updates and periodic scans. Enable logging. If an anti-virus server or manager is present, make sure that all clients can communicate with it so that the client is as up to date as possible and can send crucial information to the master installation. If more information is needed about the anti-virus software running on the network and a server or manager is present, it is a good place to look for information about the anti-virus clients. If more than one instance of anti-virus software is installed on a system, remove all but one. Multiple anti-virus programs may interfere with each other and cause the system to run poorly. Where can I read more about this? For additional information about viruses and anti-virus products, see Virus Bulletin. 4.3 bzip2 vulnerability Impact Vulnerability in BZIP2 could allow a remote attacker to execute arbitrary commands which may cause a denial of service. Resolution 28 Upgrade to bzip2 1.0.6 or higher when available. Where can I read more about this? The Integer Overflow Vulnerability was reported in Bugtraq ID 43331. 4.4 default device password Impact A remote attacker could gain access to the device, allowing him or her to cause a denial of service, change the configuration, install malicious firmware, or gain unauthorized access to the internal network. Resolution Change the password to something other than the default. A recommended password would be one which is at least eight characters long, contains both letters and numbers, and is not based on any associated information such as account names, user's names, or DNS names. If the password cannot be changed, contact your vendor for a firmware fix, or block access to all affected services at the network perimeter. 08/26/02 NOTE: In some cases, notably the Gateway GS-400 server vulnerability, changing the password may void the manufacturer's warranty. Where can I read more about this? Walter Belgers' paper, UNIX password security, is a good reference on strengthening passwords. Although it focuses on UNIX, the password guidelines presented in this paper are applicable to all devices. Specific information is available for Symantec Messaging Gateway, ZyXEL Prestige routers, Gateway GS-400, Avaya switches, X-Micro WLAN routers, NetGear WG602 Accesspoint, NetGear WG602 Accesspoint change, Edimax WAP, NetGear DG834G, Axis, Dynalink RTA 230, Asante FM2008 switch, Vertical Horizon switch, UTStarcom VoIP WIFI Phone, Cisco ACE, 3Com OfficeConnect, Alien Technology ALR-9900, Comcast DOCSIS, Modicon Quantum, GE D20, and Micrologix. 4.5 Emacs vulnerabilities Impact Vulnerabilities in Emacs allow for application crash when loading a malformed crafted file, and arbitrary code execution. Resolution See UBUNTU:USN-919-1 for more information on CVE-2010-0825. Emacs should be updated to a version higher than 24.1 when available. A patch for CVE-2007-5795 is available. 29 A patch for CVE-2008-1694 is available. Contact your Linux vendor for upgrades within version 22. Where can I read more about this? The "enable-local-variables" Variable Processing vulnerability was reported in Secunia Advisory SA50157. The EDE Automatic Project Loading vulnerability was reported in Secunia Advisory SA47515. The Improper file permission check Vulnerability was reported in Bugtraq ID 39039. The fast-lock-mode" file processing vulnerability was reported in Secunia Advisory SA30199. The Privilege Elevation from vcdiff with SCCS was reported in Secunia Advisory SA29905. The version 22.1 vulnerabilities were reported in Secunia Advisory SA27508 and Gentoo Linux Security Advisory 200712-03. The GIF image size denial of service was reported in Bugtraq ID 24570. 4.6 FTP Security Extensions Impact Passwords could be stolen if an attacker is able to capture network traffic to and from the FTP server. Resolution Enable FTP Security Extensions on the FTP server. If the FTP server does not support Security Extensions, change to a different FTP server. Where can I read more about this? More information about FTP Security Extensions is available in RFC2228. 4.7 FTP server Impact Passwords could be stolen if an attacker is able to capture network traffic to and from the FTP server. Resolution Disable the FTP server and use a more secure program such as SCP or SFTP to transfer files. If FTP cannot be disabled, restrict access using iptables or TCP Wrappers such that only addresses on a local, trusted network can connect. Where can I read more about this? 30 For more information, see Protocols - The Problem With Cleartext. 4.8 GNU tar vulnerabilities Impact GNU Tar may be halted (denial of service) from a malformed TAR file. This vulnerability may also allow for the execution of arbitrary code. GNU Tar allows for directory traversal from a malformed TAR file. Resolution The slash slash dot dot directory traversal can be patched. Upgrade to a version higher than GNU tar 1.16. Where can I read more about this? The crashing stack buffer overflow was reported in Secunia Advisory SA26674. The GNU Tar slash slash dot dot directory traversal was reported in Bugtraq ID 25417. The GNUTYPE_NAMES remote directory traversal vulnerability was reported in Bugtraq ID 21235. The PAX extended header vulnerability was reported in Bugtraq ID 16764. 4.9 GnuPG vulnerabilities Impact Vulnerabilities in GnuPG allow for denial of service or execution of arbitrary code when processing a malformed file. Resolution Upgrade to GnuPG version 1.4.9 or higher or 2.0.17 or higher. Another option is to upgrade from your Linux vendor. Where can I read more about this? The GPGSM Tool Certificate Importing Remote Code Execution vulnerability was reported in Bugtraq ID 41945. The deduplication of user IDs memory corruption was reported in Secunia Advisory SA29568 and oCERT #2008001. The content forgery vulnerability was reported in Secunia Advisory SA24365. The stack overwrite vulnerability was reported in Bugtraq ID 21462. The make_printable_string overflow vulnerability was reported in Secunia Advisory SA23094. 31 The message packet length handling integer overflow vulnerability was reported to Bugtraq ID 19110. 4.10 guessed account password Impact An attacker who is able to guess the password to a user account could gain shell access to the system with the privileges of the user. From there it is often trivial to gain complete control of the system. Resolution Protect all accounts with a password that cannot be guessed. Require users to choose passwords which are eight characters long, including numeric and non-alphanumeric characters, and which are not based on the login name or any other personal information about the user. Enforce this policy using a utility such as npasswd in place of the default UNIX passwd program. Check the strength of all account passwords periodically using a password cracking utility such as Crack for Unix. For Cisco 2700 Series Wireless Location Appliance, change the password or mitigate as described in cisco-air-20061013-wla. Where can I read more about this? Walter Belgers' paper, UNIX password security, is a good reference on strengthening passwords. The Cisco 2700 Series WLA default password was described in cisco-sa-2006-1012-wla and Bugtraq ID 20490. The IBM Totalstorage DS400 default password was posted to Full Disclosure. 4.11 gzip vulnerabilities Impact Vulnerabilities in gzip allow for denial of service or execution of remote code when a file is decompacted using gunzip. Resolution Upgrade to a version of gzip higher than 1.3.12 when available. Where can I read more about this? The multiple vulnerabilities in gzip 1.3.12 and prior were reported in Bugtraq ID 37886, Bugtraq ID 37888. The denial of service and remote code execution in 1.3.5 were reported in Secunia Advisory SA21996. 4.12 http IIS access Impact An attacker could send a specially constructed request which crashes the server or executes arbitrary code 32 with the privileges of the web server. Resolutions To fix the directory stream authentication bypass vulnerability, apply the patch referenced in Microsoft Security Bulletin 10-065. For the Extended Protection for Authentication vulnerability, apply the patch referenced in Microsoft Security Bulletin 10-040. Install the patches referenced in Microsoft Security Bulletins 03-018, 06-034 (for Windows 2000), 08-062, and 10-065. For IIS 5.1, also install the patches referenced in 07-041. Note that the patch referenced in Microsoft Security Bulletin 02-050 must also be installed if client side certificates are to function. IIS 4.0 users should also install the patch referenced in Microsoft Security Bulletin 04-021 or disable the permanent redirection option under the Home Directory tab in the web site properties. Where can I read more about this? The ASP Repeated Parameter Request Denial of Service and FastCGI Request Header Buffer Overflow were reported in Microsoft Security Bulletin 10-065. The directory stream authentication bypass was reported in Microsoft Security Bulletin 10-065 and Secunia Advisory 40412. The Extended Protection for Authentication vulnerability was reported in Microsoft Security Bulletin 10-040. More information on Integer Overflow in IPP Service is available at Microsoft Security Bulletin 08-062. More information on the ASP Remote Code Execution vulnerability in Windows 2003 and XP is available in Microsoft Security Bulletin 08-006, (US) CERT Technical Alert TA08-043C, Hewlett-Packard security bulletin HPSBST02314 / SSRT080016, Secunia advisory 28893, Security Focus Bugtraq ID 27676, and Security Tracker Alert ID 1019385. More information on the remote code execution in IIS 5.1 is available at Microsoft Security Bulletin 07-041. More information on the ASP Upload Command Execution vulnerability is available in Microsoft Security Bulletin 06-034, (US) CERT Vulnerability Note VU#395588, Neohapsis 2006 July message #0316, OSVDB record 27152, Secunia Advisory 21006, Security Focus Bugtraq ID 18858 and exploit, and Security Tracker Alert ID 1016466. More information on the .dll request denial of service was reported in Secunia Advisory SA18106. More information on the chunked .HTR processing vulnerability is available in Microsoft Security Bulletin 02-028. The IIS 4.0 redirection buffer overflow was reported in Microsoft Security Bulletin 04-021. More information on the multiple vulnerabilities in IIS 4.0 through 5.1 is available in CERT Advisory 2002-09, Microsoft Security Bulletin 02-018, Microsoft Security Bulletin 02-062, and Microsoft Security Bulletin 03-018. More information on the buffer overflows in IIS 5.0 is available from Microsoft Security Bulletins 01-023 and 33 01-033, CERT advisories 2001-10 and 2001-13. General information on securing IIS 5.0 can be found in the IIS 5 security checklist. More information on folder traversal using Unicode translation is available from Microsoft Security Bulletin 00-078 and a posting to Bugtraq. More information on folder traversal using double encoding is available from Microsoft Security Bulletin 01-026, NSFOCUS Security Advisory 2001-02, and CERT Advisory 2001-12. More information on the buffer overflow vulnerability is available from Microsoft Security Bulletin 99-019 and from Microsoft Knowledge Base article Q234905. More information on the filename inspection vulnerability can be found in Microsoft Security Bulletin 00-086 and NSFOCUS Security Advisory 2000-07. More information on the other vulnerabilities was reported in Microsoft Security Bulletins 00-057, 01-016, and 01-044. 4.13 http IIS authentication Impact An attacker could determine which authentication scheme is required for confidential web pages. This can be used for brute force attacks against known User IDs. Resolutions Use Fix information in Considerations for IIS authentication. Where can I read more about this? More information on the IIS Authorization method disclosure is available in Considerations for IIS authentication. 4.14 ICMP information disclosure Impact A remote attacker could obtain sensitive information about the network. Resolution Configure the system or firewall not to allow ICMP timestamp requests (message type 13) or ICMP netmask requests (message type 17). Instructions for doing this on specific platforms are as follows: Windows: Block these message types using the Windows firewall as described in Microsoft TechNet. Linux: Use ipchains or iptables to filter ICMP netmask requests using the command: ipchains -A input -p icmp --icmp-type address-mask-request -j DROP Use ipchains or iptables to filter ICMP timestamp requests using the commands: 34 pre> ipchains -A input -p icmp --icmp-type timestamp-request -j DROP ipchains -A output -p icmp --icmp-type timestamp-reply -j DROP To ensure that this change persists after the system reboots, put the above command into the system's boot-up script (typically /etc/rc.local). Cisco: Block ICMP message types 13 and 17 as follows: deny icmp any any 13 deny icmp any any 17 Where can I read more about this? For more information about ICMP, see RFC792. 4.15 ICMP redirects Impact An attacker could change the routing of packets from the target such that transmitted data could potentially be monitored or modified. Resolution Disable ICMP redirects. On Windows, this is done by setting the following registry value: Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters Name: EnableICMPRedirect Type: REG_DWORD Data: 0 To disable ICMP redirects on Linux, use the following commands: sysctl -w net.ipv4.conf.all.accept_redirects=0 sysctl -w net.ipv4.conf.all.secure_redirects=0 To make the above settings permanent, also set the following lines in the /etc/sysctl.conf file: net.ipv4.conf.all.accept_redirects = 0 net.ipv4.conf.all.secure_redirects = 0 Where can I read more about this? For more information about ICMP redirects, see Ask Ubuntu and Windows Reference. For more information on securing the Linux kernel, see Linux Kernel /etc/sysctl.conf Security Hardening. 4.16 IIS vulnerabilities Impact 35 Vulnerabilities in IIS allow privilege elevation, and code execution. Resolution To fix the denial of service vulnerability reported in MS13-007, patch as designated in Microsoft Security Bulletin 13-007. To fix the multiple vulnerabilities reported in MS12-073, patch as designated in Microsoft Security Bulletin 12-073. To fix the FTP Server telnet IAC heap overflow, patch as designated in Microsoft Security Bulletin 11-004. For the FTP Server Remote Buffer Overflow vulnerability, patch as designated in Microsoft Security Bulletin 09-053. For the File change notification privilege elevation vulnerability, apply the appropriate patch for the operating system and IIS version: Windows 2000 IIS 5.0: KB942831 Widows XP IIS 5.1: KB942831 Windows Server 2003 IIS 6.0: KB93281 Windows Vista IIS 7.0: KB93281 Where can I read more about this? More details on the denial of service vulnerability reported in MS13-007 can be found in Microsoft Security Bulletin 13-007. More details on the multiple vulnerabilities reported in MS12-073 can be found in Microsoft Security Bulletin 12-073. The FTP service telnet IAC heap overflow was reported in 11-004. The FTP Server Remote Buffer Overflow vulnerability was reported in Microsoft Security Bulletin 09-053. The FTP Server Remote Buffer Overflow was reported in Bugtraq ID 36189. The file change notification privilege elevation vulnerability was reported in Microsoft Security Bulletin MS08-005. 4.17 Internet Explorer vulnerabilities Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) 36 (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) (The CSS parser vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletins 07-009, 07-061, 08-022, 08-032, 08-052, 10-002, 11-031, 12-063, 12-071, 12-077, 13-008, 13-010, and 13-021. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. To mitigate the impact of the ActiveX instantiation heap memory corruption, set the kill bit for the following CLSIDs: 3BC4F3A3-652A-11D1-B4D4-00C04FC2DB8D 4682C82A-B2FF-11D0-95A8-00A0C92B77A9 8E71888A-423F-11D2-876E-00A0C9082467 E2E9CAE6-1E7B-4B8E-BABD-E9BF6292AC29 233A9694-667E-11D1-9DFB-006097D50408 BE4191FB-59EF-4825-AEFC-109727951E42 6E3197A3-BBC3-11D4-84C0-00C04F7A06E5 606EF130-9852-11D3-97C6-0060084856D4 F849164D-9863-11D3-97C6-0060084856D4 To fix the ADODB.connection vulnerability, install the fix at MS07-009. or mitigate the impact by setting the kill bit for the following CLSID: 00000514-0000-0010-8000-00AA006D2EA4. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. The Security Zone Bypass vulnerability (CVE-2010-0255) was reported in Microsoft Security Advisory (980088). The CSS parser vulnerability (CVE-2010-3971) was reported in Microsoft Security Advisory (2488013). For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 37 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, 10-035, 10-053, 10-071, 10-090, 11-003, 11-018, 11-031, 11-052, 11-050, 11-057, 11-081, 11-099, 12-010, 12-023, 12-037, 12-044, 12-052, 12-063, 12-071, 12-077, 13-008, 13-009, 13-010, and 13-021. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. The setRequestHeader() related vulnerabilities were reported in Secunia Advisory SA29453. The URL handling vulnerability in IE7 was reported in Microsoft Security Advisory 943521 and Secunia Advisory SA27007. The document.open spoofing vulnerability was reported in Secunia Advisory SA26069. More information on the race condition building DOM objects vulnerability was reported in Secunia Advisory SA25564. More information on the WPAD proxy server interception vulnerability was reported in NIST Vulnerability Database (CVE-2007-1692). More information on the navcancl.htm cross-site scripting vulnerability may be found at Phishing using IE7 and Secunia Advisory SA24535. More information on the Unload JavaScript vulnerabilities may be found at Bugtraq ID 22678 and Bugtraq ID 22680. More information on the DirectAnimation ActiveX remote integer overflow may be found at XSec Security Advisory XSec-06-10. More information on the ActiveX instantiation heap memory corruption may be found at XSec Security Advisories: XSec-06-02, XSec-06-03, XSec-06-04, XSec-06-06, XSec-06-08. More information on the IsComponentInstalled buffer overflow may be found in Bugtraq ID 16870. More information on the Stack overflow vulnerability may be found in Bugtraq ID 16687. Information on the createTextRange vulnerability may be found in Bugtraq ID 17196. More information on the object tag, modal dialog, and information disclosure vulnerabilities may be found in Bugtraq ID 17658, Bugtraq ID 17713, and Bugtraq ID 17717. More information on the VML buffer overflow may be found in Bugtraq ID 20096. The ADODB.Stream object vulnerability was reported in US-CERT alert 04-184A. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. The three vulnerabilities which are exploited by the Download.Ject trojan were reported in Bugtraq ID 10472, 38 Bugtraq ID 10473, and Bugtraq ID 10514. The memory overflow error on the window() function is reported in a Computer Terrorism article. More information on the ADODB.connection vulnerability is reported in US-CERT Vulnerability Note VU#589272 and Bugtraq ID 20704. 4.18 last user name disclosure Impact An attacker with physical access to the computer could determine a valid user name on the system, thus facilitating password guessing attacks. Resolution Run regedt32, and in the key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System, set DontDisplayLastUserName equal to 1. Where can I read more about this? More information is available in The Registry Guide for Windows. 4.19 Linux Kernel vulnerabilities Impact A remote attacker could execute arbitrary code, cause information disclosure, bypass certain security restrictions, or cause a denial of service. Resolution Install an updated kernel package from your Linux vendor, or upgrade Linux kernel to a version higher than 2.6.39.4 for 2.6.x, 3.0.69 or higher for 3.0.x, 3.2.41 or higher for 3.2.x, 3.4.36 or higher for 3.4.x, or 3.8.3 or higher for 3.8.x when available. Where can I read more about this? The Race Condition and Integer Overflow vulnerabilities were reported in Secunia Advisory SA52441. The "chase_port()" USB Unplugging Denial of Service vulnerability was reported in Secunia Advisory SA52343. The "pciback_enable_msi()" Log Message Flooding Denial of Service vulnerability was reported in Secunia Advisory SA52188. The "__sock_diag_rcv_msg()" and "shmem_remount_fs()" vulnerabilities were reported in Secunia Advisory SA52289. The "call_console_drivers()" Function Log Prefix Stripping Denial of Service was reported in Secunia Advisory SA52366. 39 The Bluetooth HIDP "hidp_setup_hid()" Information Disclosure vulnerability was reported in Secunia Advisory SA52340. The Extended Verification Module NULL Pointer Dereference Local Denial of Service was reported in Secunia Advisory SA52202. The ptrace Privilege Escalation vulnerability was reported in Secunia Advisory SA52269. The "xen_iret()" IRET Handling vulnerability was reported in Secunia Advisory SA52270. The "__skb_recv_datagram()" Denial of Service vulnerability was reported in Secunia Advisory SA52170. The "xen_failsafe_callback()" IRET Handling Denial of Service was reported in Secunia Advisory SA51906. The "uname()" Kernel Memory Disclosure vulnerability was reported in Secunia Advisory SA50895. The HFS+ Privilege Escalation vulnerability was reported in Secunia Advisory SA50849. The "compat_put_timeval()" Argument Passing vulnerability was reported in Secunia Advisory SA50790. The two vulnerabilities fixed in Linux Kernel 3.4.10 were reported in Secunia Advisory SA50421. The multiple vulnerabilities fixed in 2.6.34.13 were reported in Secunia Advisory SA50340. The Netlink Message Handling Privilege Escalation vulnerability was reported in Secunia Advisory SA50323. The "madvise_remove()" Use-After-Free vulnerability was reported in Secunia Advisory SA50310. The SFC Driver TCP MSS Option Handling Denial of Service vulnerability was reported in Secunia Advisory SA50081. The UDF File System Denial of Service vulnerabilities were reported in Secunia Advisory SA49742. The epoll descriptor Denial of Service vulnerability was reported in Secunia Advisory SA49737. The Kernel DOS vulnerability in NFS was reported in Secunia Advisory SA24215. The Huge Pages Memory Leak Denial of Service vulnerability was reported in Secunia Advisory SA49191. The NFSv4 Denial of Service vulnerability was reported in Secunia Advisory SA49149. The mmap_sem Denial of Service vulnerability was reported in Secunia Advisory SA49187. The "ext4_fill_flex_info()" Denial of Service vulnerability was reported in Secunia Advisory SA48645. The "__split_huge_page()" Race Condition Denial of Service vulnerability was reported in Secunia Advisory SA48404. 40 The "/proc/<pid>/mem" Privilege Escalation vulnerability was reported in Secunia Advisory SA47378. The "igmp_heard_query()" Denial of Service vulnerability was reported in Secunia Advisory SA47472. The KVM "syscall" Emulation Denial of Service vulnerability was reported in Secunia Advisory SA47482. The DRM "drm_mode_dirtyfb_ioctl()" Integer Overflow vulnerability was reported in Secunia Advisory SA47486. The "xfs_acl_from_disk()" Integer Overflow vulnerability was reported in Secunia Advisory SA47488. The KVM KVM_ASSIGN_PCI_DEVICE IOCTL Denial of Service vulnerability was reported in Secunia Advisory SA47431. The "SG_IO" SCSI IOCTL Privilege Escalation vulnerability was reported in Secunia Advisory SA47296. The KVM PIT Denial of Service vulnerability was reported in Secunia Advisory SA47293. The B.A.T.M.A.N. "bat_socket_read()" Buffer Overflow vulnerability was reported in Secunia Advisory SA47199. The "journal_get_superblock()" Denial of Service vulnerabilities were reported in Secunia Advisory SA46802. The two Denial of Service vulnerabilities in 2.6.x were reported in Secunia Advisory SA46803. The ghash NULL Pointer Dereference vulnerability was reported in Secunia Advisory SA46584. The XFS "xfs_readlink()" Buffer Overflow vulnerability was reported in Secunia Advisory SA46591. The ext4 Extent Splitting Denial of Service vulnerability was reported in Secunia Advisory SA46489. The "apparmor_setprocattr()" Denial of Service vulnerability was reported in Secunia Advisory SA46423. The CIFS DFS Denial of Service vulnerability was reported in Secunia Advisory SA45936. The CIFSFindNext Signedness Error Denial of Service vulnerability was reported in Secunia Advisory SA45695. The Event Overflows Denial of Service vulnerability was reported in Secunia Advisory SA45533. The "perf" Privilege Escalation vulnerability was reported in Secunia Advisory SA45489. The GRO "skb_gro_header_slow()" Denial of Service vulnerability was reported in Secunia Advisory SA45420. The Xtensa "ptrace_setxregs()" Memory Disclosure vulnerability was reported in Secunia Advisory SA45267. The GFS2 / ext4 Denial of Service vulnerabilities were reported in Secunia Advisory SA45193. The Transparent Hugepage Support Denial of Service vulnerability was reported in Secunia Advisory 41 SA44986. The "key_replace_session_keyring()" NULL Pointer Dereference Denial of Service vulnerability was reported in Secunia Advisory SA44747. The KSM Denial of Service vulnerability was reported in Secunia Advisory SA44754. The "ip_expire()" Denial of Service vulnerability was reported in Secunia Advisory SA44625. The Bluetooth Multiple Local Information Disclosure vulnerabilities were reported in Secunia Advisory SA44466. The Denial of Service and Privilege Escalation vulnerabilities were reported in Secunia Advisory SA44248. The "bcm_release()" NULL Pointer Dereference vulnerability was reported in Secunia Advisory SA44220. The 'next_pidmap()' Local Denial of Service vulnerability was reported in Secunia Advisory SA44164. The "mremap()" Denial of Service vulnerability was reported in Secunia Advisory SA44094. The "inotify_init1()" Denial of Service vulnerability was reported in Secunia Advisory SA44091. The OCFS2 Sparse Writes Information Disclosure vulnerability was reported in Secunia Advisory SA43966. The 'iriap.c' Remote Buffer Overflow vulnerabilities were reported in Bugtraq ID 46980. The Netfilter and Econet Local Information Disclosure vulnerabilities were reported in Bugtraq ID 46919. The ROSE multiple vulnerabilities were reported in Secunia Advisory SA43846. The TPM Information Disclosure vulnerability was reported in Secunia Advisory SA43576. The "ldm_frag_add()" Buffer Overflow vulnerability was reported in Secunia Advisory SA43738. The InfiniBand Request Handling Denial of Service vulnerability was reported in Secunia Advisory SA43693. The epoll Denial of Service vulnerability was reported in Secunia Advisory SA43522. The 'dns_key.c' NULL Pointer Dereference Denial of Service vulnerability was reported in Secunia Advisory SA43594. The "/proc/<pid>/" Permissions Handling weakness was reported in Secunia Advisory SA43496. The World-Writable sysfs and procfs Files weaknesses were reported in Secunia Advisory SA43405. The 'fs/btrfs/ioctl.c' Local Privilege Escalation vulnerability was reported in Bugtraq ID 46301. The 'security_filter_rule_init()' Local Security Bypass vulnerability was reported in Bugtraq ID 46323. The I/O-Warrior USB Device Heap Buffer Overflow vulnerability was reported in Bugtraq ID 46069. 42 The "drivers/media/dvb/ttpci/av7110_ca" IOCTL Local Privilege Escalation vulnerability was reported in Bugtraq ID 45986. The ETHTOOL_GRXCLSRLALL Local Information Disclosure vulnerability was reported in Bugtraq ID 44427. The 'kvm_vcpu_events.interrupt.pad' Field Local Information Disclosure vulnerability was reported in Bugtraq ID 45676. The "blk_rq_map_user_iov()" Local Denial of Service vulnerability was reported in Bugtraq ID 45660. The SCTP Local Race Condition vulnerability was reported in Bugtraq ID 45661. The 'pipe_fcntl()' Local Denial of Service vulnerability was reported in Bugtraq ID 45125. The Unix Sockets Local Denial of Service vulnerability was reported in Bugtraq ID 45037. The "hmid_ds structure" Local Information Disclosure vulnerability was reported in Bugtraq ID 45054. The Econet Protocol Multiple Local vulnerabilities were reported in Bugtraq ID 45072. The 'perf_event_mmap()' Local Denial of Service vulnerability was reported in Bugtraq ID 44861. The 'net/core/filter.c' Local Information Disclosure vulnerability was reported in Bugtraq ID 44758. The Futex Macros Local Denial of Service vulnerability was reported in Bugtraq ID 44754. The CAN Protocol Information Disclosure vulnerability was reported in Bugtraq ID 44661. The 'x25_parse_facilities()' Remote Denial of Service vulnerability was reported in Bugtraq ID 44642. The 'io_submit_one()' NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 44755. The Reliable Datagram Sockets Protocol Local Integer Overflow vulnerability was reported in Bugtraq ID 44549. The setup_arg_pages() Denial of Service vulnerability was reported in Bugtraq ID 44301. The VIDIOCSMICROCODE IOCTL Local Memory Overwrite vulnerability was reported in Bugtraq ID 44242. The Reliable Datagram Sockets Protocol Local Privilege Escalation vulnerability was reported in Bugtraq ID 44219. The ALSA 'sound/core/control.c' Local Integer Overflow vulnerability was reported in Bugtraq ID 43787. The 915 GEM IOCTL Local Memory Overwrite vulnerability was reported in Bugtraq ID 44067. The FBIOGET_VBLANK 'drivers/video/sis/sis_main.c' Information Disclosure vulnerability was reported in Bugtraq ID 43810. The 'ipc/sem.c' Information Disclosure vulnerability was reported in Bugtraq ID 43809. 43 The TIOCGICOUNT 'usb/serial/mos*.c' Information Disclosure vulnerability was reported in Bugtraq ID 43803. The SCTP HMAC Handling Memory Corruption vulnerability was reported in Bugtraq ID 43701. The OCFS2 Fast Symlink Memory Corruption vulnerability was reported in Bugtraq ID 43611. The set_ftrace_filter File Local Denial of Service vulnerability was reported in Bugtraq ID 43684. The 'PKT_CTRL_CMD_STATUS' Invalid Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 43551. The multiple Information Disclosure vulnerabilities fixed in 2.6.36-rc5 were reported in Secunia Advisory SA41440. The Rose Protocol 'srose_ndigis' Heap Memory Corruption vulnerability was reported in Bugtraq ID 43368. The Ptrace Local Privilege Escalation vulnerability was reported in Bugtraq ID 43355. The 'do_io_submit()' Integer Overflow vulnerability was reported in Bugtraq ID 43353. The 'video4linux' IOCTL and IP Multicast 'getsockopt' Privilege Escalation vulnerability was reported in Bugtraq ID 43239. The snd_seq_oss_open() Multiple Local Memory Corruption vulnerabilities were reported in Bugtraq ID 43062. The XFS_IOC_FSGETXATTR Information Disclosure vulnerability was reported in Bugtraq ID 43022. The SIOCGIWSSID IOCTL Local Information Disclosure vulnerability was reported in Bugtraq ID 42885. The irda_bind() Object Cleanup vulnerability was reported in Bugtraq ID 42900. The keyctl_session_to_parent() Null Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 42932. The Controller Area Network Protocol Local Privilege Escalation vulnerability was reported in Bugtraq ID 42585. The JFS xattr Namespace Rules Security Bypass vulnerability was reported in Bugtraq ID 42589. The KVM Intel VT-x Extension NULL Pointer Denial of Service vulnerability was reported in Bugtraq ID 42582. The EXT4 Multiple Local Denial of Service vulnerabilities were reported in Bugtraq ID 42477. The Userspace Stack Growth Memory Corruption vulnerability was reported in Secunia Advisory SA40965. The Btrfs Overwrite Append-Only Files Local Security Bypass vulnerability was reported in Bugtraq ID 41847. The CIFS DNS Lookup Cache Poisoning vulnerability was reported in Bugtraq ID 41904. 44 The GFS2 Access Control List (ACL) Security Bypass vulnerability was reported in Bugtraq ID 41516. The btrfs File Permissions Security Bypass vulnerability was reported in Bugtraq ID 41467. The Donor File Security Bypass vulnerability was reported in Bugtraq ID 41466. The time/clocksource.c Denial of Service vulnerability was reported in Bugtraq ID 41079. The pppol2tp_xmit Null Pointer Deference Denial of Service vulnerability was reported in Bugtraq ID 41077. The ethtool 'info.rule_cnt' Local Buffer Overflow vulnerability was reported in Bugtraq ID 41223. The Linux Kernel XSF 'SWAPEXT' IOCTL Local Information Disclosure vulnerability was reported in Bugtraq ID 40920. The 'knfsd' 'current->mm' Modifier Local Denial of Service vulnerability was reported in Bugtraq ID 40377. The GFS2 File Attribute Security Bypass vulnerability was reported in Bugtraq ID 40356. The Btrfs Cloned File Security Bypass vulnerability was reported in Bugtraq ID 40241. The sctp_process_unk_param() Remote Denial of Service vulnerability was reported in Bugtraq ID 39794. The gfs2_quota Structure Write Local Privilege Escalation vulnerability was reported in Bugtraq ID 39715. The find_keyring_by_name() Local Memory Corruption vulnerability was reported in Bugtraq ID 39719. The proc_oom_score() Local Denial of Service vulnerability was reported in Bugtraq ID 39477. The release_one_tty() Local Information Disclosure vulnerability was reported in Bugtraq ID 39480. The VM/VFS 'invalidatepage()' Local Denial of Service vulnerability was reported in Bugtraq ID 39569. The ReiserFS Security Bypass vulnerability was reported in Bugtraq ID 39344. The tipc Module Local Denial of Service vulnerability was reported in Bugtraq ID 39120. The nameidata Null Pointer Dereference vulnerability was reported in Bugtraq ID 39186. The GFS/GFS2 Local Denial of Service vulnerability was reported in Bugtraq ID 39101. The KVM 'hvc_console.c' Local Denial of Service vulnerability was reported in Bugtraq ID 38537. The Video Output Status Local Denial of Service vulnerability was reported in Bugtraq ID 38607. The TSB I-TLB Load Local Privilege Escalation vulnerability was reported in Bugtraq ID 38393. The dvb_net_ule() Remote Denial of Service vulnerability was reported in Bugtraq ID 38479. 45 The KVM Segment Selector Loading Local Privilege Escalation vulnerability was reported in Bugtraq ID 38467. The selinux_bprm_committing_creds() Security Bypass vulnerability was reported in Bugtraq ID 38175. The net/ipv6/ip6_output.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 38185. The KVM 'pit_ioport_read()' Local Denial of Service vulnerability was reported in Bugtraq ID 38038. The "mmap()" and "mremap()" multiple Denial of Service vulnerabilities were reported in Bugtraq ID 37906. The Linux Kernel ipv6_hop_jumbo() Remote Denial of Service vulnerability was reported in Bugtraq ID 37810. The Linux Kernel fasync_helper() Local Privilege Escalation vulnerability was reported in Bugtraq ID 37806. The Linux Kernel ebtables Security Bypass vulnerability was reported in Bugtraq ID 37762. The Linux Kernel print_fatal_signal() Local Information Disclosure vulnerability was reported in Bugtraq ID 37724. The Linux Kernel RTL8169 NIC 'RxMaxSize' Frame Size Remote Denial of Service vulnerability was reported in Bugtraq ID 37521. The Linux Kernel fuse_ioctl_copy_user() Local Denial of Service vulnerability was reported in Bugtraq ID 37453. The Linux Kernel drivers/firewire/ohci.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 37339. The Linux Kernel Ext4 move extents ioctl Local Privilege Escalation vulnerability was reported in Bugtraq ID 37277. The Linux Kernel KVM handle_dr() Local Denial of Service vulnerability was reported in Bugtraq ID 37221. The Linux Kernel ip_frag_reasm() Null Pointer Deference Remote Denial of Service vulnerability was reported in Bugtraq ID 37231. The Linux Kernel net/mac80211/ Multiple Remote Denial of Service vulnerability was reported in Bugtraq ID 37170. The Linux Kernel KVM Large SMP Instruction Local Denial of Service vulnerability was reported in Bugtraq ID 37130. The Linux Kernel drivers/char/n_tty.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 37147. The Linux Kernel fuse_direct_io() Invalid Pointer Dereference Local Denial of Service vulnerability was reported in Bugtraq ID 37069. 46 The Linux Kernel drivers/scsi/gdth.c Local Privilege Escalation vulnerability was reported in Bugtraq ID 37068. The Linux Kernel fput() NULL Pointer Dereference Local Denial of Service vulnerability was reported in Bugtraq ID 36953. The Linux Kernel nfs4_proc_lock() Local Denial of Service vulnerability was reported in Bugtraq ID 36936. The Linux Kernel pipe.c Local Privilege Escalation vulnerability was reported in Bugtraq ID 36901. The Linux Kernel unix_stream_connect() Local Denial of Service vulnerability was reported in Bugtraq ID 36723. The Linux Kernel net/ax25/af_ax25.c Local Denial of Service vulnerability was reported in Bugtraq ID 36635. The Linux Kernel eCryptfs Lower Dentry Null Pointer Dereference Local Denial of Service vulnerability was reported in Bugtraq ID 36639. The Linux Kernel KVM 'kvm_emulate_hypercall()' Local Denial of Service vulnerability was reported in Bugtraq ID 36512. The Linux Kernel O_EXCL NFSv4 Privilege Escalation vulnerability was reported in Bugtraq ID 36472. The Linux Kernel find_ie() Function Remote Denial of Service vulnerability was reported in Bugtraq ID 36421. The Linux Kernel perf_counter_open() Local Buffer Overflow vulnerability was reported in Bugtraq ID 36423. The Linux Kernel AppleTalk Driver IP Over DDP Remote Denial of Service vulnerability was reported in Bugtraq ID 36379. The Linux Kernel 2.4 and 2.6 Multiple Local Information Disclosure vulnerabilities were reported in Bugtraq ID 36304. The Linux Kernel drivers/scsi/sg.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 36238. The Linux Kernel Multiple Protocols Local Information Disclosure vulnerabilities were reported in Bugtraq ID 36176. The Linux Kernel drivers/char/tty_ldisc.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 36191. The Linux Kernel net/llc/af_llc.c Local Information Disclosure vulnerability was reported in Bugtraq ID 36126. The Linux Kernel cmp_ies Remote Null Pointer Dereference vulnerability was reported in Bugtraq ID 36052. The Linux Kernel udp_sendmsg MSG_MORE Flag Local Privilege Escalation vulnerability was reported in 47 Bugtraq ID 36108. The Linux Kernel binfmt_flat.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 36037. The Linux Kernel sock_sendpage() NULL Pointer Dereference vulnerability was reported in Bugtraq ID 36038. The Linux Kernel posix-timers.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 35976. The Linux Kernel fs/proc/base.c Local Information Disclosure vulnerability was reported in Bugtraq ID 36019. The Linux Kernel clear_child_tid() Local Denial of Service vulnerability was reported in Bugtraq ID 35930. The Linux Kernel eCryptfs parse_tag_11() Remote Stack Buffer Overflow vulnerability was reported in Bugtraq ID 35851. The Linux Kernel SGI GRU Driver Off By One vulnerability was reported in Bugtraq ID 35753. The Linux Kernel tun_chr_pool() NULL Pointer Dereference vulnerability was reported in Bugtraq ID 35724. The Linux Kernel PER_CLEAR_ON_SETID Incomplete Personality List Access Validation Weakness was reported in Bugtraq ID 35647. The Linux Kernel ptrace_start() And do_coredump() Deadlock Local Denial of Service vulnerability was reported in Bugtraq ID 35559. The Linux Kernel kvm_arch_vcpu_ioctl_set_sregs() Local Denial of Service vulnerability was reported in Bugtraq ID 35529. The Linux Kernel RTL8169 NIC Remote Denial of Service vulnerability was reported in Bugtraq ID 35281. The Linux Kernel splice(2) Double Lock Local Denial of Service vulnerability was reported in Bugtraq ID 35143. The Linux Kernel e1000/e1000_main.c Remote Denial of Service vulnerability was reported in Bugtraq ID 35185. The Linux Kernel CIFS String Conversion multiple vulnerabilities were reported in Bugtraq ID 34989. The Linux Kernel NFS MAY_EXEC Security Bypass vulnerability was reported in Bugtraq ID 34934. The Linux Kernel ptrace_attach() Local Privilege Escalation vulnerability was reported in Bugtraq ID 34799. The Linux Kernel CAP_FS_SET Incomplete Capabilities List Access Validation vulnerability was reported in Bugtraq ID 34695. The Linux Kernel drivers/char/agp/generic.c Local Information Disclosure vulnerability was reported in Bugtraq ID 34673. 48 The Linux Kernel inet6_hashtables.c NULL Pointer Dereference Denial of Service vulnerability was reported in Bugtraq ID 34602. The Linux Kernel kill_something_info() Local Denial of Service vulnerability was reported in Bugtraq ID 34558. The Linux Kernel CIFS decode_unicode_ssetup Remote Buffer Overflow vulnerability was reported in Bugtraq ID 34612. The Linux Kernel CIFS Remote Buffer Overflow vulnerability was reported in Bugtraq ID 34453. The Linux Kernel ecryptfs_write_metadata_to_contents() Information Disclosure vulnerability was reported in Bugtraq ID 34216. The Linux Kernel /proc/net/rt_cache Remote Denial of Service vulnerability was reported in Bugtraq ID 34084. The Linux Kernel nfsd CAP_MKNOD Security Bypass vulnerability was reported in Bugtraq ID 34205. The Linux Kernel /ipc/shm.c Local Denial of Service vulnerability was reported in Bugtraq ID 34020. The Linux Kernel seccomp System Call Security Bypass vulnerability was reported in Bugtraq ID 33948. The Linux Kernel Audit System audit_syscall_entry() System Call Security Bypass vulnerability was reported in Bugtraq ID 33951. The Linux Kernel Cloned Process CLONE_PARENT Local Origin Validation Weakness vulnerability was reported in Bugtraq ID 33906. The Linux Kernel sock.c SO_BSDCOMPAT Option Information Disclosure vulnerability was reported in Bugtraq ID 33846. The Linux Kernel Kprobe Memory Corruption vulnerability was reported in Bugtraq ID 33758. The Linux Kernel Console Selection Local Privilege Escalation vulnerability was reported in Bugtraq ID 33672. The Linux Kernel inotify_read() Local Denial of Service vulnerability was reported in Bugtraq ID 33624. The Linux Kernel make_indexed_dir() Local Denial of Service vulnerability was reported in Bugtraq ID 33618. The Linux Kernel inotify Local Privilege Escalation vulnerability was reported in Bugtraq ID 33503. The Linux Kernel dell_rbu Local Denial of Service vulnerabilities were reported in Bugtraq ID 33428. The Linux Kernel readlink Local Privilege Escalation vulnerability was reported in Bugtraq ID 33412. The Linux Kernel keyctl_join_session_keyring() Denial of Service vulnerability was reported in Bugtraq ID 33339. The Linux Kernel sys_remap_file_pages() Local Privilege Escalation vulnerability was reported in 49 Bugtraq ID 33211. The Linux Kernel locks_remove_flock() Local Race Condition vulnerability was reported in Bugtraq ID 33237. The Linux Kernel FWD-TSN Chunk Remote Buffer Overflow vulnerability was reported in Bugtraq ID 33113. The Linux Kernel ib700wdt.c Buffer Underflow vulnerability was reported in Bugtraq ID 33003. The __qdisc_run Minimum Time Delay Denial of Service vulnerability was reported in Bugtraq ID 32985. The Linux Kernel ac_ioctl() Local Buffer Overflow was reported in Bugtraq ID 32759. The ATM vcc Table Corruption Denial of Service and sendmsg() Local Denial of Service vulnerabilities were reported in Secunia Advisory SA32913. The Linux Kernel lbs_process_bss() Remote Denial of Service vulnerability was reported in Bugtraq ID 32484. The Linux Kernel drivers/media/video/tvaudio.c Memory Corruption vulnerability was reported in Bugtraq ID 32327. The Linux Kernel __scm_destroy() Local Denial of Service vulnerability was reported in Bugtraq ID 32154. The Linux Kernel ndiswrapper Remote Buffer Overflow was reported in Secunia Advisory SA32509. The Linux Kernel VDSO Unspecified Privilege Escalation vulnerability was reported in Bugtraq ID 32099. The Linux Kernel hfsplus_block_allocate() Local Denial of Service was reported in Secunia Advisory SA32510. The Linux Kernel tvaudio.c Operations NULL Pointer Dereference vulnerability was reported in Bugtraq ID 32094. The Linux Kernel hfsplus_find_cat() Local Denial of Service vulnerability was reported in Bugtraq ID 32093. The Linux Kernel hfs_cat_find_brec() Buffer Overflow was reported in Secunia Advisory SA32719. The Linux Kernel do_splice_from() Local Security Bypass vulnerability was reported in Bugtraq ID 31903. The Linux Kernel proc_do_xprt() Local Buffer Overflow vulnerability was reported in Bugtraq ID 31937. The Linux Kernel i915 Driver Memory Corruption vulnerability was reported in Bugtraq ID 31792. The Linux kernel SCTP Protocol Violation Remote Denial of Service vulnerability was reported in Bugtraq ID 31848. The Linux kernel fs/direct-io.c Local Denial of Service was reported in Secunia Advisory SA32023. The Linux Kernel truncate() Local Privilege Escalation vulnerability was reported in Bugtraq ID 31368. 50 The Linux Kernel nfsd Subsystem Buffer Overflow was reported in Bugtraq ID 31133. The Linux Kernel sctp_setsockopt_auth_key() Remote Denial of Service was reported in Bugtraq ID 30847. The Linux Kernel DCCP Protocol Handler dccp_setsockopt_change Integer Overflow was reported in Bugtraq ID 30704. The Linux Kernel multiple vulnerabilities fixed in 2.6.26.2 were reported in Secunia Advisory SA31366. The Linux Kernel uvc_driver.c Format Descriptor Parsing Buffer Overflow was reported in Bugtraq ID 30514. The Linux Kernel multiple vulnerabilities fixed in 2.6.25.10 were reported in FrSIRT/ADV-2008-2063. The Linux Kernel ASN.1 BER Decoding Vulnerability was reported in Secunia Advisory SA30580. The Linux IPv6 Over IPv4 vulnerability was posted to Bugtraq, and Secunia. The Linux Kernel Virtual Address Range Checking Denial of Service vulnerability was posted to Bugtraq, and Secunia. 4.20 Macrovision SafeDisc vulnerabilities Impact A vulnerability in Macrovision SafeDisc allows arbitrary code to be executed by local users. Resolution The secdrv.sys file should be updated through either Macrovision or Microsoft (XP/2003). Where can I read more about this? The secdrv.sys local privilege elevation was reported in MS07-067. 4.21 Microsoft NET Framework Impact On a workstation, a remote attacker could execute arbitrary commands when a user opens a specially crafted web page. On a server, a remote attacker could cause a denial of service, execute arbitrary code, or gain unauthorized access to configuration files. Resolution Install the patch referenced in Microsoft Security Bulletins: 10-041 (.NET Framework 1.0, 1.1, 3.5) 11-039 (Silverlight 4) 11-069 (.NET Framework 3.5) 51 11-044 (.NET Framework 2.0, 3.5, 4.0) 11-066 (.NET Framework 3.5, 4.0) 12-035 (.NET Framework 1.1, 2.0, 3.5, 3.51, 4.0) 12-074 (.NET Framework 2.0, 3.5, 3.5.1, 4.0) 13-004 13-007 (.NET Framework 3.5, 3.5.1, 4.0) 13-015 (.NET Framework 2.0, 3.5, 3.5.1, 4.0, 4.5) Where can I read more about this? For more information, see Microsoft Security Bulletins 07-040, 09-036, 09-061, 10-041, 10-060, 11-028, 11-039, 11-044, 11-066, 11-069, 11-078, 11-100, 12-016, 12-025, 12-034, 12-035, 12-038, 12-074, 13-004, 13-007, and 13-015. 4.22 Microsoft outlook vulnerabilities Impact A vulnerability could allow remote attackers to bypass security restrictions and execute remote code. Resolution Apply the appropriate patch as indicated in Microsoft Security Bulletin MS10-030. Where can I read more about this? The Integer Overflow via POP3 or IMAP vulnerability was reported in Microsoft Security Bulletin MS10-030. The multiple ATL vulnerabilities were reported in Microsoft Security Bulletin MS09-037. The MHTML protocol handler component vulnerability was reported in Microsoft Security Bulletin MS08-048. 4.23 Microsoft System Certificates vulnerability Impact Vulnerability on all supported releases of Microsoft Windows may be used to conduct spoofing attacks, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. Resolution For Fraudulent Enforced Licensing Intermediate PCA and SHA1 certificates, Microsoft has issued an update to address this issue. For Fraudulent DigiNotar certificates, Microsoft has issued an update to address this issue. For Fraudulent Comodo certificates, Microsoft has issued an update to address this issue. Where can I read more about this? The Fraudulent Enforced Licensing Intermediate PCA and SHA1 certificates were reported in Microsoft 52 Security Advisory 2718704. The Fraudulent DigiNotar certificates vulnerability was reported in Microsoft Security Advisory 2607712. The Fraudulent Comodo certificates vulnerability was reported in Microsoft Security Advisory 2524375. 4.24 Microsoft Telnet Server Impact A remote user could execute arbitrary commands on the server, cause the telnet server to stop responding, or gain information that could be used in an attempt to find Guest accounts. Resolution Apply the patches referenced in Microsoft Security Bulletins 09-042, 01-031 and 02-004. Where can I read more about this? For more information, see Microsoft Security Bulletins 09-042, 01-031 and 02-004. 4.25 OpenSSH vulnerabilities Impact This document describes some vulnerabilities in the OpenSSH cryptographic login program. Outdated versions of OpenSSH may allow a malicious user to log in as another user, to insert arbitrary commands into a session, or to gain remote root access to the OpenSSH server. Resolution Upgrade to OpenSSH version 5.8 or higher, or install a fix from your operating system vendor. For the Debian OpenSSH SELinux Privilege Escalation vulnerability, apply a fix when available from Debian. Where can I read more about this? The Legacy Certificate Signing Information Disclosure vulnerability was reported in Bugtraq ID 46155. The CBC Mode Information Disclosure Vulnerability was announced by CPNI as Disclosure 3716 / CPNI-957037, with details documented in this advisory. Bugtraq ID 32319 includes an archived discussion and a page of references with links to vendors of various affected implementations of SSH. CERT posted Vulnerability Note VU#958563, which also has links to vendors' sites. The developers of OpenSSH summarize this issue on their security page with details and analysis in this advisory. Background information on the Cipher Block Chaining (“CBC”) mode is available from NIST and Wikipedia. The X11UseLocalhost X11 Forwarding Session Hijacking vulnerability was reported in Bugtraq ID 30339. The Debian OpenSSH SELinux Privilege Escalation vulnerability was reported in Bugtraq ID 30276. The ForceCommand Security Bypass was reported in Secunia Advisory SA29602. 53 The Forward X connections hijack was reported in Secunia Advisory SA29522. The X11 Security Bypass was reported in Bugtraq ID 25628. The ChallengeResponseAuthentication information gathering vulnerability was reported in Bugtraq ID 23601. The vulnerability fixed by 4.5 was reported in Bugtraq ID 20956. The vulnerabilities fixed by 4.4 were reported in OpenSSH 4.4 release. The local SCP shell command execution vulnerability was reported in OpenSSH 4.3 release and Red Hat Bugzilla ID 168167. The GatewayPorts and GSSAPI vulnerabilities were reported in the OpenSSH mailing list. The LoginGraceTime denial of service was posted to openssh-unix-dev. The Directory traversal vulnerability was reported in Bugtraq ID 9986. The PAM keyboard-interactive authentication weakness was reported in Bugtraq ID 7482. The OpenSSH buffer management vulnerabilities are described in CERT Advisory 2003-24, Red Hat Security Advisory 2003:280, and a Bugtraq posting. The Portable OpenSSH PAM vulnerabilities are described in the Portable OpenSSH Security Advisory, the OpenPKG Security Advisory, and Bugtraq. The reverse DNS lookup access control bypass was reported in Bugtraq. For more information on the other OpenSSH vulnerabilities, see CIRC Bulletin M-026, CIRC Bulletin M-054, CERT Advisory 2002-18, the OpenSSH Security Advisory, and the following Bugtraq postings: 2001-09-26, 2001-09-18, 2002-04-21, and 2000-06-09. The vulnerability in the insertion attack detection procedure was reported in a CORE SDI Advisory. 4.26 Outlook and Outlook Express Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. The Windows Address Book patches are available in 10-096. Where can I read more about this? 54 For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, 08-015, and 10-096, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. 4.27 perl vulnerabilities Impact Vulnerabilities in the perl interpreter allow arbitrary code to be executed, and cause an affected application to crash. Also, local users may be able to modify permissions of arbitrary files, or bypass certain security features. Resolution Perl should be upgraded to 5.17.7 or higher, or apply a fix from your vendor when available. Where can I read more about this? The Input Rehashing Denial of Service vulnerability was reported in Secunia Advisory SA52472. The Locale::Maketext Code Injection vulnerabilities were reported in Secunia Advisory SA51741. The Digest "Digest->new()" Code Injection vulnerability was reported in Secunia Advisory SA46299. The "decode_xs()" and "File::Glob::bsd_glob()" vulnerabilities were reported in Secunia Advisory SA46172. The "uc()", "lc()", "lcfirst()", and "ucfirst()" Taint Mode Bypass vulnerability was reported in Secunia Advisory SA43921. The UTF-8 Regular Expression Processing Remote Denial of Service vulnerability was reported in Bugtraq ID 36812. The vulnerability in Perl 5.10 was reported in Secunia Advisory SA30790. The Unicode quoting double free vulnerability and the Regular Expressions Unicode data buffer overflow vulnerability were reported in Secunia Advisory SA27546. 4.28 ProFTPD vulnerabilities Impact Attackers exploiting these vulnerabilities may be able to execute arbitrary commands, perhaps with root privileges, gain unauthorized access, or disrupt service on a target system. Resolution Upgrade ProFTPD to 1.3.4 or higher. Please see the ProFTPD Project's general instructions on upgrading the software. If your copy of the ProFTPD server daemon is part of a larger software distribution, check with your software 55 vendor for a newer or patched version. All FTP server processes must run as root, at least during some parts of their operation, in order to bind to the reserved low-numbered network ports that are specified in the FTP standard. The ProFTPD Project reminds administrators that, for greater security, the server should be configured to run under an unprivileged user ID at all times when root privileges are not essential. Administrators with even stronger security requirements may want to configure the server to run entirely without root privileges, at the cost of some inconvenience. In some cases, disallowing anonymous ftp access, or removing write permissions from all directories accessible by anonymous ftp could serve as a workaround. However, this will only be an effective solution for those vulnerabilities which, as noted above, require the attacker to create files or directories on the server. You will still need to upgrade ProFTPD to fix the other vulnerabilities. Finally, ftp access can be restricted by using TCP wrappers. Where can I read more about this? The security of FTP, in general, is discussed in RFC 2577. Security issues for ProFTPD, in specific, are addressed in the ProFTPD User's Guide. The Race Condition Privilege Escalation vulnerability was reported in Secunia Advisory SA51761. The Response Pool Use-After-Free vulnerability was reported in Secunia Advisory SA46811. The Telnet IAC Remote Code Execution Vulnerability was reported in Secunia Advisory SA42052 and Zero Day Initiative advisory ZDI-10-229, and has Bugtraq ID 44562. The ProFTPD Project itself tracks this vulnerability as Bug #3521. The Backdoor Unauthorized Access vulnerability was reported in Bugtraq ID 45150. The 'mod_sql' Remote Heap Based Buffer Overflow vulnerability was reported in Bugtraq ID 44933. The multiple remote vulnerabilities in 1.3.3 were reported in Bugtraq ID 44562. The Authentication Delay Username Enumeration Vulnerability was reported on the Bugtraq Mailing List. Additional information is available by referencing Bugtraq ID 11430. The Server Username Handling SQL Injection vulnerability was reported in Bugtraq ID 33722. The Long Command Handling Security vulnerability was reported in Secunia Advisory SA31930. The auth API multiple authentication modules security bypass was reported in Secunia Advisory SA24867. The additional 1.3.0a vulnerabilities were reported in Bugtraq ID 21587. The 1.3.0a vulnerabilities were reported in Secunia Advisory SA22821 and Secunia Advisory SA23141. The .message vulnerability was reported in Bugtraq ID 20992. More information about the vulnerabilities in ProFTPD can be found in ProFTPD bug 2658, Secunia Advisory SA16181, ProFTPD bug 2267, Bugtraq, CA-2000-13, CA-1999-03, Bugtraq archive 160902, and Bugtraq archive 169395. 56 4.29 Python vulnerabilities Impact Vulnerabilities in Python allow for information disclosure, denial of service and possibly arbitrary code execution. Resolution Python should be upgraded to a version higher than 2.7.2 or 3.3.0 when available, or contact the vendor for a fix. To fix the multiple integer overflows apply the patch. Where can I read more about this? The Insecure File System Permissions vulnerability was reported in Secunia Advisory SA50960. The Web Form Hash Collision Denial of Service vulnerability was reported in Secunia Advisory SA48347. The SimpleXMLRPCServer Request Processing Denial of Service vulnerability was reported in Secunia Advisory SA47810. The Python 2.6 denial of service vulnerability was reported in Mandriva Security Advisory 2010:216. The Expat Wrapper Library Unspecified XML Parsing Remote Denial of Service vulnerability was reported in Bugtraq ID 35988. The Multiple integer overflow vulnerabilities were reported in Bugtraq ID 31976 and CESA 2008-008. The vulnerabilities in Python 2.5.2 and earlier were reported in Bugtraq ID 28715 and Bugtraq archive 490776. The ImageOP Module Multiple integer overflow vulnerabilities were reported in Secunia Advisory SA26837. The PyLocale_strxfrm image disclosure vulnerability was reported in Secunia Advisory SA25190. The repr buffer overflow vulnerability was reported in Bugtraq ID 20376. 4.30 Remote OS available vulnerabilities Impact The ability to detect which operating system is running on a machine enables attackers to be more accurate in attacks. Resolution Including the operating system in service banners is usually unnecessary. Therefore, change the banners of the services which are running on accessible ports. This can be done by disabling unneeded services, modifying the banner in a service's source code or configuration file if possible, or using TCP wrappers to modify the banner as described in the Red Hat Knowledgebase. 57 Where can I read more about this? An example of ways to remove the Remote OS and other information is at my digital life. 4.31 rpc statd access Impact Several vulnerabilities in statd permit attackers to gain root privileges. They can be exploited by local users. They can also be exploited remotely without the intruder requiring a valid local account if statd is accessible via the network. Resolution One resolution to this vulnerability is to install vendor patches as they become available. For the format string bug, SUSE users should obtain the nfs-utils and package, version 0.1.9.1 or higher, from their vendor. For the String parsing error bug, Linux users should obtain the nfs-utils or knfsdi or linuxnfs packages, more detail information, please refer to SUSE Security Announcement web site. For the SM_MON buffer overflow, UnixWare users should obtain the patch. Also, if NFS is not being used, there is no need to run statd and it can be disabled. The statd (or rpc.statd) program is often started in the system initialization scripts (such as /etc/rc* or /etc/rc*.d/*). If you do not require statd it should be commented out from the initialization scripts. In addition, any currently running statd processes should be identified using ps(1) and then terminated using kill(1). Where can I read more about this? More information about the statd/automountd vulnerability is available in CERT Advisory 1999-05. You may read more about the statd buffer overflow in CERT Advisory 1997-26. The String parsing error vulnerability detail information can be found in CVE Details. The format string vulnerability was discussed in vendor bulletins from Red Hat, Debian, Mandrake, Trustix, and Conectiva, as well as CERT Advisory 2000.17. The SM_MON buffer overflow was announced in Caldera Security Advisory 2001-SCO.6. The file creation and removal vulnerability was discussed in CERT Advisory 1996-09. 4.32 SMB Signing Impact If the SMB signing is disabled, malicious attackers could sniff the network traffic and could perform a man in the middle attack to gain sensitive information. Resolution Refer to Microsoft Technet Library in Local Policies, Microsoft network server: Digitally sign communications (if client agrees). Where can I read more about this? For more information about SMB signing configuration, see, SMB Protocol Package Exchange Scenario. 4.33 SSH protocol vulnerabilities 58 Impact SSH protocol version 1 has a number of known vulnerabilities. Support for version 1 or enabling SSH1 Fallback renders the machines vulnerable to these issues. Resolution Disable SSH1 support and SSH1 fallback. See vendor website for more information including SSH, F-Secure and OpenSSH. For OpenSSH servers, SSH1 support and SSH1 fallback can be disabled by placing the following line in the sshd_config file: Protocol 2 Where can I read more about this? Some of the vulnerabilities in support for SSH Protocol 1 were reported in US-CERT Vulnerability Note VU#684820 and CIRC Bulletin M-017. 4.34 sunrpc portmapper vulnerability Impact The sunrpc portmapper service is an unsecured protocol that tells clients which port corresponds to each RPC service. Access to port 111 allows the calling client to query and identify the ports where the needed server is running. Resolution Disable all unnecessary RPC services, which are typically enabled in /etc/inetd.conf and in the system boot scripts, /etc/rc*, and to block high numbered ports at the network perimeter except for those which are needed. Where can I read more about this? More information can be obtained in, NVD for CVE-1999-0632. 4.35 sunrpc vulnerabilities Impact If an affected service is running, a remote attacker could execute arbitrary commands with root privileges. Resolution See CERT Advisories 2002-25 and 2003-10 for patch or upgrade information from your vendor. Note that it will be necessary to recompile statically linked applications after installing the patch or upgrade. It would also be advisable to disable all unnecessary RPC services, which are typically enabled in /etc /inetd.conf and in the system boot scripts, /etc/rc*, and to block high numbered ports at the network 59 perimeter except for those which are needed. Of particular importance are rpc.cmsd, dmispd, and kadmind, which are known to be exploitable and should be disabled or blocked. Where can I read more about this? These vulnerabilities were reported in CERT Advisories 2002-25 and 2003-10. 4.36 TCP timestamps Impact A remote attacker could possibly determine the amount of time since the computer was last booted. Resolution TCP timestamps are generally only useful for testing, and support for them should be disabled if not needed. To disable TCP timestamps on Linux, add the following line to the /etc/sysctl.conf file: net.ipv4.tcp_timestamps = 0 To disable TCP timestamps on Windows, set the following registry value: Key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters Value: Tcp1323Opts Data: 0 or 1 To disable TCP timestamps on Cisco, use the following command: no ip tcp timestamp Where can I read more about this? More information on TCP timestamps and round-trip time measurement is available in RFC1323 and Microsoft Article 224829. 4.37 Vim vulnerabilities Impact Vulnerabilities in Vim allow for remote code execution when loading a malformed crafted file. Resolution Upgrade to 7.2 and patch with patch 45. Where can I read more about this? The PySys_SetArgv Remote Command Execution vulnerability was reported in Bugtraq ID 33447. The Helptags remote code execution vulnerability was reported in Secunia Advisory SA25941. 60 4.38 Windows account policy Impact Weak password policies could make it easier for an attacker to gain unauthorized access to user accounts. Resolution Edit the account policy, which is found in the Local Security Policy under Administrative Tools on most systems. Change the account policy settings to the recommended values. In a typical organization, these are: Minimum password length: 8 characters Enforce password history: 24 passwords remembered Maximum password age: 42 days Minimum password age: 2 days Password complexity requirements: Enabled Account lockout threshold: 3 invalid logon attempts Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? See Microsoft's Step-by-Step Guide to Enforcing Strong Password Policies and Account Passwords and Policies. 4.39 Windows account rights Impact Normal users could take actions which should be limited to administrators. These privileges could be used to facilitate attacks or to make system resources unavailable to other users. Resolution Edit the user rights assignment, which is found in the Local Security Policy under Administrative Tools on most systems. Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? See Microsoft's documentation on User Rights Assignment. 4.40 Windows auditing 61 Impact Intrusion attempts or other unauthorized activities could go unnoticed. Resolution Edit the auditing policy, which is found in the Local Security Policy under Administrative Tools on most systems. Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? See Microsoft's guide to setting up auditing and developing an auditing policy. 4.41 Windows default account names Impact The default administrator and guest account names give attackers a starting point for conducting brute-force password guessing attacks. Resolution Change the name of the administrator and guest accounts. To do this on Active Directory servers, open Active Directory Users and Computers. Click Users, then right-click on Administrator or Guest, and select Rename. To do this on workstations, open the Local Security Policy from the Administrative Tools menu. Choose Local Policies, then Security Options, then Accounts: Rename administrator or guest account. Where can I read more about this? For more information on securing the administrator account, see The Administrator Accounts Security Planning Guide - Chapter 3. 4.42 Windows Kerberos vulnerabilities Impact A remote attacker with valid logon credentials could cause a denial of service and elevation of privilege. Resolution Apply the fixes referenced in Microsoft Security Bulletins 05-042, 10-014, and 12-069. Where can I read more about this? These vulnerabilities were reported in Microsoft Security Bulletins 05-042, 10-014, 11-013, and 12-069. 4.43 Windows password expiration 62 Impact If a password becomes compromised, it can be used to gain unauthorized access for an unlimited period of time. Resolution Enable password expiration for all users. This is done by removing the check mark beside password never expires in the user's properties. Where can I read more about this? More information on best practices related to password security is available from Microsoft. 4.44 Windows TCPIP Hardening Impact A remote attacker could cause a temporary denial of service. Resolution Apply the TCP/IP stack hardening guidelines discussed in Microsoft Knowledge Base Article 324270 for Windows Server 2003 or 315669 for Windows XP. (Although the latter article was written for Windows 2000, it is presumably also effective for Windows XP.) The patch referenced in Microsoft Security Bulletin 05-019 also fixes this vulnerability, but not for IPv6 interfaces. Where can I read more about this? Land was originally reported in CERT Advisory 1997-28. The Land attack relating to Windows XP Service Pack 2 and Windows Server 2003 was posted to Bugtraq. The Land attack relating to IPv6 was posted to NTBugtraq. 4.45 Windows updates needed Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding 63 Microsoft Security Bulletins for patch information. Update Name Windows NT 4.0 Post SP-6a Security Rollup Pack Windows 2000 Post SP 2 Security Rollup Pack Relative Shell Path Description Bundle of security hotfixes released since Windows NT 4.0 Service Pack 6a. Bundle of security hotfixes released since Windows 2000 Service Pack 2. Fixes a problem in which an attacker could cause an alternate Explorer.exe program to run when another user logs in, resulting in arbitrary code execution. (CVE 2000-0663) RPC Denial of Service Fixes vulnerabilities in various Windows RPC services which could allow an attacker to cause a denial of service. (CVE 2001-0509) Unchecked Buffer in UPnP Hotfix Fixes two vulnerabilities: (1) a buffer overflow which would allow an attacker to take complete control over the computer; and (2) a denial-of-service vulnerability. (CVE 2001-0876, CVE 2001-0877) Fixes two vulnerabilities in Microsoft Virtual Machine. (CVE 2002-0058 CVE 2002-0076) Java Applet Redirect Hotfix Windows Shell Unchecked Buffer Hotfix Multiple UNC Provider Hotfix Windows debugger authentication Hotfix Fixes a buffer overflow condition in the Windows shell that could allow a local attacker to execute arbitrary code at the user's privilege level. (CVE 2002-0070) Fixes a vulnerability in Windows' Multiple Uniform Naming Convention Provider which could allow an attacker to gain Local System privileges. (CVE 2002-0151) Fixes an authentication flaw in the Windows debugger which could allow a local user to execute commands with the privileges of the 64 Fix NT: Q299444 Bulletin 2000: Q311401 or SP3 or SP4 NT: Q269049 or Q299444 2000: Q269049 or SP2 or SP3 or SP4 XP: Not Affecte d NT: Q299444 2000: Q298012 or Q311401 or SP3 or SP4 XP: Not Affecte d NT: Not Affecte d 2000: Not Affect ed XP: Q315000 or SP1 or SP2 NT: Q300845 or 810030 2000: Q300845 or 810030 or SP3 or SP4 XP: Q300845 or 810030 or SP1 or SP2 NT: Q313829 2000: Q313829 or SP3 or SP4 XP: Not Affected NT: Q311967 2000: Q311967 or SP3 or SP4 XP: Q311967 (32 bit) or Q311967 (32 bit embedded) or Q311967 (64 bit) or SP1 or SP2 NT: Q320206 2000: Q320206 or SP3 or SP4 XP: Not 00-052 01-041 01-059 02-013 02-014 02-017 02-024 operating system. (CVE 2002-0367) Remote Access Service Phonebook Eliminates an unchecked buffer Hotfix vulnerability which could allow an unprivileged user to gain complete control over the machine hosting the RAS Phonebook. (CVE 2002-0366) Network Connection Manager Fixes a vulnerability in the Network Hotfix Connection Manager which could allow a local attacker to gain Local System privileges. (CVE 2002-0720) Unchecked Buffer in Network Share Provider Hotfix Certificate Validation Flaw Hotfix VM JDBC Classes Hotfix Help Facility Hotfix VM COM object access Hotfix Windows XP shell buffer overflow Hotfix Affected NT: Q318138 02-029 2000: Q318138 or SP3 or SP4 XP: Q318138 or SP1 or SP2 NT: Not Affected 2000: Q326886 or SP4 XP: Not Affected Eliminates an unchecked buffer NT: Q326830 associated with the Server Message 2000: Q326830 Block (SMB) protocol that could or SP4 lead to Denial of Service (DoS). XP: Q326830 or (CVE 2002-0724) SP1 or SP2 Eliminates a security vulnerability NT: Q329115 (associated with the validation of 2000: Q329115 digital certificate chains) that could or SP4 permit identity spoofing. (CVE XP: Q329115 or 2002-0862) SP2 Eliminates three vulnerabilities in NT: Q329077 or Microsoft Virtual Machine's Java 810030 Database Connectivity classes 2000: Q329077 which could allow code execution or 810030 or from a malicious web site or e-mail SP4 message. (CVE 2002-0865 CVE XP: Q329077 or 2002-0866 CVE 2002-0867) 810030 or SP2 Fixes two vulnerabilities in the NT: Q323255 Windows Help Facility, one in the 2000: Q323255 ActiveX Control (CVE 2002-0693) XP: Q323255 and another in the processing of (32-bit) or .chm files (CVE 2002-0694), which Q323255 (32-bit could allow code execution from a Embedded w/ remote web site or mail message. SP1 or Q323255 (64-bit) or SP2 Fixes eight vulnerabilities in NT: 810030 Microsoft Virtual Machine, including 2000: 810030 or a vulnerability which could allow a SP4 Java applet to access COM XP: 810030 or objects. (CVE 2002-1257 CVE SP2 2002-1258 CVE 2002-1260 CVE 2002-1262 CVE 2002-1286 CVE 2002-1292 CVE 2002-1295) Fixes a buffer overflow in the NT: not affected Windows XP shell which could 2000: not allow an attacker to run commands affected via a .MP3 or .WMA file with XP: 32-bit: corrupt custom attributes. (CVE Q329390 or SP2 2002-1327) 64-bit: Q329390 or SP2 65 02-042 02-045 02-050 02-052 02-055 02-069 02-072 CA-2002-37 VM ByteCode Verifier Hotfix Kernel Debugger Hotfix Windows Media Player skins filename decoding Hotfix ntdll.dll Hotfix NetMeeting directory traversal fix ShellExecute API fix HTML Converter fix RPC buffer overflow fix Fixes the ByteCode Verifier to check for illegal commands when loading Java applets, thus preventing attacks from remote web pages and e-mail messages. (CVE 2003-0111) Fixes a flaw in the way the kernel passes error messages to the debugger which could allow a local attacker to gain system privileges. (CVE 2003-0112) NT: 816093 03-011 2000: 816093 or SP4 XP: 816093 or SP2 NT: 811493 03-013 2000: 811493 or SP4 XP: 32-bit: 811493 or SP2 64-bit: 811493 or SP2 Media Player 03-017 7.1: 817787 Media Player 8.0: 817787 Fixes a problem which could allow a web site or e-mail message to save .wmz files to arbitrary directories, leading to command execution. (CVE 2003-0228) Fixes a buffer overflow in a core NT: 815021 operating system component which 2000: 815021 or can be exploited through many SP4 possible attack vectors, including IIS XP: 32-bit: with WebDAV. (CVE 2003-0109) 815021 or SP2 64-bit: 815021 or SP2 Fixes a directory traversal NT: not affected vulnerability allowing an attacker to 2000: SP4 write files anywhere on the disk, XP: SP1 or leading to code execution. (CVE SP2 2003-0505 CVE 2003-0506) 2003: not affected Fixes a buffer overflow in the NT: not affected ShellExecute API function which 2000: SP4 could be exploitable through any XP: not affected application which uses the function. 2003: not (CVE 2003-0503) affected Fixes a buffer overflow in the NT: 823559 HTML file conversion feature which 2000: 823559 or could allow an attacker to run SP4 Update commands via a malicious web Rollup 1 page or HTML e-mail message. XP: 32-bit: (CVE 2003-0469) 823559 or SP2 64-bit: 823559 or SP2 2003: 32-bit: 823559 or SP1 64-bit: 823559 or SP1 Fixes a buffer overflow in the NT: 823980 DCOM interface to RPC which 2000: 823980 or could allow a remote attacker to SP4 Update execute arbitrary commands. (CVE Rollup 1 2003-0352) XP: 32-bit: 823980 or SP2 66 03-007 Bugtraq ID 7931 SNS-65 03-023 CA-2003-14 03-026 CA-2003-16 DirectX buffer overflow fix ActiveX Controls RPCSS Buffer Overflow Windows Media Player URL script execution 64-bit: 823980 or SP2 2003: 32-bit: 823980 or SP1 64-bit: 823980 or SP1 Fixes a vulnerability in the Windows NT: 819696 03-030 DirectX component which could 2000: 819696 or CA-2003-18 allow an attacker to run commands SP4 Update via a malformed MIDI file. Note: If Rollup 1 or you have installed DirectX 9.0b or DirectX 9.0b or higher you are not vulnerable. later (CVE 2003-0346) XP: 32-bit: 819696 or SP2 or DirectX 9.0b or later 64-bit: 819696 or SP2 or DirectX 9.0b or later 2003: 32-bit: 819696 or DirectX 9.0b or later or SP1 64-bit: 819696 or DirectX 9.0b or later or SP1 Even if a vulnerable control is Set the kill bit for Full Disclosure locally patched or removed, a the vulnerable website can still instruct a client to CLSID to keep download and install the vulnerable IE from control and then exploit the hole. downloading the Example: mciwndx.ocx. vulnerable control again. Fixes multiple buffer overflow NT: Workstation: 03-039 vulnerabilities in the RPCSS 824146 CA-2003-23 DCOM activation code that could NT: Server: enable an attacker to run arbitrary 824146 code on a user's system. (CVE 2000: 824146 or 2003-0715 CVE 2003-0528 CVE SP4 Update 2003-0605 ) Rollup 1 XP: 32-bit: 824146 or SP2 64-bit: 824146 or SP2 64-bit Version 2003: 824146 or SP2 2003: 32-bit: 824146 or SP1 64-bit: 824146 or SP1 Adds protection against execution of NT: 828026 828026 unauthorized scripts embedded in 2000: 828026 audio or video streams. (CVE XP: 828026 or 67 2003-1107) SP2 2003: 828026 Authenticode verification vulnerabilityFixes a vulnerability which could NT: 823182 03-041 allow an attacker to install and run 2000: 823182 or CA-2003-27 an untrusted ActiveX control, either SP4 Update via a malicious web page or an Rollup 1 HTML e-mail. (CVE 2003-0660) XP: 823182 or SP2 2003: 823182 or SP1 NetBIOS Name Service Fixes an Information Disclosure NT: 824105 03-034 information disclosure vulnerability which could allow an 2000: 824105 attacker to receive random data XP: 824105 from the target system's memory. 2003: 824105 (CVE 2003-0661) Troubleshooter ActiveX control Fixes a vulnerability in the Windows NT: 826232 03-042 vulnerability troubleshooter application which 2000: 826232 or CA-2003-27 could allow an attacker to execute SP4 Update commands via a malicious web Rollup 1 page or HTML e-mail. (CVE XP: 826232 or 2003-0662) SP2 2003: 826232 or SP1 Windows messenger service buffer Fixes a vulnerability which could NT: 828035 03-043 overflow allow a remote attacker to execute 2000: 828035 or CA-2003-27 arbitrary commands with Local SP4 Update System privileges. (CVE Rollup 1 2003-0717) XP: 828035 or SP2 2003: 828035 or SP1 Workstation Service Elevation of Fixes an overflow vulnerability 971657 09-041 Privilege which could allow remote command execution when the client receives a specially crafted RPC message. (CVE 2009-1544) Windows workstation service buffer Fixes a vulnerability which could NT: not affected 03-049 overflow allow a remote attacker to execute 2000: 828749 or CA-2003-28 arbitrary commands with Local SP4 Update System privileges. (CVE Rollup 1 2003-0812) XP: 32-bit /64-bit: 828749 or SP2 64-Bit Version 2003: not affected 2003: not affected Windows Help and Support Center Fixes a vulnerability in the code NT: 825119 03-044 buffer overflow which handles the HCP protocol 2000: 825119 or CA-2003-27 which could allow an attacker to SP4 Update execute commands with System Rollup 1 privileges via a malicious web page. XP: 825119 or (CVE 2003-0711) SP2 68 2003: 825119 or SP1 Windows ListBox and ComboBox Fixes a vulnerability in Windows NT: 824141 buffer overflow controls which could allow a local 2000: 824141 or user to gain elevated privileges. SP4 Update (CVE 2003-0659) Rollup 1 XP: 824141 or SP2 2003: 824141 or SP1 Microsoft Data Access Components Fixes a vulnerability in MDAC NT/2000: patch needed which could allow remote code 832483 execution. (CVE 2003-0353 CVE XP: 832483 or 2003-0903) SP2 2003: 832483 or SP1 ASN.1 buffer overflow Fixes a vulnerability in ASN.1 NT: 828028 which could allow remote code 2000: 828028 or execution. (CVE 2003-0818) SP4 Update Rollup 1 XP: 828028 or SP2 2003: 828028 or SP1 Multiple vulnerabilities (MS04-011) Fixes 14 vulnerabilities announced NT: 835732 in Microsoft bulletin MS04-011, the 2000: 835732 or most critical of which could allow SP4 Update remote code execution. (CVE Rollup 1 2003-0533 CVE 2003-0663 CVE XP: 835732 or 2003-0719 CVE 2003-0806 CVE SP2 2003-0906 CVE 2003-0907 CVE 2003: 835732 or 2003-0908 CVE 2003-0909 CVE SP1 2003-0910 CVE 2004-0117 CVE 2004-0118 CVE 2004-0119 CVE 2004-0120 CVE 2004-0123) RPC runtime library vulnerability Fixes a race condition which could NT: 828741 allow an attacker to take control of 2000: 828741 or a system, and fixes three other SP4 Update RPC vulnerabilities. (CVE Rollup 1 2003-0807 CVE 2003-0813 CVE XP: 828741 or 2004-0116 CVE 2004-0124) SP2 2003: 828741 or SP1 Jet Database Engine buffer Fixes a vulnerability which could NT: 837001 overflow allow an attacker to take control of 2000: 837001 or a computer by sending a specially SP4 Update crafted database query to an Rollup 1 application using Jet. (CVE XP: 837001 or 2004-0197) SP2 2003: 837001 or SP1 HCP URL validation vulnerability Fixes a vulnerability in the Help NT/2000: not and Support Center which could affected allow an attacker to control a XP: 840374 or 69 03-045 CA-2003-27 04-003 04-007 04-011 TA04-104A 04-012 TA04-104A 04-014 TA04-104A 04-015 Task Scheduler buffer overflow HTML Help and showHelp vulnerability Windows Shell API CLSID vulnerability Utility Manager privilege elevation POSIX subsystem buffer overflow GDI+ component JPEG buffer overflow computer via a malicious web page or HTML e-mail message. (CVE 2004-0199) Fixes a vulnerability which could allow an attacker to execute commands via a malicious web page or a specially crafted .job file. (CVE 2004-0212) SP2 2003: 840374 or SP1 NT: (with IE6) 841873 NT: (without IE6) not affected 2000: 841873 or SP4 Update Rollup 1 XP: 841873 or SP2 XP: (64-bit) 841873 or SP2 Fixes vulnerabilities in HTML Help NT: 840315 and showHelp which could allow 2000: 840315 or code execution via a malicious web SP4 Update page or e-mail message. (CVE Rollup 1 2003-1041 CVE 2004-0201) XP: 840315 or SP2 2003: 840315 or SP1 Fixes a vulnerability which could NT: 839645 allow an attacker to send a class 2000: 839645 or identifier which could persuade a SP4 Update user to run malicious code. (CVE Rollup 1 2004-0420) XP: 839645 or SP2 2003: 839645 or SP1 Fixes a vulnerability which could NT: not affected allow any logged-on user to force 2000: 842526 or Utility Manager to start an SP4 Update application with system privileges. Rollup 1 (CVE 2004-0213) XP: not affected 2003: not affected Fixes a buffer overflow which could NT: 841872 allow a locally logged-on user to NT: (server) take full control of the computer. 841872 (CVE 2004-0210) 2000: 841872 or SP4 Update Rollup 1 XP: not affected 2003: not affected Fixes a buffer overflow in the XP: 833987 Graphics Device Interface which 2003: 833987 or could allow code execution when an SP1 application opens a malformed Other: See list image. (CVE 2004-0200) of affected products in MS04-028 70 04-022 04-023 04-024 04-019 04-020 04-028 TA04-260A application start vulnerability in Windows shell Compressed folder buffer overflow Metafile rendering buffer overflow Windows NT RPC runtime library denial of service Kernel and LSASS privilege elevation WordPad Word-for-Windows Converter buffer overflow Windows HyperTerminal buffer overflow HTML Help cross-domain vulnerability Fixes a buffer overflow which could allow an attacker to execute commands when the shell starts an application. (CVE 2004-0214 CVE 2004-0572) Fixes a buffer overflow in the processing of compressed files which could allow code execution via a malicious web page or e-mail message. (CVE 2004-0575) Fixes four vulnerabilities, the most critical of which could allow code execution via a malformed WMF or EMF image. (CVE 2004-0207 CVE 2004-0208 CVE 2004-0209 CVE 2004-0211) Fixes a buffer overflow which allows a remote attacker to crash the system or read portions of active memory. (CVE 2004-0569) 841356 NT: not affected 04-034 2000: not affected XP: 873376 (64-bit): 873376 2003: 873376 or SP1 (64-bit): 873376 or SP1 840987 04-032 NT: 873350 2000: not affected XP: not affected 2003: not affected Fixes vulnerabilities in kernel's NT: 885835 launching of applications and 2000: 885835 or LSASS validation of identity tokens SP4 Update which could allow a normal user to Rollup 1 gain administrative access. (CVE XP: 885835 2004-0893 CVE 2004-0894) 2003: 885835 or SP1 Fixes buffer overflows in table NT: 885836 conversion and font conversion 2000: 885836 or which could allow command SP4 Update execution when a malformed Rollup 1 document is opened in WordPad. XP: 885836 (CVE 2004-0571 CVE 2004-0901) 2003: 885836 or SP1 Fixes a vulnerability which could NT: 873339 allow code execution when a user 2000: 873339 or opens a malicious .ht file or SP4 Update possibly a Telnet URL. (CVE Rollup 1 2004-0568) XP: 873339 2003: 873339 or SP1 Fixes a vulnerability which could NT: 890175 allow command execution in the 2000: 890175 or Local Machine security zone when SP4 Update a user follows a specially crafted Rollup 1 link. (CVE 2004-1043) XP: 890175 2003: 890175 or SP1 71 04-037 04-029 04-044 04-041 04-043 05-001 TA05-012B Bugtraq Cursor and Icon vulnerabilities Fixes vulnerabilities allowing command execution or a system crash when a user opens a malformed cursor or icon file. (CVE 2004-1049 CVE 2004-1305) NT: 891711 2000: 891711 or SP4 Update Rollup 1 XP: 891711 or SP2 2003: 891711 or SP1 Indexing service buffer overflow Fixes a command execution 2000: 871250 or vulnerability exploitable by an SP4 Update authenticated user, or by a web Rollup 1 user if IIS allows access to XP: 871250 or indexing. (CVE 2004-0897) SP2 2003: 871250 or SP1 DHTML Editing Component Fixes a cross-domain vulnerability 2000: 891781 or vulnerability allowing information disclosure or SP4 Update command execution when a user Rollup 1 visits a malicious web page. (CVE XP: 891781 2004-1319) 2003: 891781 or SP1 Hyperlink Object Library buffer Fixes a buffer overflow which could 2000: 888113 or overflow allow command execution when a SP4 Update user clicks on a specially crafted Rollup 1 hyperlink. (CVE 2005-0057) XP: 888113 2003: 888113 or SP1 OLE and COM vulnerabilities Fixes two vulnerabilities, the more 2000: 873333 or critical of which could allow SP4 Update command execution by a malicious Rollup 1 document. (CVE 2005-0044 CVE XP: 873333 2005-0047) 2003: 873333 or SP1 PNG Image Processing Fixes a vulnerability which could Media Player Vulnerability allow command execution when 9: 885492 Windows Media Player or Windows Windows Messenger opens a malformed Messenger: 5.1 image. (CVE 2004-0597 CVE 2004-1244) Named Pipe Information Disclosure Prevents attackers from reading the 2000: Not names of users who are connected affected to shared resources. (CVE XP: 888302 or 2005-0051) disable Computer Browser service 2003: Not affected Windows Shell Drag-and-Drop Fixes a vulnerability which could 2000: 890047 or Vulnerability allow writing of arbitrary files when SP4 Update a user takes certain actions on a Rollup 1 malicious web page. (CVE XP: 890047 2005-0053) 2003: 890047 or SP1 72 05-002 TA05-012A 05-003 05-013 05-015 05-012 05-009 05-007 05-008 SMB Transaction response buffer overflow Windows XP Unprivileged Remote Shutdown Windows TCP/IP Vulnerabilities HTML Application Host vulnerability in Windows shell Windows kernel access request buffer overflow Message Queuing vulnerability Jet Database Engine input validation Windows Explorer Web View HTML Help integer overflow Interactive Training bookmark file buffer overflow Fixes command execution 2000: 885250 or vulnerability in processing of SP4 Update responses to Transaction commandsRollup 1 by the SMB client driver. (CVE XP: 885250 2005-0045) 2003: 885250 or SP1 Fixes Windows XP SP1 Remote 2000: Not Desktop to observe the Force affected shutdown from a remote system XP: SP2 or user right when running 889323 TSShutdn.exe. (CVE 2005-0904) 2003: Not affected Fixes vulnerabilities which could 2000: 893066 or allow a remote attacker to cause a SP4 Update denial of service, or possibly Rollup 1 execute commands. (CVE XP: 893066 2004-0230 CVE 2004-0790 CVE 2003: 893066 or 2004-1060 CVE 2005-0048 CVE SP1 2005-0688) Fixes a vulnerability which could 2000: 893086 or allow an e-mail attachment of an SP4 Update unregistered type to execute code Rollup 1 using HTML Application Host. XP: 893086 (CVE 2005-0063) 2003: 893086 or SP1 Fixes vulnerabilities in the Windows 2000: 890859 or kernel which could allow privilege SP4 Update elevation or denial of service. (CVE Rollup 1 2005-0060 CVE 2005-0061 CVE XP: 890859 2005-0550 CVE 2005-0551) 2003: 890859 or SP1 Fixes a buffer overflow in Message 2000: 892944 or Queuing which could allow remote SP4 Update command execution. (Sites using Rollup 1 only HTTP Message Delivery are XP: 892944 or not affected.) (CVE 2005-0059) SP2 2003: not affected Fixes vulnerabilities which could 2000: 950749 allow command execution by a XP: 950749 malformed database file. (CVE 2003 SP1: 2005-0944) 950749 Fixes vulnerability which could allow 2000: 894320 a malicious file to execute XP: Not affected commands when previewed in 2003: Not Windows Explorer's Web View. affected (CVE 2005-1191) Fixes an integer overflow in HTML 2000: 896358 Help which could allow command XP: 896358 execution. (CVE 2005-1208) 2003: 896358 or SP2 Fixes a vulnerability which allows 898458 command execution when a user opens a .cbo file with a long User 73 05-011 889323 05-019 05-016 05-018 05-017 08-028 VU#936529 Full Disclosure 05-024 Bugtraq 05-026 VulnWatch 05-031 iDEFENSE Microsoft Agent spoofing vulnerability field. (CVE 2005-1212) Prevents spoofing of trusted Internet content using a Microsoft Agent character which disguises security prompts. (CVE 2005-1214) Fixes a vulnerability which could allow remote code execution. (CVE 2005-1206) 2000: 890046 XP: 890046 2003: 890046 or SP2 SMB input validation vulnerability 2000: 896422 XP: 896422 2003: 896422 or SP2 Telnet client session variable Fixes a vulnerability which could XP: 896428 disclosure reveal telnet session variables to an 2003: 896428 or attacker when a user clicks on a SP2 malformed telnet URL. (CVE Services for 2005-1205) UNIX 3.5: 896428 Services for UNIX 3.0: 896428 Services for UNIX 2.2: 896428 Microsoft Color Management Fixes a vulnerability in ICC profile 2000: 901214 Module buffer overflow format tag validation which could XP: 901214 allow command execution when a 2003: 901214 or user views a malformed image. SP2 (CVE 2005-1219) Windows 2000 SP4 Update Rollup Update Rollup 1 for Windows 2000 2000: SP4 1 SP4 fixes multiple potential Update Rollup 1 problems. (CVE 2005-3168 CVE 2005-3169 CVE 2005-3170 CVE 2005-3171 CVE 2005-3172 CVE 2005-3173 CVE 2005-3174 CVE 2005-3175 CVE 2005-3176 CVE 2005-3177) DirectShow Buffer Overflow Fixes a vulnerability in DirectX 2000: 904706 which could allow command XP: 904706 execution by a specially crafted 2003: 904706 or .avi file. (CVE 2005-2128) SP2 Windows COM+ command Fixes vulnerabilities which could 2000: 902400 execution vulnerability allow remote command execution XP: 902400 on Windows 2000 and XP SP1, or 2003: 902400 or privilege elevation on Windows XP SP2 SP2 and 2003. (CVE 2005-1978 CVE 2005-1979 CVE 2005-1980 CVE 2005-2119) Windows Shortcut File command Fixes three Windows shell 2000: 900725 execution vulnerabilities, the most critical of XP: 900725 which could allow command 2003: 900725 or execution when a .lnk file is SP2 opened. (CVE 2005-2117 CVE 2005-2118 CVE 2005-2122) Collaboration Data Object Fixes a vulnerability in Collaboration 2000: 901017 vulnerability Data Objects which could allow an XP: 901017 attacker to perform remote code 2003: 901017 or 74 05-032 05-027 05-033 05-036 SP4 Update Rollup 1 05-050 05-051 05-049 05-048 execution. (CVE 2005-1987) SP2 Client Service for NetWare Fixes a vulnerability in Client 2000: 899589 vulnerability Service for NetWare which could XP: 899589 allow an attacker to perform remote 2003: 899589 code execution. (CVE 2005-1985) FTP Client vulnerability Fixes a vulnerability in Windows 2000: 905495 FTP Client that could allow XP: 905495 tampering in File Transfer location. 2003: 905495 (CVE 2005-2126) Network Connection Manager Fixes a vulnerability in Network 2000: 905414 vulnerability Connection Manager that could XP: 905414 allow Denial of Service. (CVE 2003: 905414 or 2005-2307) SP2 Windows EMF/WMF image file Fixes a vulnerability in the graphics 2000: 896424 vulnerability engine processing of EMF/WMF XP: 896424 image files that could allow an 2003: 896424 or attacker to take control of a host. SP2 (CVE 2005-0803 CVE 2005-2123 CVE 2005-2124) Windows Kernel privilege elevation Fixes a vulnerability in the Windows 2000: 908523 vulnerability 2000 Kernel that allows an attacker who has successfully logged into the system to take control of a host. (CVE 2005-2827) Windows WMF gdi32.dll Fixes a remote code execution 2000: 912919 vulnerability vulnerability which exists in the XP: 912919 Graphics Rendering Engine 2003: 912919 or because of the way that it handles SP2 Windows Metafile (WMF) images. An attacker could exploit the vulnerability to take complete control of the affected system by constructing a specially crafted WMF image which is read by a user on the system. (CVE 2005-4560) Windows web fonts vulnerability Fixes a vulnerability in embedded 2000: 908519 web fonts that could allow remote XP: 908519 code execution. An attacker could 2003: 908519 or exploit the vulnerability by having a SP2 user access a web page with the malformed web fonts in it. This would allow the attacker to execute commands with the authority of the user. (CVE 2006-0010) Windows Media Player bmp buffer Fixes a command execution 911565 overflow vulnerability in bmp image parsing. (CVE 2006-0006) Windows Media Player plug-in Fixes a buffer overflow which could 911564 EMBED vulnerability allow command execution when a user plays media files through non-Microsoft browsers. (CVE 2006-0005) 75 05-046 05-044 05-045 05-053 05-055 06-001 06-002 06-005 06-006 Windows IGMP v3 DoS vulnerability WebClient buffer overflow Fixes a denial-of-service vulnerability that would allow an attacker to send a specially crafted IGMP packet to an affected system causing the affected system to stop responding. (CVE 2006-0021) Fixes a buffer overflow which could allow a remote authenticated user to gain administrative privileges. (CVE 2005-1207 CVE 2006-0013) Korean IME privilege elevation vulnerability 2000: not 06-007 affected XP: 913446 2003: 913446 or SP2 2000: not 05-028 affected 06-008 XP: 911927 2003: 911927 or SP2 or disable WebClient service 2000: not 06-009 affected XP: 901190 2003: 901190 Fixes a privilege elevation vulnerability which could allow an attacker who has interactively logged onto the system to take full control of the system. (CVE 2006-0008) Windows DACL privilege elevation Fixes a privilege elevation 2000: not vulnerability vulnerability allowing full control of affected the system by any user on XP: 914798 or Windows XP or by a user in the SP2 network configuration operators 2003: 914798 or group on Windows Server 2003. SP1 (CVE 2006-0023) Windows Help File Image Windows 2000, XP, and 2003 are Processing Heap Buffer Overflow affected by a heap overflow issue when handling a specially crafted Windows Help (.hlp) file containing a malicious image. (CVE 2006-1591) Microsoft Data Access Component A remote code execution 2000: 911562 vulnerability vulnerability exists in the XP: 911562 RDS.Dataspace ActiveX control in 2003: 911562 or ADO distributed in MDAC. SP2 Opening a file provided by an attacker (Mail or Website) allows an attacker to execute code with the rights of that user. (CVE 2006-0003) Windows Explorer COM object Fixes a vulnerability which could 2000: 908531 command execution allow command execution by a web XP: 908531 site which forces a connection to a 2003: 908531 or remote file server. (CVE SP2 2004-2289 CVE 2006-0012) Distributed Transaction Coordinator Fixes two vulnerabilities that an 2000: 913580 Denial of Service attacker could use to cause the XP: 913580 Microsoft Distributed Transaction 2003: 913580 Coordinator (MSDTC) to stop responding. (CVE 2006-0034 CVE 2006-1184) ART Rendering Buffer Overflow Fixes a vulnerability which allows XP SP1/IE6: code execution when a user views 918439 76 06-011 Bugtraq ID 17325 06-014 06-015 06-018 06-022 a malformed ART image. (CVE 2006-2378) Routing and Remote Access Service remote code execution Fixes a vulnerability that allows for remote code execution when the RASMAN service is active (CVE 2006-2370 CVE 2006-2371) Windows Media Player PNG buffer Fixes a vulnerability in Windows overflow Media Player which could allow command execution when a user opens a malformed media file. (CVE 2006-0025) Windows SMB invalid handle denial Fixes two vulnerabilities, one that of service would allow for a denial of service and the other which would allow privilege elevation. (CVE 2006-2373 CVE 2006-2374) Windows TCP/IP remote code Fixes vulnerability in Windows TCP execution vulnerability /IP IP Source Routing code which allows for remote code execution. (CVE 2006-2379) Windows RPC Mutual Fixes vulnerability in Windows RPC Authentication spoofing for Windows 2000 that allows for spoofing of RPC authentication. (CVE 2006-2380) Windows Mailslot Heap Overflow Fixes a heap overflow in Mailslot allowing remote command execution, and an SMB information disclosure vulnerability. (CVE 2006-1314 CVE 2006-1315) DHCP Client Buffer Overflow Fixes a vulnerability which could allow command execution by an attacker-controlled DHCP server on the local subnet. (CVE 2006-2372) Server Service Buffer Overrun Fixes a vulnerability which could allow command execution on a buffer overrun on the Server Service (CVE 2006-3439) DNS Resolution Remote Code Fixes vulnerabilities in the Winsock Execution Hostname functionality and a DNS Resolution Client Buffer Overrun. (CVE 2006-3440 CVE 2006-3441) Windows MMC redirect cross-site Fixes vulnerabilities which allow for scripting vulnerability Remote Code Execution in the Microsoft Management Console on the load of malformed files. (CVE 2006-3643) Windows Explorer Folder GUID Fixes a remote code execution Code Execution vulnerability vulnerability which exists in Windows Explorer dealing with Drag and Drop events. (CVE 2006-3281) 77 XP SP2: 918439 2003: 918439 or SP2 IE 5.01: 918439 2000: 911280 06-025 XP: 911280 2003: 911280 or SP2 917734 06-024 2000: 914389 06-030 XP: 914389 2003: 914389 or SP2 2000: 917953 06-032 XP: 917953 2003: 917953 or SP2 2000: 917736 06-031 2000: 917159 06-035 XP: 917159 2003: 917159 or SP2 2000: 914388 XP: 914388 2003: 914388 or SP2 2000: 921883 XP: 921883 2003: 921883 or SP2 2000: 920683 XP: 920683 2003: 920683 or SP2 2000: 917008 06-036 06-040 06-041 06-044 2000: 921398 06-045 XP: 921398 2003: 921398 or SP2 HTML Help ActiveX Control string buffer overflow Fixes an overflow in a string buffer which could allow command execution by a malicious web site or e-mail. (CVE 2006-3357) Windows Kernel privilege elevation Fixes a vulnerability that allows an vulnerability attacker who has successfully logged into the system to take control of a host. Note: Different than MS05-055. (CVE 2006-3444) Hyperlink Object Library function Fixes both a function vulnerability vulnerability and buffer overflow and a buffer overflow, either of which could allow command execution when a user clicks on a specially crafted hyperlink. (CVE 2006-3086 CVE 2006-3438) Windows unhandled exception Fixes two vulnerabilities, including a vulnerability bug in handling of chained exceptions allowing command execution when a user visits a malformed web page. (CVE 2006-3443 CVE 2006-3648) Windows PGM remote code Fixes a vulnerability which allows a execution malformed Pragmatic General Multicast (PGM) message to cause remote code execution through the MSMQ service. (CVE 2006-3442) Windows indexing service cross-site Fixes a vulnerability that allows scripting cross-site scripting leading to information disclosure through the indexing (cisvc) service. (CVE 2006-0032) Windows Explorer setslice remote Fixes a remote code execution code execution vulnerability which exists in Windows Explorer WebViewFolderIcon ActiveX setslice function. A crafted website or email message could cause remote code execution. (CVE 2006-3730) Microsoft XML Core Services Fixes two vulnerabilities in the remote code execution XML Core services, a remote code execution and an information disclosure. (CVE 2006-4685 CVE 2006-4686) Windows SMB Remote Code Fixes a vulnerability in Microsoft Execution Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or 78 2000: 922616 06-046 XP: 922616 2003: 922616 or SP2 2000: 920958 06-049 2000: 920670 06-050 XP: 920670 2003: 920670 or SP2 2000: 917422 06-051 XP: 917422 2003: 917422 or SP2 2000: not 06-052 affected XP: 919007 2003: not affected 2000: 920685 06-053 XP: 920685 2003: 920685 or SP2 2000: 923191 06-057 XP: 923191 2003: 923191 or SP2 924191 06-061 2000: 957095 XP: 957095 2003: 957095 Vista: 957095 2008: 957095 08-063 06-063 create new accounts with full user rights. (CVE 2008-4038) Also fixes other two vulnerabilities. A null pointer dereference in srv.sys allows an attacker to remotely crash the system. A validated attacker can execute code as administrator. (CVE 2006-3942 CVE 2006-4696) Windows TCP/IP IPv6 denial of Fixes vulnerabilities which allow for XP: 922819 service denial of service when IPv6 is 2003: 922819 or used. (CVE 2004-0230, CVE SP2 2004-0790, CVE 2005-0688, CVE 2005-1649) Windows Object Packer dialogue Fixes a vulnerability which could XP: 924496 spoofing vulnerability allow a file to execute commands 2003: 924496 or by creating a misleading dialogue SP2 box. (CVE 2006-4692) Microsoft Windows NAT Helper DoS vulnerability in Windows NAT DNS Query Denial of Service Helper caused by improper processing of crafted DNS queries. (CVE 2006-5614) Client Service for NetWare buffer Vulnerabilities allowing remote 2000: 923980 overflow and driver denial of attacker to execute arbitrary XP: 923980 service commands or crash the system. 2003: 923980 (Requires valid login on 2003.) (CVE 2006-4688 CVE 2006-4689) Microsoft Agent ACF memory Microsoft Agent vulnerability causing 2000: 920213 corruption remote code execution through XP: 920213 read of crafted .ACF files read in 2003: 920213 web page. (CVE 2006-3445) Windows Workstation service A remote code execution 2000: 924270 remote code execution vulnerability in Workstation service XP: 924270 allows complete control of the 2003: Not affected system. (Note, administratoraffected privileges are required for XP) CVE 2006-4691) Microsoft XMLHTTP XMLHTTP 4.0 and 6.0 ActiveX MSXML 4.0: setRequestHeader code execution Control vulnerability in 927978 setRequestHeader allows remote MSXML 6.0: code execution from read of crafted 927977 webpage. (CVE 2006-5745) Client Server Run-Time Subsystem Fixes a vulnerability allowing local XP: 926255 file manifest vulnerability authenticated users to gain elevated 2003: 926255 privileges due to improper handling of file manifests. (CVE 2006-5585) Windows Media Format ASX Fixes vulnerabilities in Windows 2000: 923689 or Parsing Buffer Overflow Media Format which could allow 925398 (WMP command execution when parsing 6.4) ASF and ASX files. (CVE XP: 923689 or 2006-4702 CVE 2006-6134) 925398 (WMP 6.4) 2003: 923689 or 925398 (WMP 79 06-064 06-065 Bugtraq ID 20804 06-066 06-068 06-070 06-071 06-075 06-078 6.4) Microsoft Windows Workstation Vulnerability in the Workstation Not currently Service NetrWkstaUserEnum denial Service that allows for a temporary fixed of service denial of service due to memory allocation. (CVE 2006-6723) HTML Help ActiveX Control Fixes an overflow which could allow 2000: 928843 remote code execution command execution by a malicious XP: 928843 web site or e-mail. (CVE 2003: 928843 2007-0214) Interactive Training bookmark file Fixes a vulnerability which allows 923723 remote code execution command execution when a user opens a bookmark file. (CVE 2006-3448) Windows Shell Privilege Elevation Fixes a privilege elevation XP: 928843 vulnerability when Shell Hardware 2003: 928843 Detection service is enabled. (CVE 2007-0211) Windows Image Acquisition Fixes a privilege elevation XP: 927802 Privilege Elevation vulnerability when the Windows Image Acquisition (WIA) service (stisvc) is enabled. (CVE 2007-0210) RTF OLE dialog memory Fixes a memory corruption of OLE 2000: 926436 corruption objects within RTF files. (CVE XP: 926436 2007-0026) 2003: 926436 RTF MFC component memory Fixes a memory corruption of MFC 2000: 924667 corruption components within RTF files. (CVE XP: 924667 2007-0025) 2003: 924667 RTF RichEdit component memory Fixes a memory corruption of 2000: 918118 corruption RichEdit components within RTF XP: 918118 files. (CVE 2006-1311) 2003: 918118 Microsoft Malware Protection Fixes an integer overflow which can Automatic update Engine PDF integer overflow occur when the Malware Protection from Microsoft Engine processes PDF files. (CVE Update, Windows 2006-5270) Live OneCare AutoUpdate, or Forefront Server security update service Multiple GDI vulnerabilities fixed by Multiple vulnerabilities in parts of the 2000: 925902 MS07-017 Graphic Design Interface including XP: 925902 remote code execution. 2003: 925902 (CVE 2006-5586 CVE 2006-5758 Vista: 925902 CVE 2007-0038 CVE 2007-1211 CVE 2007-1212 CVE 2007-1213 CVE 2007-1215) Windows Kernel privilege elevation Fixes a vulnerability that allows an 2000: 931784 vulnerability attacker who has successfully XP: 931784 logged into the system to take 2003: 931784 control of a host. Note: Different than MS05-055 and MS06-049. (CVE 2007-1206) Windows CSRSS remote code Fixes vulnerabilities in the Windows 2000: 930178 execution Client/Server Run-time Subsystem XP: 930178 (CSRSS) that include remote code 2003: 930178 80 Secunia Advisory SA23487 07-008 07-005 07-006 07-007 07-011 07-012 07-013 07-010 07-017 07-022 07-021 execution. (CVE 2006-6696 CVE Vista: 930178 2006-6797 CVE 2007-1209) Windows Client/Server Runtime Fixes a vulnerability which could XP: KB2121546 Subsystem Could Allow Elevation allow elevation of privilege if an 2003: of Privilege attacker logged on to an affected KB2121546 system that is configured with a Chinese, Japanese, or Korean system locale. An attacker who successfully exploited this vulnerability could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE 2010-1891 ) Microsoft Agent URL parsing Fixes a vulnerability in Microsoft 2000: 932168 vulnerability Agent that allows remote code XP: 932168 execution when reading a crafted 2003: 932168 URL (CVE 2007-1205) Windows Help File Handling Heap Windows 2000, XP, and 2003 are Buffer Overflow affected by a heap overflow issue when handling a specially crafted Windows Help (.hlp) file containing a malicious bitmap. (CVE 2007-1912) CAPICOM.Certificates ActiveX Fixes a vulnerability in the 931906 control code execution Cryptographic API Component Object Model (CAPICOM) allowing code execution by a malicious web page. (CVE 2007-0940) Windows DirectX ActiveX control Internet Explorer Denial of Service Denial of Service in the DirectX Media software for XP. (CVE 2006-4301) Windows Schannel digital signature Fixes a vulnerability affecting 2000: 935840 parsing vulnerability applications which use SSL/TLS XP: 935840 allowing code execution on 2003: 935840 Windows XP and denial of service on Windows 2000 and 2003. (CVE 2007-2218) Vulnerability in TLS Could Disclose Fixes a vulnerability which could XP:2655992 Information allow information disclosure if an (32-bit), 2655992 attacker intercepts encrypted web (64-bit) traffic served from an affected 2003:2655992 system. (CVE 2012-1870) (32-bit), 2655992 (64-bit) Vista:2655992 (32-bit), 2655992 (64-bit) 2008:2655992 (32-bit), 2655992 (64-bit) Win 7:2655992 (32-bit), 2655992 (64-bit) 2008 R2:2655992 (64-bit) 81 10-069 07-020 Bugtraq ID 23382 07-028 Bugtraq archive 443901 07-031 12-049 Fixes Vista Permissive User Fixes a vulnerability allowing Vista: 931213 Information Store ACLs non-privileged users to access local Information Disclosure Vulnerability user information data stores such as admin passwords contained within the registry and local file system. (CVE 2007-2229) Win32 API parameter validation Fixes a vulnerability which could 2000: 935839 vulnerability allow command execution by a XP: 935839 specially crafted web site. (CVE 2003: 935839 2007-2219) GDI+ component ICO divide by Fixes a divide by zero error in the Do not download zero Graphics Device Interface which ICO files from could allow denial of service when untrusted an application opens a malformed sources. image. Affects Windows 2003. (CVE 2007-2237) Windows Vista Teredo interface Fixes a flaw which could allow Vista: 935807 firewall bypass network traffic to bypass firewall rules on the Teredo interface. (CVE 2007-3038) DirectX RLE Compressed Targa Fixes a buffer overflow vulnerability Update to the Image File Heap Overflow in DirectX libraries which handles October 2006 compressed Targa (TGA) files. version of (CVE 2006-4183) DirectX or later. Microsoft XML Core Services Fixes a vulnerability in the XML Windows XP remote code execution Core services which allowed for Service Pack remote code execution on 3, Microsoft processing of a crafted file. (CVE XML Core 2007-2223) Services Fixes a vulnerability in Microsoft 4.0:KB2758694 XML Core Services 3.0 which Windows XP allows command execution when a Service Pack user loads a specially crafted 3, Microsoft HTML page. (CVE 2010-2561) XML Core Fixes multiple vulnerabilities which Services could allow code execution when 6.0:KB2757638 XML content is parsed. (CVE Windows XP 2007-0099 CVE 2008-4029 CVE Professional 2008-4033) x64 Edition Fixes a vulnerability in the XML Service Pack Core services which allowed for 2, Microsoft remote code execution if a user XML Core views a specially crafted webpage Services using Internet Explorer. (CVE 3.0:KB2757638 2012-1889 CVE 2013-0006 CVE Windows XP 2013-0007) Professional x64 Edition Service Pack 2, Microsoft XML Core Services 4.0:KB2758694 Windows XP 82 07-032 07-035 VU#290961 07-038 Secunia Advisory SA26131 07-042 08-069 10-051 12-043 13-002 Professional x64 Edition Service Pack 2, Microsoft XML Core Services 6.0:KB2758696 Windows Server 2003 Service Pack 2, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2003 Service Pack 2, Microsoft XML Core Services 6.0:KB2758696 Windows Server 2003 x64 Edition Service Pack 2, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2003 x64 Edition Service Pack 2, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2003 x64 Edition Service Pack 2, Microsoft XML Core Services 6.0:KB2758696 Windows Server 2003 with SP2 for Itanium-based Systems, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2003 83 with SP2 for Itanium-based Systems, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2003 with SP2 for Itanium-based Systems, Microsoft XML Core Services 6.0:KB2758696 Windows Vista Service Pack 2, Microsoft XML Core Services 4.0:KB2758694 Windows Vista Service Pack 2, Microsoft XML Core Services 6.0:KB2757638 Windows Vista x64 Edition Service Pack 2, Microsoft XML Core Services 3.0:KB2757638 Windows Vista x64 Edition Service Pack 2, Microsoft XML Core Services 4.0:KB2758694 Windows Vista x64 Edition Service Pack 2, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 for 32-bit Systems Service Pack 2, Microsoft XML Core 84 Services 4.0:KB2758694 Windows Server 2008 for 32-bit Systems Service Pack 2, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 for x64-based Systems Service Pack 2, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2008 for x64-based Systems Service Pack 2, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2008 for x64-based Systems Service Pack 2, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 for Itanium-based Systems Service Pack 2, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2008 for Itanium-based Systems Service Pack 85 2, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2008 for Itanium-based Systems Service Pack 2, Microsoft XML Core Services 6.0:KB2757638 Windows 7 for 32-bit Systems, Microsoft XML Core Services 4.0:KB2758694 Windows 7 for 32-bit Systems, Microsoft XML Core Services 6.0:KB2757638 Windows 7 for 32-bit Systems Service Pack 1, Microsoft XML Core Services 4.0:KB2758694 Windows 7 for 32-bit Systems Service Pack 1, Microsoft XML Core Services 6.0:KB2757638 Windows 7 for x64-based Systems, Microsoft XML Core Services 3.0:KB2757638 Windows 7 for x64-based Systems, Microsoft XML Core Services 4.0:KB2758694 Windows 7 for x64-based Systems, Microsoft XML 86 Core Services 6.0:KB2757638 Windows 7 for x64-based Systems Service Pack 1, Microsoft XML Core Services 3.0:KB2757638 Windows 7 for x64-based Systems Service Pack 1, Microsoft XML Core Services 4.0:KB2758694 Windows 7 for x64-based Systems Service Pack 1, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 R2 for x64-based Systems, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2008 R2 for x64-based Systems, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2008 R2 for x64-based Systems, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 R2 for x64-based 87 Systems Service Pack 1, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2008 R2 for x64-based Systems Service Pack 1, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2008 R2 for x64-based Systems Service Pack 1, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 R2 for Itanium-based Systems, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2008 R2 for Itanium-based Systems, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2008 R2 for Itanium-based Systems, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2008 R2 for Itanium-based Systems 88 Service Pack 1, Microsoft XML Core Services 3.0:KB2757638 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1, Microsoft XML Core Services 6.0:KB2757638 Windows 8 for 32-bit Systems, Microsoft XML Core Services 4.0:KB2758694 Windows 8 for 32-bit Systems, Microsoft XML Core Services 6.0:KB2757638 Windows 8 for 64-bit Systems, Microsoft XML Core Services 3.0:KB2757638 Windows 8 for 64-bit Systems, Microsoft XML Core Services 4.0:KB2758694 Windows 8 for 64-bit Systems, Microsoft XML Core Services 6.0:KB2757638 Windows Server 2012, Microsoft XML Core Services 3.0:KB2757638 89 Windows Server 2012, Microsoft XML Core Services 4.0:KB2758694 Windows Server 2012, Microsoft XML Core Services 6.0:KB2757638 2000: 921503 XP: 921503 2003: 921503 Windows OLE Automation remote code execution Fixes a vulnerability in the OLE 07-043 automation which allowed for remote code execution on processing of a crafted file. (CVE 2007-2224) Windows GDI image handling Fixes a vulnerability in the Windows 2000: 938829 07-046 buffer overflow graphics device interface allowing XP: 938829 command execution when a 2003: 938829 specially crafted image is rendered. (CVE 2007-3034) Windows Media Player Skin parsing Fixes a vulnerability in Windows 936782 07-047 and decompression remote code Media Player which could allow execution command execution when a user opens a media file with a malformed skin. (CVE 2007-3035 CVE 2007-3037) Windows Gadgets remote code Fixes vulnerabilities in Windows Vista: 938123 07-048 execution vulnerabilities Gadgets for Headline, Contacts and Weather that allow for remote code execution when accessing remote feeds. (CVE 2007-3032 CVE 2007-3033 CVE 2007-3891) DirectX DirectTransform FlashPix Fixes a remote code execution Workaround: Set Secunia Advisory ActiveX buffer overflow vulnerability in the DirectTransform kill bit for CLSID SA26426 FlashPix ActiveX control as 201EA564-A6F6 packaged in Microsoft DirectX -11D1-811D-00C0 Media 6.0 SDK. (CVE 2007-4336) 4FB6BD36. Microsoft Agent ActiveX remote Fixes an additional vulnerability in 2000: 938827 07-051 code execution Microsoft Agent that allows remote code execution when reading a crafted URL. (CVE 2007-3040) Windows Services for UNIX 3.0 Fixes a vulnerability in Windows WS UNIX 3.0: 07-053 and 3.5, and Subsystem for Services for UNIX where running 939778 UNIX-based Applications setuid certain setuid binary files could allow WS UNIX 3.5: privilege elevation an attacker to gain elevated 938827 privileges. (CVE 2007-3036) SfUA 2003: 938827 SfUA Vista: 938827 Vulnerable MFC Library FileFind A Heap Overflow exists in the XP: 2387149 VU#611008 Class file Heap Overflow Microsoft Windows MFC Shared 2003: 2387149 SA26800 Library - FileFind Class. (CVE 2007-4916) Kodak Image Viewer remote code Fixes a vulnerability in the Kodak 2000: 923810 07-055 90 execution Image Viewer that allows for remote code execution when viewing a crafted file. (CVE 2007-2217) Windows RPC Authentication denial Fixes vulnerability in Windows RPC of service for Windows that allows for a denial of service to be caused in the RPC authentication. (CVE 2007-2228) SharePoint Services site privilege SharePoint Services 3.0 and Office elevation SharePoint Server 2007 have an elevation of privilege vulnerability within the SharePoint site. (CVE 2007-2581) Microsoft SharePoint Server 2007 Elevation of Privilege Shell32.dll Windows URI handling Remote Code Execution Jet Database Engine vulnerable version Windows Vista SMBv2 Remote Code Execution DirectX Parsing Remote Code Execution Microsoft Video ActiveX Control Stack Buffer Overflow Message Queuing validation vulnerability XP: 923810 2003: 923810 2000: 933729 XP: 933729 2003: 933729 Vista: 933729 2003 SharePoint Services 3.0: 934525 Office SharePoint Server 2007: 934525 and 937832 Microsoft SharePoint Server 2007 Microsoft has an elevation of privilege SharePoint vulnerability within the SharePoint Server 2007: site. (CVE 2008-3006) KB953397 Fixes vulnerability in Windows URI XP: 943460 handling that can lead to remote 2003: 943460 code execution. (CVE 2007-3896) Fixes a vulnerability which could 2000: 950749 allow an attacker to execute XP: 950749 arbitrary code by enticing a target 2003 SP1: user to open a crafted MDB file. 950749 (CVE 2007-6026 CVE 2008-1092 ) Fixes a vulnerability that could allow Vista: 942624 an attacker to tamper with data transferred in SMBv2 leading to remote code execution. (CVE 2007-5351) Fixed vulnerabilities that could allow 2000 (7.0): remote code execution parsing 941568 2000 SAMI, WAV or AVI files. (CVE (8.0): 941568 2007-3895 CVE 2007-3901) 2000 (9.0c): 941568 XP: 941568 2003: 941568 Vista: 941568 A buffer overflow vulnerability exists Video ActiveX in Microsoft DirectShow. The flaw Control: 972890 is due to the way Microsoft Video ActiveX Control parses image files. An attacker can persuade the target user to open a malicious web page to exploit this vulnerability. (CVE 2008-0015) Fixes a buffer overflow in Message 2000: 937894 Queuing which could allow remote XP: 937894 command execution for Windows 2000 and privilege elevation for 91 07-058 07-059 08-043 07-061 08-028 VU#936529 07-063 07-064 09-032 07-065 Windows XP. (CVE 2007-3039) Vulnerability in Message Queuing Fixes a memory corruption 2000: 971032 Could Allow Elevation of Privilege vulnerability in Message Queuing. XP: 971032 The vulnerability is caused by a 2003: 971032 failure to validate messages Vista: 971032 containing user-defined memory address. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System level privileges. (CVE 2008-3479) Fixes a vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. (CVE 2009-1922) Windows Kernel privilege elevation Fixes a vulnerability that allows an Vista: 943078 vulnerability attacker who has successfully logged into the system to take control of a host running Vista. (CVE 2007-5350) Windows Media Format ASF file Fixes a vulnerability allowing Windows Media parsing vulnerability command execution when Windows Format: 941569 Media Player or Media Services Windows Media processes malformed content. (CVE Services: 2007-0064) 944275 Multiple Windows TCP/IP Fixes two vulnerabilities: (1) an 2000: 941644 vulnerabilities IGMPv3 and MLDv2 vulnerability XP: 941644 that could allow remote code 2003: 941644 execution; and (2) an ICMP Vista: 941644 vulnerability that could result in denial of service. (CVE 2007-0069, CVE 2007-0066) Windows LSASS vulnerability Fixes a vulnerability that could allow 2000: 943485 an attacker to gain elevated XP: 943485 privileges. (CVE 2007-5352) 2003: 943485 Vista DHCP response denial of Fixes a TCP/IP vulnerability Vista: 946456 service allowing a denial of service by a response from a DHCP server. (CVE 2008-0084) Windows WebDAV Mini-Redirector Fixes a vulnerability that could allow XP: 946026 Remote Code Execution a remote attacker to take complete 2003: 946026 control of an affected system. Vista: 946026 (CVE 2008-0080) Windows OLE Automation Heap Fixes a heap-based buffer overflow 2000: 943055 Overrun in Object Linking and Embedding XP: 943055 (OLE) automation that could allow 2003: 943055 remote attackers to execute Vista: 943055 arbitrary code via a crafted request. 92 09-040 08-065 07-066 07-068 08-001 08-002 08-004 08-007 08-008 (CVE 2007-0065) Windows DNS Spoofing Attack Fixes a vulnerability in the Windows vulnerability DNS client that leads to a lack of entropy in the randomness of the choice of transaction IDs which could allow an attacker to send malicious responses to DNS requests. (CVE 2008-0087) Windows GDI remote code Fixes several vulnerabilities: (1) execution stack overflow vulnerability in the way Graphics Device Interface (GDI) handles filename parameters in EMF image files; (CVE 2008-1087) (2) heap overflow vulnerability in the way GDI handles integer calculations; (CVE 2008-1083) (3) remote code execution vulnerability in the way that GDI handles integer calculations; (CVE 2008-2249) (4) remote code execution vulnerability in the way that GDI handles file size parameters in WMF files. (CVE 2008-3465) Windows kernel user mode callback Fixes a privilege elevation vulnerability vulnerability caused by insufficient validation of input passed from user mode to the kernel. (CVE 2008-1084) DirectX SAMI-MJPEG Parsing Fixed vulnerabilities that could allow Remote Code Execution remote code execution parsing MJPEG and SAMI files. (CVE 2008-0011 CVE 2008-1444) Windows PGM denial of service Snapshot Viewer for Microsoft Access file download vulnerability Windows DNS Client Spoofing vulnerability Fixes two vulnerabilities which allow a malformed Pragmatic General Multicast (PGM) message to cause a denial of service through the MSMQ service. (CVE 2008-1440 CVE 2008-1441) Fixes a vulnerability which could allow files to be downloaded to arbitrary locations. (CVE 2008-2463) Fixes a vulnerability in the Windows DNS client. This vulnerability could allow a remote unauthenticated 93 2000: 945553 XP: 945553 2003: 945553 Vista: 945553 08-020 2000: 956802 XP: 956802 2003: 956802 Vista: 956802 2008: 956802 08-071 08-021 2000: 941693 XP: 941693 2003: 941693 Vista: 941693 2008: 941693 2000: 951698 XP: 951698 2003: 951698 Vista: 951698 2008: 951698 2000: not affected XP: 950762 2003: 950762 Vista: 950762 2008: 950762 Set kill bits (see 08-041) Snapshot Viewer 2000: 955441 Snapshot Viewer 2002: 955440 Snapshot Viewer 2003: 955439 2000: 951748 XP: 951748 2003: 951748 08-025 08-033 08-036 08-041 08-037 attacker to quickly and reliably spoof responses and insert records into the client cache, thereby redirecting Internet traffic. (CVE 2008-1447) Windows DNS Server Spoofing Fixes two vulnerabilities in the 2000: 951746 vulnerability Windows DNS Server. The 2003: 951746 vulnerabilities could allow spoofing 2008: 951746 by poisoning the DNS cache. (CVE 2008-1447 CVE 2008-1454) Windows Explorer Remote Code Fixes several vulnerabilities: (1) Vista: 958623, Execution remote code execution vulnerability 958624 when a specially crafted 2008: 958623, saved-search file is opened and 958624 saved; (CVE 2008-1435) (2) remote code execution vulnerability when saving a specially crafted search file within Windows Explorer; (CVE 2008-4268) (3) remote code execution vulnerability in Windows Explorer that allows an attacker to construct a malicious web page that includes a call to the search-ms protocol handler. (CVE 2008-4269) Microsoft Image Color Management Fixes a vulnerability which could 2000: 952954 System vulnerable version allow remote command execution XP: 952954 on Windows 2000, Windows XP 2003: 952954 and Windows Server 2003. (CVE 2008-2245) Windows Messenger UIAutomation Fixes an information disclosure XP: 946648 ActiveX vulnerability vulnerability caused by an ActiveX 2003: 954723 control which is incorrectly marked safe. (CVE 2008-0082) Event System vulnerabilities Fixes two vulnerabilities which allow 2000: 950974 authenticated users to execute XP: 950974 arbitrary code on Windows 2000, XP Windows XP, Windows Server Professional 2003, Windows Vista, and Windows x64: 950974 Server 2008. (CVE 2008-1456 2003: 950974 CVE 2008-1457) 2003 x64 950974 Vista: 950974 Vista x64: 950974 2008: 950974 2008 x64: 950974 Active Directory Federation Fixes two vulnerabilities which allow 2003 SP2: Services vulnerable version remote authenticated code execution971726 and spoofing on Windows Server 2003 SP2 x64: 2003 SP2, and Windows Server 971726 2008. (CVE 2009-2508 CVE 2008 & SP2: 2009-2509) 971726 2008 x64 & SP2: 971726 94 08-037 08-075 08-038 08-046 08-050 08-049 09-070 Windows kernel vulnerable version Fixes multiple vulnerabilities which 2000: 977165 allow authenticated users to elevate XP: 977165 privileges on Windows 2000, 2003: 977165 Windows XP, Windows Server Vista: 977165 2003, Windows Vista, Windows 2008: 977165 Server 2008, and Windows 7. Windows 7: (CVE 2009-2515 CVE 2009-2516 977165 CVE 2009-2517 CVE 2010-0232 CVE 2010-0233 ) Windows GDI+ vulnerabilities Fixes vulnerabilities in the gdiplus.dll XP: 958869 of Microsoft Windows GDI+ XP subsystem which could allow remote Professional code execution if a user viewed a x64: 958869 specially crafted file. (CVE 2003: 958869 2009-2500 CVE 2009-2501 CVE 2003 X64: 2009-2502 CVE 2009-2503 CVE 958869 2009-2504 CVE 2009-3126 CVE 2003 Itanium: 2009-2528 CVE 2009-2518) 958869 Vista: 958869 Vista X64: 958869 2008: 958869 2008 X64: 958869 Windows GDI+ vulnerabilities Fixes vulnerabilities in the gdiplus.dll XP: 938464 of Microsoft Windows GDI+ XP subsystem which could allow remote Professional code execution if a user viewed a x64: 938464 specially crafted file. (CVE 2003: 938464 2007-5348 CVE 2008-3012 CVE 2003 X64: 2008-3013 CVE 2008-3014 CVE 938464 2008-3015) Vista: 938464 Vista X64: 938464 2008: 938464 2008 X64: 938464 Windows Media Player sampling Fixes a command execution XP: 954154 rate vulnerability vulnerability when streaming audio Vista: 954154 files from a Windows Media Server 2008: 954154 in a server-side playlist. (CVE 2008-2253) Windows Media Encoder wmex.dll Fixes a command execution 2000: 954156 ActiveX vulnerability vulnerability in an ActiveX control XP: 954156 which was incorrectly marked 2003: 954156 safe-for-scripting. (CVE 2008-3008) Vista: 954156 2008: 954156 Windows kernel validation Fixes vulnerabilities by validating 2000: 958690 input passed from user mode XP: 958690 through the kernel component of 2003: 958690 GDI, correcting the way that the Vista: 958690 kernel validates handles, and 2008: 958690 changing the way that the Windows 95 09-058 10-015 09-062 (superseded by 11-029) 08-052 08-054 08-053 09-006 08-061 kernel handles specially crafted invalid pointers. (CVE 2009-0081 CVE 2009-0082 CVE 2009-0083) Fixes vulnerabilities by correcting window property validation passed during the new window creation process, calls from multiple threads are handled, and validation of parameters passed to the Windows Kernel from user mode. (CVE 2008-2250 CVE 2008-2251 CVE 2008-2252) AFD Kernel Overwrite vulnerability Fixes a privilege elevation vulnerability in the Ancillary Function Driver which occurs when passing data from user to kernel mode. (CVE 2008-3464) Elevation of Privilege Vulnerabilities Fixes multiple privilege elevation in Windows vulnerabilities. (CVE 2008-4036 CVE 2008-1436 CVE 2009-0078 CVE 2009-0079 CVE 2009-0080 ) Windows Server Service MS08-067 Fixes a buffer overflow in the buffer overflow Windows Server service which could allow remote attackers to take complete control of the computer. (CVE 2008-4250) Windows SMB credential reflection Fixes validation of NTLM vulnerability authentication replies to ensure that a user's credentials are not reflected back to an attacker. (CVE 2008-4037) Windows Media components SPN Fixes a vulnerability which allows credential reflection vulnerability unauthorized access by forwarding a client's credentials and a credential disclosure vulnerability in ISATAP. (CVE 2008-3009 CVE 2008-3010) SharePoint Services site privilege elevation Microsoft Office SharePoint Server 2007 and Microsoft Search Server 2008 have an elevation of privilege vulnerability within the SharePoint site. (CVE 2008-4032) Multiple Windows SMB vulnerabilities Fixes multiple SMB buffer overflow vulnerabilities that could give an attacker administrative rights to the system. (CVE 2008-4114 CVE 96 XP: 956803 2003: 956803 08-066 2000: 952004 08-064 XP: 952004 09-012 2003: 952004 Vista: 952004 2008: 952004 2000: 958644 08-067 XP: 958644 2003: 958644 Vista: 958644 2008: 958644 2000: 957097 08-068 XP: 957097 2003: 957097 Vista: 957097 2008: 957097 Media Player: 08-076 954600 Media Format: 952069 Media Services: 952068 Office 08-077 SharePoint Server 2007: 956716 (32 Bit) or 956716 (64 Bit) Office Search Server 2008: 956716 (32 Bit) or 956716 (64 Bit) 2000: 958687 09-001 (32 bit) XP: 958687 (32 bit) or 958687 (64 2008-4834 CVE 2008-4835) Windows Schannel spoofing vulnerability Vulnerabilities in SChannel could allow Remote Code Execution WordPad and Text converters remote code execution DirectX MJPEG decompression remote code execution bit) 2003: 958687 (32 bit), 958687 (64 bit), or 958687 Itanium Vista: 958687 (32 bit) or 958687 (64 bit) 2008: 958687 (32 bit), 958687 (64 bit), or 958687 Itanium Fixes a spoofing vulnerability in 2000: 960225 09-007 windows 2000, 2003, XP, Vista, XP: 960225 (32 and 2008. The vulnerability is only bit), or 960225 harmful if the attacker gains access (64 bit) to the certificate after having 2003: 960225 obtained the public key component (32 bit), 960225 through other means. (CVE (64 bit), or 2009-0085) 960225 Itanium Vista: 960225 (32 bit), or 960225 (64 bit) 2008: 960225 (32 bit), 960225 (64 bit), or 960225 Itanium Fixes two vulnerabilities in the XP: 980436, 10-049 Secure Channel (SChannel) security 2003: 980436, package in Windows. The more Vista: 980436, severe of these vulnerabilities could 2008: 980436, allow remote code execution if a Windows 7: user visits a specially crafted Web 980436, site that is designed to exploit these 2008 R2: vulnerabilities through an Internet 980436. Web browser. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. (CVE 2009-3555 CVE 2010-2566) Fixes Microsoft WordPad and 2000: 973904 09-010 Microsoft Office text converters XP: 973904 09-073 memory corruption. (CVE 2003: 973904 2008-4841 CVE 2009-0087 CVE 2009-0235 CVE 2009-2506) Corrects the way the DirectShow 2000 (8.1): 09-011 component of DirectX 961373 decompresses media files. CVE 2000 97 2009-0084) Windows HTTP Services integer underflow Blended threat privilege elevation vulnerability Microsoft SharePoint Server 2007 Remote Code Execution Microsoft SharePoint Server 2010 Remote Code Execution Microsoft Office Web Apps 2010 Remote Code Execution (9.0->9.0c): 961373 XP: 32-bit: 961373 64-bit: 96173 2003: 32-bit: 961373 64-bit: 961373 Itanium: 961373 Fixes integer underflow, certificate 2000: 960803 name mismatch, and credential XP: 960803 reflection vulnerabilities in Windows 2003: 960803 HTTP Services. (CVE 2009-0086 Vista: 960803 CVE 2009-0089 CVE 2009-0550) 2008: 960803 Fixes a privilege elevation 2000: 959426 vulnerability in Windows 2000, XP: 959426 (32 2003, XP, Vista, and 2008. The bit), or 959426 vulnerability exists due to a faulty (64 bit) SearchPath function used for 2003: 959426 locating and opening files on (32 bit), 959426 windows. An attacker could exploit (64 bit), or the vulnerability by enticing a user 959426 Itanium to download a crafted file to a Vista: 959426 specific location and then have them (32 bit), or open an application that uses the 959426 (64 bit) file. (CVE 2008-2540) 2008: 959426 (32 bit), 959426 (64 bit), or 959426 Itanium Microsoft SharePoint Server 2007 Microsoft has a remote code execution SharePoint vulnerability. (CVE 2009-0549 Server 2007 CVE 2009-0557 CVE 2009-0558 SP1:KB969737 CVE 2009-0559 CVE 2009-0560 (32 bit), or CVE 2009-0561 CVE 2009-1134 KB969737 (64 CVE 2011-1989 CVE 2011-1990) bit) Microsoft SharePoint Server 2007 SP2:KB2553093 (32 bit), or KB2553093 (64 bit) Microsoft SharePoint Server 2010 Microsoft has a remote code execution SharePoint vulnerability. (CVE 2011-1989) Server 2010 SP1:KB2553094 (32 bit), or KB2553094 (64 bit) Microsoft Office Web Apps 2010 Microsoft Office has a remote code execution Web Apps vulnerability. (CVE 2011-1989) 2010 SP1:KB2553095 98 09-013 09-015 09-021 11-072 11-072 11-072 (32 bit), or KB2553095 (64 bit) Windows Search Contains Windows 2003 and XP contain an 2003 SP2: Information Disclosure Vulnerability information disclosure vulnerability inKB963093 (32 Windows search due to the way file bit), or previews are generated. KB963093 (64 Exploitation requires user interaction bit) and upon a successful attack, XP SP2, SP3: information will be presented to the KB963093, or attacker. (CVE 2009-0239) KB963093 Windows kernel desktop validation Fixes four vulnerabilities by 2000: 968537 vulnerabilities correcting the methods used in XP: 968537 validating a change in kernel object, 2003: 968537 the input passed from user mode to Vista: 968537 the kernel and the argument passed 2008: 968537 to the system call. (CVE 2009-1123 CVE 2009-1124 CVE 2009-1125 CVE 2009-1126) Windows RPC Marshalling Engine Fixes an elevation of privilege 2000: 970238 vulnerability vulnerability by correcting the way XP: 970238 RPC Marshalling Engine updates 2003: 970238 its internal state. (CVE 2009-0568) Vista: 970238 2008: 970238 Windows print spooler vulnerabilities Fixes two privilege elevation 2000: 961501 vulnerabilities in the Windows print XP: 961501 spooler, and one remote command 2003: 961501 execution vulnerability on Windows Vista: 961501 2000. (CVE 2009-0228 CVE 2008: 961501 2009-0229 CVE 2009-0230) Microsoft DirectShow QuickTime Fixes three vulnerabilities which 2000: 971633 Movie Parsing Code Execution could allow code execution when XP: 971633 DirectShow parses Quicktime media 2003: 971633 files, validates pointer values and size fields. (CVE 2009-1537 CVE 2009-1538 CVE 2009-1539) Windows Embedded OpenType Fixes a vulnerability allowing 2000: 961371 Font Engine vulnerabilities command execution when a user XP: 961371 opens a file or web page containing 2003: 961371 Embedded OpenType fonts. (CVE Vista: 961371 2009-0231 CVE 2009-0232) 2008: 961371 Vulnerability in the OpenType Fixes a vulnerability in the Windows 2000: 980218 Compact Font Format Driver OpenType Compact Font Format (Note: Windows Could Allow Elevation of Privilege (CFF) driver. The vulnerability 2000 is past its could allow elevation of privilege if a maintenance user views content rendered in a window) specially crafted CFF font. An XP: 2279986 attacker must have valid logon (32-bit), 2279986 credentials and be able to log on (64-bit) locally to exploit this vulnerability. 2003: 2279986 The vulnerability could not be (32-bit), 2279986 exploited remotely or by (64-bit), 2279986 anonymous users. (CVE 2010-0819 (Itanium) CVE 2010-2740 CVE 2010-2741) Vista: 980218 99 09-023 09-025 09-026 09-022 09-028 09-029 10-037 10-078 (supersedes 10-037 on XP and 2003) Windows media file processing vulnerable Fixes a vulnerability that allows remote code execution due to improper handling of specially crafted AVI format files. (CVE 2009-1545 CVE 2009-1546) Windows Remote Desktop Connection vulnerabilities Fixes two heap overflow vulnerabilities which could allow command execution when the client receives a specially crafted response from a RDP server or web site. (CVE 2009-1133 CVE 2009-1929) Multiple Windows ATL vulnerability Fixes multiple vulnerabilities in Windows Active Template Library that could allow an attacker to execute arbitrary code. (CVE 2008-0015 CVE 2008-0020 CVE 2009-0901 CVE 2009-2493 CVE 2009-2494) 2008: 980218 Windows 7: 980218 2000: 971557 XP: 971557 (32-bit), 971557 (64 bit) 2003: 971557 (32-bit), 971557 (64 bit), 971557 (Itanium) Vista: 971557 (32-bit), 971557 (64-bit) 2008: 971557 (32-bit), 971557 (64-bit), 971557 (Itanium) 970927 Outlook:973354 Media Player:973540 ATL Component:973 507 DHTML Component:973 869 ActiveX: 973525 DHTML Editing Component Fixes a remote code execution 2000: 956844 ActiveX Control Vulnerability vulnerability in the DHTML Editing XP: 956844 Component ActiveX Control (32-bit), 956844 brought on by users visiting a (64-bit) specially crafted web page. (CVE 2003: 956844 2009-2519) (32-bit), 956844 (64-bit), 956844 (Itanium) Windows Media header parsing and Fixes code execution vulnerabilities 2000: 968816 playback memory corruption in the handling of ASF format files XP SP2: vulnerabilities and MP3 media files. (CVE 968816 2009-2498 CVE 2009-2499) XP SP3: 968816 2003: 968816 Vista: 968816 2008: 968816 Microsoft Windows TCP/IP remote Fixes several vulnerabilities in 2003: 967723 code execution vulnerability Transmission Control Protocol Vista: 967723 100 09-038 09-044 09-037 09-055 09-046 09-047 09-048 Wireless LAN AutoConfig Service frame parsing remote code execution vulnerability Windows Media Player ASF file heap overflow Windows LSASS denial of service vulnerability SMBv2 remote code execution vulnerability Windows WMA Voice codec vulnerability Windows ASN1 spoofing vulnerability /Internet Protocol (TCP/IP) 2008: 967723 processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP /IP packets over the network to a computer with a listening service. (CVE 2008-4609, CVE 2009-1925, CVE 2009-1926) Fixes a remote code execution Vista: 970710 vulnerability in the Wireless LAN (32-bit), 970710 AutoConfig Service (wlansvc) (64-bit) triggered when the service receives 2008: 970710 a specially crafted wireless frame. (32-bit), 970710 (CVE 2009-1132) (64-bit) Fixes a vulnerability which could 2000: 974112 allow command execution when a XP: 974112 user opens a malformed file in 2003: 974112 Windows Media Player 6.4. (CVE 2009-2527) Fixes a vulnerability which could XP: 975467 allow a remote attacker to crash the 2003: 975467 computer. (CVE 2009-2524) Vista: 975467 2008: 975467 7: 975467 Fixes a remote code execution Vista: 975517 vulnerability that could allow a (32-bit), 975517 remote attacker to take control of or (64-bit) crash the system. (CVE 2009-2526 2008: 975517 CVE 2009-2532 CVE 2009-3103) (32-bit), 975517 (64-bit), 975517 (Itanium) Fixes vulnerabilities in Windows 2000, XP and Media Runtime that could allow 2003 (Voice remote code execution (CVE codec): 969878 2009-0555 CVE 2009-2525) 2000 WMF 9: 954155 2000 WMP 9: 975025 2000, XP and 2003 (Decoder): 969878 XP SP2 WMF 9, 9.5 and 11: 954155 XP (Compression Manager): 975025 2000 WMP 9: 975925 Fixes vulnerabilities in Windows 2000: 974571 CryptoAPI component when XP: 974571 parsing ASN.1. (CVE 2009-2510 XP (64-bit): CVE 2009-2511) 974571 101 09-049 09-052 09-059 09-050 09-051 09-056 Windows Indexing Service memory Fixes a remote code execution corruption vulnerability vulnerability that could allow a remote attacker to execute arbitrary code with the permissions of the user loading a specially crafted web page. (CVE 2009-2507) 2003: 974571 2003 (64-bit): 974571 Vista: 974571 2000: 969059 XP: 969059 (32-bit), 969059 (64-bit) 2003: 969059 (32-bit), 969059 (64-bit), 969059 (Itanium) 2000: 969947 XP: 969947 (32-bit), 969947 (64-bit) 2003: 969947 (32-bit), 969947 (64-bit), 969947 (Itanium) Vista: 969947 (32-bit), 969947 (64-bit) 2008: 969947 (32-bit), 969947 (64-bit), 969947 (Itanium) Vista: 973565 2008: 973565 Windows kernel embedded font vulnerabilities Fixes a remote code execution vulnerability that could allow a remote attacker to execute arbitrary code with the permissions of the user loading a specially crafted Embedded OpenType (EOT) font. (CVE 2009-1127) (CVE 2009-2513) (CVE 2009-2514) Windows WSDAPI remote code execution vulnerability Fixes a remote code execution vulnerability that could allow a remote attacker to send specially crafted message to a computer using the Web Services on Devices API (WSDAPI) on Windows systems. The service is enabled by default on Windows Vista and Windows Server 2008. (CVE 2009-2512) Fixes vulnerabilities in the Windows 2000: 974318 PEAP and MS-CHAPv2 protocol XP: 974318 implementations, which could lead to2003: 974318 remote code execution in Windows Vista: 974318 2008, privilege elevation in other 2008: 974318 server operating systems, and potential vulnerabilities in workstations. (CVE 2009-2505 CVE 2009-3677) Fixes a vulnerability in the Local 2000: 974392 Security Authority Subsystem 2003: 974392 Service (LSASS) which could allow (32-bit), 974392 a denial of service. (CVE (64-bit), 974392 2009-3675) (Itanium) XP: 974392 (32-bit), 974392 (64-bit) Windows Internet Authentication Service vulnerabilities Windows LSASS IPSEC Denial-of-Service Vulnerability 102 09-057 09-065 09-063 09-071 09-069 Windows Embedded OpenType Font Engine Vulnerability Fixes a remote code execution vulnerability in Windows 2000, 2003, XP, Vista, 7, and Server 2008. The vulnerability exists due to the way Windows Embedded OpenType (EOT) Font Engine decompresses specially crafted EOT fonts. (CVE 2010-0018) 2000: 972270 2003: 972270 (32-bit), 972270 (64-bit) XP: 972270 (32-bit), 972270 (64-bit) Vista: 972270 (32-bit), 972270 (64-bit) Windows 7: 972270 2008: 972270 (32-bit), 972270 (64-bit) Microsoft Paint Integer Overflow Fixes a remote code execution 2000: 978706 vulnerability vulnerability if a user viewed a XP: 978706 specially crafted JPEG image file (32-bit), 978706 using Microsoft Paint in Windows (64-bit) 2000, XP and Server 2003. An 2003: 978706 attacker who successfully exploited (32-bit), 978706 this vulnerability could take complete (64-bit), 978706 control of an affected system and (Itanium) could then install programs; view, change, or delete data; or create new accounts. (CVE 2010-0028) DirectShow AVI buffer overflow Fixes vulnerabilities in DirectShow 977914 and which could allow code execution 975560 when a user opens a crafted AVI file. (CVE 2010-0250) Windows Shell Handler vulnerability Fixes a remote code execution 2000: 975713 vulnerability in Windows 2000, XP XP: 975713 and Server 2003; if an application (32-bit), 975713 such as a Web browser passes (64-bit) specially crafted data to the 2003: 975713 ShellExecute API function through (32-bit), 975713 the Windows Shell Handler. An (64-bit), 975713 attacker who successfully exploited (Itanium) this vulnerability could take complete control of an affected system. (CVE 2010-0027) Microsoft Hyper-V Server Denial of Fixes a remote denial of service 2008: 977894 Service Vulnerability vulnerability in Windows Server (64-bit) 2008 Hyper-V and Windows 2008 R2: Server 2008 R2 Hyper-V. The 977894 (64-bit) vulnerability could allow denial of service if a malformed sequence of machine instructions is run by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. (CVE 2010-0026) 103 10-001 10-005 10-013 10-007 10-010 Multiple vulnerabilities (MS10-012) Fixes 4 vulnerabilities announced in Microsoft bulletin MS10-012, the most critical of which could allow remote code execution. The vulnerabilities are due to weak entropy used in encryption, bounds checking on path names, and null pointers. (CVE 2010-0020 CVE 2010-0021 CVE 2010-0022 CVE 2010-0231) 2000 (all 10-012 versions): 971468 XP: 971468 2003 (all versions): 971468 Vista (all versions): 971468 Windows 7 (all versions): 971468 2008 (all versions): 971468 Multiple vulnerabilities (MS10-009) Fixes 4 vulnerabilities announced in Vista (all 10-009 Microsoft bulletin MS10-009, the versions): most critical of which could allow 971468 remote code execution. (CVE 2008 (all 2010-0239 CVE 2010-0240 CVE versions): 2010-0241 CVE 2010-0242) 971468 Multiple Data Analyzer ActiveX Fixes multiple vulnerabilities in ActiveX:978262 10-008 Control vulnerabilities Windows Data Analyzer ActiveX Control that could allow an attacker to execute arbitrary code. (CVE 2010-0252) Windows SMB Client vulnerabilities Fixes vulnerabilities which could 2000: 978251 10-006 allow remote code execution when XP: 978251, a user initiates an SMB connection 978251 (64-bit) with a malicious server. (CVE 2003: 978251, 2010-0016 CVE 2010-0017) 978251 (64-bit) Vista: 978251, 978251 (64-bit) Windows 7: 978251, 978251 (64-bit) 2008: 978251, 978251 (64-bit) CSRSS Local Privilege Elevation Fixes a vulnerability in Client 2000: 978037 10-011 /Server Run-time Subsystem XP: 978037, (CSRSS). (CVE 2010-0023) 978037 (64-bit) 2003: 978037, 978037 (64-bit) Elevation of Privilege Vulnerability in Windows CSRSS XP:2476687 11-010 could Allow Elevation of Privilege. XP:2476687 (CVE 2011-0030) (64-bit) 2003:2476687 2003:2476687 (64-bit) Elevation of Privilege Vulnerability in Windows CSRSS XP:2620712 11-097 could Allow Elevation of Privilege. XP:2620712 (CVE 2011-3408) (64-bit) 2003:2620712 104 Elevation of Privilege Movie Maker and Producer Buffer Overflow vulnerability Vulnerability in Windows Movie Maker Could Allow Remote Code Execution 2003:2620712 (64-bit) Vista:2620712 Vista:2620712 (64-bit) 2008:2620712 2008:2620712 (64-bit) Windows 7:2620712 Windows 7:2620712 (64-bit) 2008 R2:2620712 (64-bit) Vulnerability in Windows CSRSS XP:2507938 11-056 could Allow Elevation of Privilege. XP:2507938 (CVE 2011-1281 CVE 2011-1282 (64-bit) CVE 2011-1283 CVE 2011-1284 2003:2507938 CVE 2011-1870) 2003:2507938 (64-bit) Vista:2507938 Vista:2507938 (64-bit) 2008:2507938 2008:2507938 (64-bit) Windows 7:2507938 Windows 7:2507938 (64-bit) 2008 R2:2507938 (64-bit) Fixes a vulnerability which could XP: 975561 10-016 allow remote code execution when (32-bit), 975561 a user opens a specially crafted (64-bit) Movie Maker or Microsoft Producer Vista: 975561 project file. An attacker could exploit (32-bit)(MM 2.6), this vulnerability to take complete 975561 control of the affected system. (32-bit)(MM 6.0), (CVE 2010-0265) 975561 (64-bit)(MM 2.6) 975561 (64-bit)(MM 6.0) Windows 7: 975561 (32-bit), 975561 (64-bit) Fixes a vulnerability in Windows XP: 981997, 10-050 Movie Maker. The vulnerability Vista: could allow remote code execution if 981997(MM 2.6), an attacker sent a specially crafted 981997(MM 6.0). Movie Maker project file and convinced the user to open the 105 specially crafted file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (CVE 2010-2564) Windows Media Unicast Service Fixes a remote code execution transport information buffer overflow vulnerability in handling transport information packets. (CVE 2010-0478) Windows MPEG layer 3 codec Fixes remote code execution vulnerable vulnerability in MPEG Layer-3 codecs. (CVE 2010-0480) Windows SMB Client vulnerabilities Fixes vulnerabilities which could allow remote code execution when a user initiates an SMB connection with a malicious server. (CVE 2009-3676 CVE 2010-0269 CVE 2010-0270 CVE 2010-0476 CVE 2010-0477) Windows ISATAP Component spoofing vulnerability Fixes a spoofing vulnerability which exists in the Microsoft Windows IPv6 stack due to the way that Windows checks the inner packet's IPv6 source address in a tunneled ISATAP packet. (CVE 2010-0812) Windows VB script vulnerable Fixes remote code execution vulnerability which exists due to the way VB Script interacts with help files in Internet Explorer. (CVE 106 2000: 980858 10-025 2000: 977816, XP: 977816 (32-bit), 977816 (64-bit), 2003: 977816 (32-bit), 977816 (64-bit), Vista: 977816 (32-bit), 977816 (64-bit), 2008: 977816 (32-bit), 977816 (64-bit) 2000: 980232 XP: 980232, 980232 (64-bit) 2003: 980232, 980232 (64-bit), 980232 (Itanium) Vista: 980232, 980232 (64-bit) 2008: 980232, 980232 (64-bit), 980232 (Itanium) Windows 7: 980232, 980232 (64-bit) 2008 R2: 980232 (64-bit), 980232 (Itanium) XP: 978338, 978338 (64-bit) 2003: 978338, 978338 (64-bit), 978338 (Itanium) Vista: 978338, 978338 (64-bit) 2008: 978338, 978338 (64-bit), 978338 (Itanium) Apply the appropriate patch 10-026 10-020 10-029 10-022 2010-0483) Windows Authenticode Verification Fixes vulnerabilities which could allow remote code execution when a user modifies an existing signed executable file. (CVE 2010-0486 CVE 2010-0487 ) Windows Media Player ActiveX vulnerability Windows kernel multiple privilege elevation vulnerabilities For Authenticode Signature Verification: 2000 978601 XP 978601 XP x64 978601 2003 978601 2003 x64 978601 Vista 978601 Vista x64 978601 2008 978601 2008 x64 978601 Windows 7 978601 Windows 7 x64 978601 2008 R2 x64 978601 For Cabinet File Viewer: 2000 979309 XP 979309 XP x64 979309 2003 979309 2003 x64 979309 Vista 979309 Vista x64 979309 2008 979309 2008 x64 979309 Windows 7 979309 Windows 7 x64 979309 2008 R2 x64 979309 Fixes a vulnerability in Windows 2000 979402 Media Player 9 series which could XP SP2 allow remote code execution. (CVE 979402 2010-0268 ) XP SP3 979402 Fixes multiple vulnerabilities which 2000 SP 4 allow authenticated users to elevate 979559 privileges on Windows 2000, XP SP 2 & Windows XP, Windows Server SP 3 979559 2003, Windows Vista, Windows XP x64 SP 2 Server 2008, and Windows 7. 979559 107 10-019 10-027 (superseded by 10-082 on XP SP3) 10-032 (CVE 2010-0484 CVE 2010-0485 CVE 2010-1255) Multiple ActiveX Control vulnerabilities 2003 SP 2 979559 2003 x64 SP 2 979559 2003 SP2 Itanium 979559 Vista SP 1 & SP 2 979559 Vista x64 SP 1 & SP 2 979559 2008 32 SP 2 979559 2008 x64 SP 2 979559 2008 Itanium SP 2 979559 Windows 7 32-bit 979559 Windows 7 x64-based 979559 2008 R2 x64 979559 2008 R2 Itanium 979559 ActiveX:980195 10-034 Fixes multiple vulnerabilities in Windows Data Analyzer ActiveX Control and Internet Explorer 8 Development Tools ActiveX Control that could allow an attacker to execute arbitrary code. (CVE 2010-0252 CVE 2010-0811) Windows Media decompression Fixes multiple vulnerabilities in 10-033 10-033 vulnerabilities DirectX, Windows Media Format (KB975562 and Encoder, and Asycfilt.dll superseded by allowing command execution when MS13-011 on invalid compression data in media Windows XP and files is processed. (CVE 2010-1879 Windows Server CVE 2010-1880) 2003) MS10-039 fixes toStaticHTML InfoPath 2003, 2007, and InfoPath 2003: 10-039 Information Disclosure Vulnerability SharePoint Server 2007 have a KB980923 vulnerability in the way InfoPath 2007: toStaticHTML sanitizes HTML KB979441 content in Microsoft SharePoint. (CVE 2010-1257) Windows Help and Support Center The MPC:HexToNum function in XP: KB2229593 10-042 trusted document whitelist bypass helpctr.exe in Windows Help XP Pro x64: and Support Center on Windows KB2229593 XP and Windows Server 2003 2003: does not properly handle malformed KB2229593 escape sequences, thereby allowing 2003 x64: a remote attacker to bypass the KB2229593 trusted documents whitelist and 2003 Itanium: 108 execute arbitrary commands if a KB2229593 user is enticed to open a specially crafted hcp:// URL. (CVE 2010-1885) Canonical Display Driver vulnerable Windows 7 and Windows Server Windows 10-043 version 2008 R2 contain an integer 7:KB2032276 overflow vulnerability in the 2008 canonical display driver that could R2:KB2032276 allow an attacker to cause a denial of service or take complete control of the system. (CVE 2009-3678) Microsoft Windows Shell Remote A remote code execution XP: 2286198 10-046 Code Execution Vulnerability vulnerability exists in Windows 2003: 2286198 Shell, a component of Microsoft Vista: 2286198 Windows. The vulnerability exists 2008: 2286198 because Windows incorrectly parses 7: 2286198 shortcuts in such a way that 2008 R2: malicious code may be executed 2286198 when the icon of a specially crafted shortcut is displayed. This vulnerability is most likely to be exploited through removable drives. (CVE 2010-2568) Microsoft Windows Shell Remote A remote code execution XP: 2691442 12-048 Code Execution Vulnerability vulnerability exists in Windows 2003: 2691442 Shell, a component of Microsoft Vista: 2691442 Windows. The vulnerability exists 2008: 2691442 because Windows incorrectly 7: 2691442 handles files and directories with 2008 R2: specially crafted names. Attackers 2691442 can use this vulnerability to gain complete control of the system if a user is logged on with administrative user rights. (CVE 2012-0175) Over-the-network SMB packet Fixes 3 vulnerabilities announced in XP: 982214 10-054 vulnerabilities in Windows Microsoft bulletin MS10-054, the 2003: 982214 most critical of which could allow Vista: 982214 remote code execution. (CVE 2008: 982214 2010-2550 CVE 2010-2551 CVE 7: 982214 2010-2552) 2008 R2: 982214 Windows cinepak codec Fixes a vulnerability in windows XP: 982665 10-055 decompression vulnerability cinepak codec triggered by a user (32-bit) 982665 opening a malformed media file. (64-bit) (CVE 2010-2553) Vista: 982665 (32-bit) 982665 (64-bit) 7: 982665 (32-bit) 982665 (64-bit) TCP/IP authenticated user Fixes 2 vulnerabilities announced in Vista: 978886 10-058 privilege escalation or Microsoft bulletin MS10-058. (CVE 2008: 978886 unauthenticated denial of service 2010-1892 CVE 2010-1893) 7: 978886 2008 R2: 978886 109 Windows MPEG Layer-3 Audio Decoder Buffer Overflow Vulnerability A remote code execution XP: 2115168 vulnerability exists in the way that (32-bit), 2115168 Microsoft DirectShow MP3 filter (64-bit) handles supported format files. An 2003: 2115168 attacker who successfully exploited (32-bit), 2115168 this vulnerability could gain the (64-bit) same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (CVE 2010-1882) Windows Tracing Feature for Fixes a vulnerability in the Windows Vista: 982799 Services Tracing Feature for Services 2008: 982799 feature which allowed for local code 7: 982799 execution. A local user account is 2008 R2: required. (CVE 2010-2554, CVE 982799 2010-2555) Windows kernel vulnerable version Fixes multiple vulnerabilities which XP: KB2393802 allow authenticated users to elevate 2003: privileges on Windows 2000, KB2393802 Windows XP, Windows Server Vista: 2003, Windows Vista, Windows KB2393802 Server 2008, and Windows 7. 2008: (CVE 2010-0232 CVE 2010-0233 KB2393802 CVE 2010-0234 CVE 2010-0235 Windows 7: CVE 2010-0236 CVE 2010-0237 KB2393802 CVE 2010-0238 CVE 2010-0481 CVE 2010-0481 CVE 2010-0482 CVE 2010-0810) Fixes three vulnerabilities in the Windows kernel. A data initialization bug may be exploited when creating new threads. A double free error may be exploited during error handling. These two vulnerabilities may allow a local attacker to execute arbitrary code in kernel mode. A kernel object ACL validation routine lacks sufficient sanity checking, which may allow a local attacker to cause the system to reboot or become unresponsive. (CVE 2010-1888 CVE 2010-1889 CVE 2010-1890) Also fixes vulnerabilities which could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. 110 10-052 10-059 10-021 10-047 11-011 Windows kernel multiple privilege elevation vulnerabilities (CVE 2010-4398 CVE 2011-0045) Fixes multiple vulnerabilities which allow authenticated users to elevate privileges on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows Server 2008 R2, and Windows 7. (CVE 2010-1887 CVE 2010-1894 CVE 2010-1895 CVE 2010-1896 CVE 2010-1897) XP 2160329 10-048 XP x64 2160329 2003 2160329 2003 x64 2160329 2003 Itanium 2160329 Vista 2160329 Vista x64 2160329 2008 2160329 2008 x64 2160329 2008 Itanium 2160329 Windows 7 2160329 Windows 7 x64 2160329 2008 R2 x64 2160329 2008 R2 Itanium 2160329 TAPI 982316 2264072 Microsoft Windows Service Isolation Fixed a vulnerability which Bypass Local Privilege Escalation leverages the Windows Service Isolation feature to gain elevation of privilege. (CVE 2010-1886) Microsoft Windows Insecure Library A remote attacker could execute Disable loading of 2269637 Loading vulnerability DLL preloading attacks through an libraries from SMB share or WebDAV. WebDAV and remote network shares as described in Microsoft KB 2264107. WordPad Word 97 Text Converter Fixes a vulnerability in XP 2259922 10-067 Memory Corruption Vulnerability mswrd8.wpc which could allow XP x64 remote code execution. (CVE 2259922 2010-2563) 2003 2259922 2003 x64 2259922 Print Spooler Service remote code Fixes a remote code execution XP 975558 10-061 execution vulnerability vulnerability that exists due to the XP x64 975558 way the Print Spooler Service 2003 975558 handles data sent over RPC calls. 2003 x64 (CVE 2010-2729) 975558 Vista 975558 Vista x64 975558 2008 975558 2008 x64 975558 111 MPEG 4 remote code execution vulnerability Active Directory LDAP LSASS privilege elevation vulnerability Windows RPC Memory Corruption vulnerability Uniscribe Font Parsing Engine Memory Corruption 7 975558 7 x64 975558 2008 R2 975558 Fixes a remote code execution XP 975558 vulnerability that exists due to the XP x64 975558 way the MPEG-4 codec handles 2003 975558 supported format files. (CVE 2003 x64 2010-0818) 975558 Vista 975558 Vista x64 975558 2008 975558 2008 x64 975558 Fixes a remote authenticated ADAM Client privilege elevation vulnerability that Patches exists due to a heap overflow in XP 982000 the handling of LDAP messages in 2003 982000 the LSASS service. (CVE 2003 x64 2010-0820) 982000 Active Directory Patches 2003 981550 2003 x64 981550 2003 Itanium 981550 Vista 981550 Vista x64 981550 2008 981550 2008 x64 981550 7 981550 7 x64 981550 2008 R2 x64 981550 An unauthenticated remote code XP: 982802 execution vulnerability exists in the (32-bit), 982802 way that the Remote Procedure (64-bit) Call (RPC) client implementation 2003: 982802 allocates memory when parsing (32-bit), 982802 specially crafted RPC responses. (64-bit), 982802 An attacker who successfully (Itanium) exploited this vulnerability could execute arbitrary code and take complete control of an affected system. (CVE 2010-2567) Fixes a memory corruption XP: 981322 vulnerability that exists because (32-bit), 981322 Windows and Office incorrectly (64-bit) parse specific font types. The 2003: 981322 112 10-062 10-068 10-066 10-063 vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. (CVE 2010-2738) (32-bit), 981322 (64-bit), 981322 (Itanium) Vista: 981322 (32-bit), 981322 (64-bit) 2008: 981322 (32-bit), 981322 (64-bit), 981322 (Itanium) Office XP: 2288608 Office 2003: 2288613 2007 Office Suite: 2288621 Windows MFC Document Title Fixes a vulnerability in the Windows XP: 2387149 10-074 Update vulnerability MFC libraries which could allow (32-bit), 2387149 remote code execution if an (64-bit) attacker is able to control the title of 2003: 2387149 an application written using the (32-bit), 2387149 Microsoft Foundation Class (MFC) (64-bit) Library. (CVE 2010-3227) Vista: 2387149 (32-bit), 2387149 (64-bit) 2008: 2387149 (32-bit), 2387149 (64-bit) 7: 2387149 (32-bit), 2387149 (64-bit) 2008 R2: 2387149 (64-bit) Windows Media Player Network Fixes a vulnerability in Windows Vista 2281679, 10-075 Sharing Service vulnerability Media Player Network Sharing 2281679 (64-bit) Service which could allow remote Windows 7 code execution if an attacker sends 2281679, a specially crafted RTSP packet to 2281679 (64-bit) an affected system. (CVE 2010-3225) Embedded OpenType Font Engine Fixes a vulnerability in Windows XP: 982132 10-076 vulnerability which could allow remote code (32-bit), 982132 execution if an attacker gets a user (64-bit) to open a document containing a 2003: 982132 malicious embedded open-type font. (32-bit), 982132 (CVE 2010-1883) (64-bit) Vista: 982132 (32-bit), 982132 (64-bit) 2008: 982132 (32-bit), 982132 (64-bit) 7: 982132 (32-bit), 982132 113 Windows Common Control Library SVG vulnerability Windows LPC Elevation of Privilege vulnerability Microsoft Windows JIT remote code execution vulnerability Windows SChannel Denial of Service vulnerability Vulnerability in windows shared cluster disks Elevation of Privilege Vulnerability in SharePoint Foundation 2010 (64-bit) 2008 R2: 982132 (64-bit) Fixes a vulnerability in Windows XP: 2296011 10-081 which could allow remote code (32-bit), 2296011 execution if an attacker gets a user (64-bit) to open a document containing a 2003: 2296011 malicious Scalable Vector Graphic (32-bit), 2296011 image using a variety of third-party (64-bit) image viewers or editors. (CVE Vista: 2296011 2010-2746) (32-bit), 2296011 (64-bit) 2008: 2296011 (32-bit), 2296011 (64-bit) 7: 2296011 (32-bit), 2296011 (64-bit) 2008 R2: 2296011 (64-bit) Fixes a vulnerability that could allow XP: 2360937, 10-084 elevation of privilege if an attacker 2360937 (64-bit) logs on to an affected system and 2003: 2360937, runs specially crafted code that 2360937 (64-bit), sends an LPC message to the 2360937 (Itanium) local LRPC Server. (CVE 2010-3222) Fixes a vulnerability in Microsoft All: KB 2160841 10-077 Windows x64 .NET 4 framework that could allow arbitrary code execution. (CVE 2010-3228) Fixes a vulnerability in the Secure Vista: 2207566, 10-085 Channel (SChannel) security 2207566 (64-bit) package in Windows which could 2008: 2207566, allow denial of service if an affected 2207566 (64-bit), Internet Information Services (IIS) 2207566 (Itanium) server hosting a Secure Sockets Windows 7: Layer (SSL)-enabled web site 2207566, receives a specially crafted packet 2207566 (64-bit) message. (CVE 2010-3229) 2008 R2: 2207566 (64-bit), 2207566 (Itanium) Fixes a vulnerability in windows 2008 R2: 10-086 shared cluster disks due to incorrect 2294255 (64-bit), permission handling that could allow 2294255 (Itanium) unauthorized users to read, write, and delete administrative shares on a failover cluster disk. (CVE 2010-3223) Fixes multiple elevation of privilege SharePoint 13-024 vulnerabilities caused due to an Foundation error in the way the user input is 2010: 2687418 parsed. (CVE 2013-0080, CVE 2013-0084, CVE 2013-0085) 114 SharePoint, Groove and Sharepoint This update resolves multiple Microsoft 10-072 Services multiple Vulnerabilities Information Disclosure vulnerabilities Windows in Microsoft SharePoint and SharePoint Windows SharePoint Services. The Services 3.0 vulnerability can be triggered if an SP2: attacker submits a specially crafted 2345304 (32 Bit) script to a target site that uses or 2345304 (64 SafeHTML. (CVE 2010-3243, Bit) CVE 2010-3324) Microsoft Office SharePoint Server 2007 SP2: 2345212 (32 Bit) or 2345212 (64 Bit) Microsoft SharePoint Foundation 2010: 2345322 Microsoft Groove Server 2010: 2346298 Microsoft Office Web Apps: 2346411 Windows kernel multiple privilege Fixes multiple vulnerabilities which XP: 981957 10-073 elevation vulnerabilities allow authenticated users to elevate (32-bit), 981957 privileges on Windows XP, (64-bit) Windows Server 2003, Windows 2003: 981957 Vista, Windows Server 2008, (32-bit), 981957 Windows Server 2008 R2, and (64-bit), 981957 Windows 7. (CVE 2010-2549 (Itanium) CVE 2010-2743 CVE 2010-2744) Vista: 981957 (32-bit), 981957 (64-bit) 2008: 981957 (32-bit), 981957 (64-bit), 981957 (Itanium) Win 7: 981957 (32-bit), 981957 (64-bit) 2008 R2: 981957 (64-bit), 981957 (Itanium) Windows Shell validation Fixes a vulnerability in a way Vista: 979688 10-083 vulnerability Windows Shell validate COM object (32-bit), 979688 instantiation. (CVE 2010-1263) (64-bit) 2008: 979688 (32-bit), 979688 (64-bit), 979688 115 Windows Wordpad COM validation Fixes a vulnerability in a way vulnerability WordPad validate COM object instantiation. (CVE 2010-1263) Memory Corruption Vulnerability in Fixes a memory corruption Windows Media Player 9.x, 10.x, vulnerability in Windows Media 11.x Player (WMP). The vulnerability can be triggered if an attacker is able to entice their victim into opening specially crafted media content from a malicious web site. A successful attack would result in the attacker executing code in the context of the logged in user. (CVE 2010-2745) 116 (Itanium) Win 7: 979688 (32-bit, 979688 (64-bit) 2008 R2: 979688 (64-bit), 979688 (Itanium)) XP: 979687 10-083 (32-bit), 979687 (64-bit) 2003: 979687 (32-bit), 979687 (64-bit), 979687 (Itanium) Vista: 979687 (32-bit), 979687 (64-bit) 2008: 979687 (32-bit), 979687 (64-bit), 979687 (Itanium) Win 7: 979687 (32-bit), 979687 (64-bit) 2008 R2: 979687 (64-bit), 979687 (Itanium) XP: 2378111 10-082 (WMP 9, 10 or 11) XP 64-bit: 2378111 (WMP 10) or 2378111 (WMP 11) 2003 SP2: 2346411 (WMP 10) 2003 SP2 64-bit: 2346411 (WMP 10) Vista SP1 and SP2: 2346411 (WMP 11) Vista SP1 and SP2 64-bit: 2346411 (WMP 11) 2008 and SP2: 2346411 (WMP 11) 2008 and SP2 64-bit: 2346411 (WMP 11) 7: 2346411 (WMP 12) 7 64-bit: 2346411 (WMP 12) 2008 R2 64-bit: 2346411 (WMP 12) Forefront Unified Access Gateway Fixes several cross-site scripting UAG 2010: Cross-Site Scripting vulnerabilities and one redirection KB2433585 spoofing vulnerability in Forefront UAG 2010 Unified Access Gateway (UAG). Update 1: The vulnerability may be triggered KB2433584 if an attacker is able to entice their UAG 2010 victim into clicking a specially crafted Update 2: link. A successful attack would result KB2418933 in the attacker making requests to the UAG server in the context of the victim's logged in session. (CVE 2010-2732) (CVE 2010-2733) (CVE 2010-2734) (CVE 2010-3936) Windows kernel NDProxy privilege Fixes a buffer overflow vulnerability XP: 2440591 elevation vulnerability which could allow privilege elevation 2003: 2440591 when a local user runs a specially crafted application. (CVE 2010-3963) Windows kernel multiple privilege Fixes multiple vulnerabilities which XP:KB2567053 elevation vulnerabilities fixed by could allow privilege elevation and 2003:KB256705 MS11-077 this vulnerability could allow an 3 attacker to run arbitrary code in Vista:KB256705 kernel mode, then install programs; 3 view, change, or delete data; or 2008:KB256705 create new accounts with full 3 administrative rights. (CVE Win 2011-1874, CVE 2011-1875, CVE 7:KB2567053 2011-1876, CVE 2011-1877, CVE 2011-1878, CVE 2011-1879, CVE 2011-1880, CVE 2011-1881, CVE 2011-1882, CVE 2011-1883, CVE 2011-1884, CVE 2011-1885, CVE 2011-1886, CVE 2011-1887, CVE 2011-1888, CVE 2011-1985, CVE 2011-2002, CVE 2011-2003, CVE 2011-2011.) Windows kernel multiple privilege Fixes multiple vulnerabilities which XP: 2436673 elevation vulnerabilities fixed by could allow privilege elevation when 2003: 2436673 MS10-098 a local user runs a specially crafted Vista: 2436673 application. (CVE 2010-3939, CVE 2008: 2436673 2010-3940, CVE 2010-3941, CVE 7: 2436673 2010-3942, CVE 2010-3943, CVE 2008 R2: 2010-3944) 2436673 Windows Movie Maker insecure Fixes a vulnerability which could Vista: 2424434 library loading vulnerability allow command execution when a user loads a document from an untrusted remote location. (CVE 117 10-089 10-099 11-054 11-077 10-098 10-093 2010-3967) Windows Live DLL Injection Fixes a local DLL injection Vulnerability vulnerability in the Webio.dll that is used by many Windows Live applications, as well as other Microsoft applications. This vulnerability may be exploited to allow a remote attacker to trick a user into opening a file opened by the vulnerable applications. If the file is located on a Windows file share or a WebDAV HTTP file share, the attacker can overwrite libraries that the application dynamically loads at run time with a payload of their choosing. (CVE 2010-3966) Windows Consent UI Impersonation Fixes a privilege elevation vulnerability vulnerability which allows an authenticated user with SeImpersonatePrivilege to execute code with LocalSystem privilege. (CVE 2010-3961) Windows Task Scheduler Privilege Windows Task Scheduler does not Elevation Vulnerability validate whether or not scheduled tasks run within the intended security context properly. An attacker could run arbitrary code with system privileges. (CVE 2010-3338) Windows Media Encoder insecure library loading vulnerability Fixes a vulnerability which could allow command execution when a user loads a .prx file located in the same network directory as a specially crafted DLL. (CVE 2010-3965) Insecure Library Loading in Fixes a vulnerability that could allow Internet Connection Signup Wizard remote code execution if a user Could Allow Remote Code opens an .ins or .isp file Execution located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. (CVE 2010-3144) Hyper-V Authenticated DOS Multiple denial of service Vulnerabilities vulnerabilities exist in the Hyper-V 118 7: KB2385678 2008 R2 64-bit KB2385678 10-095 Vista: 2442962 2008: 2442962 7: 2442962 2008R2: 2442962 10-100 Vista: 2305420 Vista 64-bit: 2305420 2008: 2305420 2008 64-bit: 2305420 2008 R2: 2305420 7: 2305420 7 64-bit: 2305420 XP: 2447961 2003: 2447961 Vista: 2447961 2008: 2447961 10-092 10-094 XP: KB2443105 10-097 2003: KB2443105 2008 64-bit: 2525835 10-102 11-047 Netlogon RPC Denial of Service OpenType Font format driver remote code execution Microsoft Graphics Rendering Engine Thumbnail Image Stack Buffer Overflow Backup Manager Insecure Library Loading Vulnerability server that can be exploited by R2: 2525835 sending a crafted packet to the VMBus. Sending such a packet requires the attacker to already be authenticated to a guest virtual machine. (CVE 2010-3960) (CVE 2011-1872) A remote authenticated denial of 2003: 2207559 service vulnerability exists in (32-bit), 2207559 implementations of the Netlogon (64-bit), 2207559 RPC Service on affected versions (Itanium) of Windows Server. An attacker 2008: 2207559 who successfully exploited this (32-bit), 2207559 vulnerability could cause affected (64-bit) versions of the Windows Server to 2008 R2: restart. Only Windows Servers that 2207559 (64-bit) are configured as domain controllers and host the Netlogon service are affected by this vulnerability. (CVE 2010-2742) Fixes three vulnerabilities which XP: KB2485376 could allow remote command 2003: execution on Windows Vista, 2008, KB2485376 and 7, and privilege elevation on Vista: earlier operating systems. (CVE KB2485376 2010-3956 CVE 2010-3957 CVE 2008: 2010-3959) KB2485376 Also fixes a vulnerability in the Windows 7: Windows OpenType Compact Font KB2485376 Format (CFF) driver. The vulnerability could allow remote code execution if a user views content rendered in a specially crafted CFF font. (CVE 2011-0033) Fixes a vulnerability in the Windows XP: 2483185 Graphics Rendering Engine. An (32-bit), 2483185 attacker who successfully exploited (64-bit) this vulnerability could run arbitrary 2003: 2483185 code in the security context of the (32-bit), 2483185 logged-on user. (CVE 2010-3970) (64-bit), 2483185 (Itanium) Vista: 2483185 (32-bit), 2483185 (64-bit) 2008: 2483185 (32-bit), 2483185 (64-bit), 2483185 (Itanium) Fixes a remote code execution Vista: 2478935 vulnerability in the Microsoft (32 bit), 2478935 Windows Backup Manager. An (64 bit) attacker who successfully exploited this vulnerability could take complete control of an affected system and 119 10-101 10-091 11-007 11-006 11-001 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege Windows SMB Server Transaction Vulnerability could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE 2010-3145) Fixes vulnerabilities which could XP: KB2506223 11-034 allow elevation of privilege if an 2003: 11-012 attacker logged on locally and ran a KB2506223 specially crafted application. An Vista: attacker must have valid logon KB2506223 credentials and be able to log on 2008: locally to exploit these vulnerabilities.KB2506223 (CVE 2011-0662 CVE 2011-0665 Windows 7: CVE 2011-0666 CVE 2011-0667 KB2506223 CVE 2011-0670 CVE 2011-0671 CVE 2011-0672 CVE 2011-0673 CVE 2011-0674 CVE 2011-0675 CVE 2011-0676 CVE 2011-0677 CVE 2011-1225 CVE 2011-1226 CVE 2011-1227 CVE 2011-1228 CVE 2011-1229 CVE 2011-1230 CVE 2011-1231 CVE 2011-1232 CVE 2011-1233 CVE 2011-1234 CVE 2011-1235 CVE 2011-1236 CVE 2011-1237 CVE 2011-1238 CVE 2011-1239 CVE 2011-1240 CVE 2011-1241 CVE 2011-1242) Also fixes five vulnerabilities which could allow elevation of privileges if an attacker logged on locally and was able to execute a specially crafted program. (CVE 2011-0086 CVE 2011-0087 CVE 2011-0088 CVE 2011-0089 CVE 2011-0090) Fixes multiple vulnerabilities in SMB XP: 2508429 11-020 server and SMB client which could (32-bit), 2508429 allow remote code execution. (CVE (64-bit) 2011-0661) 2003: 2508429 (32-bit), 2508429 (64-bit), Vista: 2508429 (32-bit), 2508429 (64-bit), 2008: 2508429 (32-bit), 2508429 (64-bit), Windows 7: 2508429 (32-bit), 2508429 (64-bit), Windows 7 SP1: 2508429 (32-bit), 2508429 (64-bit), 2008 R2: 2508429 (64-bit), 120 2008 R2 SP1: 2508429 (64-bit) Microsoft Data Access Component Fixes two vulnerabilities which could XP: 2419632 remote code execution (MS11-002) allow remote execution in the way it (32-bit), 2419632 validates third-party API usage and (64-bit) memory allocation. (CVE 2003: 2419635 2011-0026 CVE 2011-0027) (32-bit), 2419635 (64-bit), Vista: 2419640 (32-bit), 2419640 (64-bit), 2008: 2419640 (32-bit), 2419640 (64-bit), Windows 7: 2419640 (32-bit), 2419640 (64-bit), 2008 R2: 2419640 (64-bit) Windows DNS Resolution Fixes a vulnerability in the DNS XP: 2509553 Vulnerability client which could allow remote code (32-bit), 2509553 execution if an attacker is able to (64-bit) deliver specially crafted LLMNR 2003: 2509553 broadcast packets to the target (32-bit), 2509553 system. (CVE 2011-0657) (64-bit), Vista: 2509553 (32-bit), 2509553 (64-bit), 2008: 2509553 (32-bit), 2509553 (64-bit), Windows 7: 2509553 (32-bit), 2509553 (64-bit), 2008 R2 SP1: 2509553 (64-bit) Windows Active Directory SPN Fixes a vulnerability which could 2003: 2478953 validation denial of service allow an administrator on a computer in the domain to downgrade the target from Kerberos to NTLM, possibly leading to a denial of service. (CVE 2011-0040) Windows LSASS length validation Fixes a privilege elevation XP: 2478960 vulnerability vulnerability which could allow an 2003: 2478960 authenticated user to take complete control of the system. (CVE 2011-0039) Vulnerabilities in DirectShow and Fixes remote code execution XP: 2502898 Windows Media Player vulnerabilities in DirectShow and (Windows XP Windows Media Player. (CVE Media Center 2011-0032 CVE 2011-0042) Edition 2005), 2479943 (32-bit), 2479943 (Pro 121 11-002 11-030 11-005 11-014 11-015 Vulnerabilities in Windows Media Center TV Pack JScript and VBScript information disclosure vulnerability Fixes remote code execution vulnerabilities in Windows Media Center TV Pack. (CVE 2011-0032 CVE 2011-0042) Fixes an information disclosure vulnerability due to a memory corruption error. (CVE 2011-0031) Windows Remote Desktop Insecure Fixes a vulnerability which could Library Loading Vulnerability allow remote code execution if a user opens a legitimate Remote Desktop configuration (.rdp) file located in the same network folder as a specially crafted library file. (CVE 2011-0029) Windows MHTML Script Injection Vulnerability Fixes a vulnerability which could allow an attacker to run MIME-formated MHTML requests in the wrong security context. This may result in an information disclosure, similar to a cross-site scripting attack. (CVE 2011-0096) 122 64-bit) Vista: 2479943 (32-bit), 2479943 (64-bit) Win 7: 2479943 (32-bit), 2479943 (64-bit) 2008 R2: 2479943 (64-bit) Vista: 2494132 11-015 (32-bit), 2494132 (64-bit) Win 7: 2475792 11-009 (32-bit) 2475792 (64-bit) 2008 R2: 2475792 XP: 2483618 970927 (32-bit 5.2), 2481109 (32-bit 6.1), 2481109 (64-bit 6.0), 2483614 (32-bit 7.0) 2003: 2481109 (32-bit) 6.0, 2481109 (64-bit) 6.0 Vista: 2481109 (32-bit) 6.1, 2481109 (64-bit) 6.1, 2483614 (32-bit) 7.0, 2483614 (64-bit) 7.0 2008: 2481109 (32-bit) 6.1, 2481109 (64-bit) 6.1 Win 7: 2483614 (32-bit) 7.0, 2483614 (64-bit) 7.0 2008 R2: 2483614 (64-bit) 7.0 XP:2503658 11-026 (32-bit), 2503658 (64-bit) 2003:2503658 (32-bit), 2503658 (64-bit) Vista:2503658 (32-bit), 2503658 (64-bit) 2008:2503658 (32-bit), 2503658 (64-bit) Win 7:2503658 (32-bit), 2503658 (64-bit) 2008 R2:2503658 (64-bit) ActiveX:KB250 11-027 8272 Multiple ActiveX Control vulnerabilities Fixes multiple vulnerabilities in WMITools ActiveX Control, Internet Explorer 8 Development Tools ActiveX Control, and Windows Messenger ActiveX Control that could allow an attacker to execute arbitrary code. (CVE 2010-0811 CVE 2010-3973 CVE 2011-1243) Windows Fax Cover Page Remote Fixes a vulnerability in Windows XP 11-024 Code Execution Vulnerability Fax Cover Page Editor which 32-bit:2491683 (MS11-024) improperly parses malformed cover and 2506212 pages. Successful exploitation could XP give the attacker the same 64-bit:2491683 privileges as the logged on user. and 2506212 (CVE 2010-3974 CVE 2010-4701) 2003 32-bit:2491683 and 2506212 2003 64-bit:2491683 and 2506212 Vista 32-bit:2491683 and 2506212 Vista 64-bit:2491683 and 2506212 2008 32-bit:2491683 and 2506212 2008 64-bit:2491683 and 2506212 Windows 7 32-bit:2491683 and 2506212 Windows 7 64-bit:2491683 and 2506212 2008 R2:2491683 and 2506212 123 Windows GDI+ Integer Overflow Fixes a vulnerability which could allow remote code execution if the user opens a specially crafted Windows Enhanced Metafile (EMF) image file. (CVE 2011-0041) XP: 2412687, 11-029 2412687 (64-bit) 2003: 2412687, 2412687 (64-bit) Vista: 2412687, 2412687 (64-bit) 2008: 2412687, 2412687 (64-bit) Windows SMB Client vulnerabilities Fixes vulnerabilities which could XP: 2511455, 11-019 allow remote code execution if an 2511455 (64-bit) attacker sent a specially crafted 2003: 2511455, SMB response to a client-initiated 2511455 (64-bit) SMB request. To exploit these Vista: 2511455, vulnerabilities, an attacker must 2511455 (64-bit) convince the user to initiate an 2008: 2511455, SMB connection to a specially 2511455 (64-bit) crafted SMB server. (CVE Windows 7: 2011-0654 CVE 2011-0660) 2511455, 2511455 (64-bit) 2008 R2: 2511455 (64-bit) WordPad Text Converter Fixes a vulnerability which could XP 2485663, 11-033 Vulnerability allow remote code execution if a 2485663 (64-bit) user opens a specially crafted Word 2003 2485663, file that includes a malformed 2485663 (64-bit) structure. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE 2011-0028) Windows OpenType CFF Fixes a vulnerability which could XP 2507618, 11-032 vulnerability allow remote code execution in the 2507618 (64-bit) way that the OpenType Font 2003 2507618, (OTF) driver improperly parses 2507618 (64-bit) specially crafted OpenType fonts. Vista: 2507618, An attacker could then install 2507618 (64-bit) programs; view, change, or delete 2008: 2507618, data; or create new accounts with 2507618 (64-bit) full user rights. (CVE 2011-0034) Windows 7: 2507618, 2507618 (64-bit) 2008 R2: 2507618 (64-bit) Ancillary Function Driver Fixes a vulnerability in the Microsoft XP 2503665, 11-046 Windows Ancillary Function Driver 2503665 (64-bit) (AFD). A local user with valid login 2003 2503665, credentials could exploit this 2503665 (64-bit) vulnerability to elevate privileges by Vista 2503665, executing a specially crafted 2503665 (64-bit) application. (CVE 2011-1249) 2008 2503665, 2503665 (64-bit) Windows 7: 2503665, 2503665 (64-bit) 124 2008 R2: 2503665 (64-bit) Ancillary Function Driver Fixes a vulnerability in the Microsoft XP 2592799, 11-080 Windows Ancillary Function Driver 2592799 (64-bit) (AFD). A local user with valid login 2003 2592799, credentials could exploit this 2592799 (64-bit) vulnerability to elevate privileges by executing a specially crafted application. (CVE 2011-2005) Ancillary Function Driver Fixes two vulnerabilities in Microsoft XP x64 12-009 Windows. The vulnerabilities could Edition:KB2645 allow elevation of privilege if an 640 attacker logs on to a user's system 2003:KB264564 and runs a specially crafted 0 application. An attacker must have 2003 x64 valid logon credentials and be able Edition:KB2645 to log on locally to exploit the 640 vulnerabilities. (CVE 2012-0148 Vista x64 CVE 2012-0149) Edition:KB2645 640 2008:KB264564 0 Windows 7:KB2645640 2008 R2:KB2645640 Windows SMB Server vulnerability Fixes a vulnerability which could Vista 2536275, 11-048 allow remote denial of service 2536275 (64-bit) attacks from an unauthenticated 2008 2536275, user. (CVE 2011-1267) 2536275 (64-bit) Windows 7: 2536275, 2536275 (64-bit) 2008 R2: 2536275 (64-bit) Windows Distributed File System Fixes a vulnerability which could XP: (32-bit), 11-042 vulnerabilities allow remote denial of service and (64-bit) remote code execution attacks from 2003: (32-bit), an unauthenticated user. (CVE (64-bit) 2011-1868 CVE 2011-1869) Vista: (32-bit), (64-bit) 2008: (32-bit), (64-bit) Windows 7: (32-bit), (64-bit) 2008 R2: (64-bit) Active Directory Certificate Services A reflective cross-site scripting 2003: 2518295 11-051 Web Enrollment Vulnerability vulnerability may allow an attacker 2008: 2518295 to execute scripts under the context 2008 R2: of a user's Internet Explorer client. 2518295 This may allow an attacker to steal session data or perform a phishing attack. (CVE 2011-1264) 125 Windows Kernel-Mode drivers Fixes a vulnerability which could XP: (64-bit), 11-041 remote code execution vulnerability allow remote code execution attacks 2003: (64-bit), by enticing a user to visit a Vista: (64-bit), specially crafted web page. (CVE 2008: (64-bit), 2011-1873) Windows 7: (64-bit), 2008 R2: (64-bit) Forefront Threat Management Fixes a vulnerability which could Forefront 11-040 Gateway Vulnerability allow remote code execution if an TMG: attacker leveraged a client computer KB2520426 to make specific requests on a system where the Threat Management Gateway (TMG) firewall client is used. (CVE 2011-1889) Windows SMB Client vulnerabilities Fixes vulnerabilities which could XP: 2536276, 11-043 allow remote code execution if an 2536276 (64-bit) attacker sent a specially crafted 2003: 2536276, SMB response to a client-initiated 2536276 (64-bit) SMB request. To exploit these 2536276 (Itanium) vulnerabilities, an attacker must Vista: 2536276, convince the user to initiate an 2536276 (64-bit) SMB connection to a specially 2008: 2536276, crafted SMB server. (CVE 2536276 (64-bit) 2011-1268) 2536276 (Itanium) Windows 7: 2536276, 2536276 (64-bit) 2008 R2: 2536276 (64-bit) 2008 R2: 2536276 (Itanium) MHTML Mime-formatted Fixes an information disclosure XP 2544893, 11-037 information disclosure (MS11-037) vulnerability in the way that 2544893 (64-bit) MHTML protocol handler interprets 2003 2544893, MIME-formatted requests. (CVE 2544893 (64-bit) 2011-1894) Vista 2544893, 2544893 (64-bit) 2008 2544893, 2544893 (64-bit) Windows 7 2544893, 2544893 (64-bit) 2008 R2 2544893 (64-bit) Windows OLE Automation Fixes a remote code execution XP 2476490, 11-038 Underflow vulnerability (MS11-038) vulnerability in OLE Automation. 2476490 (64-bit) (CVE 2011-0658) 2003 2476490, 2476490 (64-bit) Vista 2476490, 2476490 (64-bit) 2008 2476490, 2476490 (64-bit) Windows 7 126 2476490, 2476490 (64-bit) 2008 R2 2476490 (64-bit) Windows CSRSS Privilege Fixes a local privilege escalation XP 2567680, Escalation Vulnerability vulnerability in the Windows Client 2567680 (64-bit) /Server Run-time Subsystem 2003 2567680, (CSRSS). Authenticated users may 2567680 (64-bit) be able to execute code under the Vista 2567680, context of other users. (CVE 2567680 (64-bit) 2011-1967) 2008 2567680, 2567680 (64-bit) Windows 7 2567680, 2567680 (64-bit) 2008 R2 2567680 (64-bit) Elevation of Privilege Vulnerabilities Fixes a vulnerability in Remote XP 2566454, in Windows (MS11-062) Access Service NDISTAPI driver. 2566454 (64-bit) (CVE 2011-1974) 2003 2566454, 2566454 (64-bit) Microsoft Remote Desktop Protocol If the Remote Desktop Protocol is XP 32-bit SP3 Denial of Service Vulnerability enabled but not patched, a 2570222 (MS11-065) maliciously-crafted sequence of XP 64-bit SP2 RDP packets sent by a remote, 2570222 unauthenticated attacker could cause2003 32-bit a denial of service and possibly SP2 2570222 restart the target system. (CVE 2003 64-bit 2011-1968) SP2 2570222 2003 Itanium SP2 2570222 Microsoft Active Accessibility A remote code execution XP: 2564958 Insecure Library Loading vulnerability exists in the way that (32-bit), 2564958 Vulnerability the Microsoft Active Accessibility (64-bit) component handles the loading of 2003: 2564958 DLL files. An attacker who (32-bit), 2564958 successfully exploited this (64-bit) vulnerability could take complete Vista: 2564958 control of an affected system. (32-bit), 2564958 (CVE 2011-1247) (64-bit) 2008: 2564958 (32-bit), 2564958 (64-bit) Win 7: 2564958 (32-bit), 2564958 (64-bit) 2008 R2: 2564958 (64-bit) Windows Media Center Remote A remote code execution Vista: 2579692 Code Execution Vulnerability vulnerability exists in the way that (32-bit), 2579692 Windows Media Center handles the (64-bit) loading of DLL files. An attacker who successfully exploited this vulnerability could take complete 127 11-063 11-062 11-065 11-075 11-076 control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. (CVE 2011-2009) Microsoft Data Access Component A remote code execution Windows 7: Insecure Library Loading vulnerability exists in the way that 2560656 (32-bit), Vulnerability the Windows Data Access Tracing 2560656 (64-bit) component handles the loading of 2008 R2: DLL files. An attacker who 2560656 (64-bit) successfully exploited this vulnerability could take complete control of an affected system. (CVE 2011-1975) Windows Kernel Metadata Parsing A denial of service vulnerability Vista: 2556532 DOS Vulnerability exists in Windows due to the way (32-bit), 2556532 the kernel parses file meta-data (64-bit) when browsing to a folder. An 2008: 2556532 attacker who successfully exploited (32-bit), 2556532 this vulnerability could cause the (64-bit) affected system to crash. (CVE Windows 7: 2011-1971) 2556532 (32-bit), 2556532 (64-bit) 2008 R2: 2556532 (64-bit) Windows Kernel Exception Handler A privilege elevation vulnerability XP: 2633171 Vulnerability exists in Windows due to the (32-bit) kernel's failure to initialize some 2003: 2633171 objects in memory. An attacker (32-bit) would have to log on locally to an Vista: 2633171 affected system and run a specially (32-bit) crafted application designed to 2008: 2633171 exploit the vulnerability. The (32-bit) vulnerability could not be exploited Windows 7: remotely or by anonymous users. 2633171 (32-bit) (CVE 2011-2018) Windows IME Library Injection An insecure library loading XP: 2570947 Vulnerability vulnerability exists in several (32-bit), 2570947 Windows components. An attacker (64-bit) may exploit this vulnerability by 2003: 2570947 placing a malicious library file (DLL) (32-bit), 2570947 in the same folder as documents (64-bit) with the following extensions: .txt, Vista: 2570947 .rft, .doc. (CVE 2011-1991) (32-bit), 2570947 (64-bit) 2008: 2570947 (32-bit), 2570947 (64-bit) Windows 7: 128 11-059 11-068 (superseded by 11-098 on 32-bit versions of Windows Vista, Windows Server 2008, and Windows 7) 11-098 11-071 Forefront Unified Access Gateway Cross-Site Scripting and Java Applet Windows Active Directory LDAPS Authentication Bypass Vulnerability in Windows Kernel-Mode Drivers Could cause a Denial of Service Windows TCP/IP Elevation of Privilege and Firewall Bypass Vulnerabilities (MS12-032) 2570947 (32-bit), 2570947 (64-bit) 2008 R2: 2570947 (64-bit) Fixes several cross-site scripting UAG 2010: 11-079 vulnerabilities and one client 2522482, browser JAVA applet vulnerability 2522483 in Forefront Unified Access (Update1), Gateway (UAG). The XSS 2522484 vulnerabilities may be triggered if an (Update2), attacker is able to entice their victim 2522485 (SP1) into clicking a specially crafted link. A successful attack would result in the attacker making requests to the UAG server in the context of the victim's logged in session. The JAVA applet vulnerability may allow an attacker to compromise an end-user's work station if they can convince the user view a page containing malicious content. (CVE 2011-1895) (CVE 2011-1896) (CVE 2011-1897) (CVE 2011-1969) (CVE 2011-2012) Fixes a vulnerability in Windows XP: ADAM: 11-086 Active Directory, Active Directory 2616310, Application Mode (ADAM), and 2616310 (64-bit) Active Directory Lightweight 2003: AD: Directory Service (AD LDS) that 2601626, could allow privilege elevation if (a) 2601626 (64-bit); Active Directory is configured to ADAM: use LDAP over SSL (LDAPS) 2616310, and (b) an attacker acquires a 2616310 (64-bit) revoked certificate that is associated Vista: AD LDS: with a valid domain account and 2601626, then uses that revoked certificate to 2601626 (64-bit) authenticate to the Active Directory 2008: AD & domain. By default, Active AD LDS: Directory is not configured to use 2601626, LDAP over SSL. (CVE 2601626 (64-bit) 2011-2014) 7: AD LDS: 2601626, 2601626 (64-bit) 2008 R2: AD & AD LDS: 2601626 Fixes a vulnerability in Windows KB2617657 11-084 Kernel-Mode Drivers that could Win 7: 32-bit, cause a denial of service when 64-bit opening specially crafted true types 2008 R2: 64-bit, fonts. (CVE 2011-2004) Itanium Fixes two vulnerabilities in Microsoft Vista:KB268833 11-064 Windows. The more severe of 8 11-083 these vulnerabilities could allow Vista x64: 12-032 129 Microsoft Windows Mail Insecure Library Loading Vulnerability Multiple ActiveX Control vulnerabilities Windows TrueType font parsing vulnerability Active Directory and ADAM buffer overflow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. (CVE 2012-0174 CVE 2012-0179) Also fixes two denial of service vulnerabilities in windows TCP/IP stack. (CVE 2011-1871 CVE 2011-1965) Also fixes a remote code execution vulnerability in Windows TCP/IP stack. (CVE 2011-2013 ) A vulnerability in Microsoft Windows Mail and Windows Meeting Space could permit remote code execution using a malicious DLL library. (CVE 2011-2016) KB2688338 2008:KB268833 8 2008 x64:KB2688338 Windows 7:KB2688338 Windows 7 x64: KB2688338 2008 R2 x64: KB2688338 KB2620704 Vista SP2: 32-bit, 64-bit 2008 SP2: 32-bit, 64-bit, Itanium Windows 7 & SP1: 32-bit, 64-bit 2008 R2 & SP1: 64-bit, Itanium Fixes multiple vulnerabilities in the KB2618451 Microsoft Time ActiveX Control XP: 32-bit, that could allow an attacker to gain 64-bit the same privileges as the logged 2003: 32-bit, on user. (CVE 2011-3397) 64-bit, Itanium Vista: 32-bit, 64-bit 2008: 32-bit, 64-bit, Itanium Win 7: 32-bit, 64-bit 2008 R2: 64-bit, Itanium Fixes a vulnerability in Windows KB2639417 Kernel-Mode Drivers that could XP: 32-bit, allow privilege elevation and this 64-bit vulnerability could allow an attacker 2003: 32-bit, to run arbitrary code in kernel 64-bit mode, then install programs; view, Vista: 32-bit, change, or delete data; or create 64-bit new accounts with full administrative 2008: 32-bit, rights. (CVE 2011-3402) 64-bit Win 7: 32-bit, 64-bit 2008 R2: 64-bit Fixes a privilege elevation XP: 2626416 vulnerability which could allow 2003: 2621146 command execution by an attacker (Active Directory) who has credentials to an Active 2003: 2626416 Directory domain. (CVE 2011-3406) (ADAM) Vista: 2621146 130 11-085 11-090 11-087 11-095 Windows Media Player DVR-MS File Parsing Vulnerability Object Linking and Embedding (OLE) Vulnerability Windows Kernel Security Feature Bypass Vulnerability Microsoft Office ClickOnce Vulnerability Windows CSRSS Privilege Escalation Vulnerability Fixes an error in the DirectShow library of Windows Media Center and Media Player where DVR-MS files (with the dvr-ms extension) are improperly parsed. An attacker could leverage this bug to corrupt memory and gain control of execution over the target system. (CVE 2011-3401) Fixes an error in the handling of OLE objects in compound documents. An attacker could leverage this bug to corrupt memory and gain control of execution over the target system. (CVE 2011-3400) Fixes a vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. (CVE 2012-0001) A remote code execution vulnerability exists in the Microsoft Office ClickOnce embedded application feature due to the way Windows validates package contents. (CVE 2012-0013) 2008: 2621146 7: 2621146 2008 R2: 2621146 XP 2619339 Vista 2619339 7 2619339 XP 2624667 2003 2624667 11-092 11-093 2003:KB264461 12-001 5 Vista:KB264461 5 2008:KB264461 5 Win 7:KB2644615 XP: 2584146 12-005 (32-bit), 2584146 (64-bit) 2003: 2584146 (32-bit), 2584146 (64-bit) Vista: 2584146 (32-bit), 2584146 (64-bit) 2008: 2584146 (32-bit), 2584146 (64-bit) Windows 7: 2584146 (32-bit), 2584146 (64-bit) 2008 R2: 2584146 (64-bit) Fixes a local privilege escalation XP 2646524 12-003 vulnerability in the Windows Client 2003 2646524 /Server Run-time Subsystem Vista 2646524 (CSRSS). Authenticated users may 2008 2646524 be able to execute code under the context of other users. (CVE 2012-0005) 131 Windows Object Packager Insecure Fixes a vulnerability in the way that XP: KB2598479 Executable Launching Vulnerability Windows registers and uses the (32-bit), 2603381 Windows Object Packager that (64-bit) could allow remote code execution if 2003: 2603381 a user opens a legitimate file with (32-bit), 2603381 an embedded packaged object that (64-bit) is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. (CVE 2012-0009) Windows Multimedia Library MIDI Fixes a vulnerability in the way that XP: 2628259 Vulnerability Windows Multimedia Library parses (Windows XP MIDI files. Windows Multimedia Media Center Library is used by applications such Edition 2005), as Windows Media Player to work 2598479 (32-bit), with audio and video. An attacker 2598479 (64-bit) who convinces a user to open a 2003: 2598479 specially crafted MIDI file could run (32-bit), 2598479 arbitrary code in the context of the (64-bit) current user. (CVE 2012-0003) Vista: 2598479 (32-bit), 2598479 (64-bit) 2008: 2598479 (32-bit), 2598479 (64-bit) Windows DirectShow media file Fixes a vulnerability in the way that XP: 2631813 parsing vulnerability Windows DirectShow (a component (32-bit), 2631813 of Windows DirectX) handles media (64-bit) files. An attacker who convinces a 2003: 2631813 user to open a specially crafted (32-bit), 2631813 media file could run arbitrary code (64-bit) in the context of the current user. Vista: 2631813 (CVE 2012-0004) (32-bit), 2631813 (64-bit), 2628642 (32-bit), 2628642 (64-bit) 2008: 263183 (32-bit), 2603381 (64-bit) 7: 263183 (32-bit), 263183 (64-bit) 2008R2: 263183 SSL and TLS Protocols A vulnerability exists within the XP 32-bit SP3 Vulnerable Implementation SSL 3.0 and TLS 1.0 protocols 2585542 through which an attacker who has XP 64-bit SP2 access to an active (encrypted) 2585542, SSL connection — a 2638806 “man-in-the-middle” attack — may 2003 32-bit be able to break the encryption and SP2 2585542, read the content being transmitted. 2638806 132 12-002 12-004 12-004 12-006 No actual exploit was known until 2011, when an exploit tool named “BEAST” demonstrated a block-wise chosen-plaintext attack using vulnerable Web browsers and a crafted Web site. SSL 3.0 and TLS 1.0, using CBC mode, are vulnerable. TLS 1.1 and 1.2, and all encryption methods which do not use CBC mode, are unaffected by this vulnerability. (CVE 2011-3389) 2003 64-bit SP2 2585542, 2638806 2003 Itanium SP2 2585542, 2638806 Vista 32-bit SP2 2585542 Vista 64-bit SP2 2585542 2008 32-bit SP2 2585542 2008 64-bit SP2 2585542 2008 Itanium SP2 2585542 W7 32-bit to SP1 2585542 W7 64-bit to SP1 2585542 2008 R2 64-bit to SP1 2585542 2008 R2 Itanium to SP1 2585542 MS Windows Kernel-Mode Drivers Two vulnerabilities exist in KB2660465 12-008 Remote Code Execution kernel-mode drivers which, if XP: 32-bit, Vulnerability exploited, could give an attacker the 64-bit ability to execute arbitrary program 2003: 32-bit, code on the vulnerable computer. 64-bit, Itanium (CVE 2011-5046, CVE Vista: 32-bit, 2012-0154) 64-bit 2008: 32-bit, 64-bit, Itanium Win 7: 32-bit, 64-bit 2008 R2: 64-bit, Itanium Windows Kernel-Mode Drivers Three privately reported XP 13-027 Elevation of Privilege vulnerabilities vulnerabilities in Microsoft Windows 32-bit:KB280798 kernel-mode drivers could allow 6 elevation of privilege if an attacker XP logs on to the system and runs a 64-bit:KB280798 specially crafted application. An 6 attacker must have valid logon 2003 credentials and be able to log on 32-bit:KB280798 locally to exploit this vulnerability. 6 (CVE 2013-1285 CVE 2013-1286 2003 CVE 2013-1287) 64-bit:KB280798 6 Vista 32-bit:KB280798 6 Vista 133 64-bit:KB280798 6 2008 32-bit:KB280798 6 2008 64-bit:KB280798 6 W7 32-bit:KB280798 6 W7 64-bit:KB280798 6 2008 R2:KB2807986 W8 32-bit:KB280798 6 W8 64-bit:KB280798 6 2012:KB280798 6 MS Windows Kernel-Mode Drivers One publicly disclosed and one XP 12-018 Elevation of Privilege vulnerabilities privately reported vulnerability exist 32-bit:KB271852 12-041 in Microsoft Windows kernel-mode 3 12-047 drivers which could allow elevation XP of privilege if an attacker logs on to 64-bit:KB271852 the system and runs a specially 3 crafted application. An attacker must 2003 have valid logon credentials and be 32-bit:KB271852 able to log on locally to exploit this 3 vulnerability. 2003 (CVE 2012-1890 CVE 2012-1893) 64-bit:KB271852 The vulnerabilities could allow 3 elevation of privilege if an attacker Vista logs on to a system and runs a 32-bit:KB271852 specially crafted application. An 3 attacker must have valid logon Vista credentials and be able to log on 64-bit:KB271852 locally to exploit any of these 3 vulnerabilities. (CVE 2012-1864 2008 CVE 2012-1865 CVE 2012-1866 32-bit:KB271852 CVE 2012-1867 CVE 2012-1868) 3 A vulnerability exists in kernel-mode 2008 drivers which, if exploited, could 64-bit:KB271852 give an attacker the ability to 3 execute arbitrary program code on W7 the vulnerable computer. 32-bit:KB271852 (CVE 2012-0157) 3 W7 64-bit:KB271852 3 134 2008 R2:KB2718523 MS Remote Desktop Could Allow Fixed Remote Code Execution KB2621440 and 12-020 Remote Code Execution Vulnerabilities in the Remote KB2621402 Vulnerabilities Desktop Protocol. If exploited, an XP: 32-bit, attacker could run arbitrary code on 64-bit the target system, then install 2003: 32-bit, programs; view, change, or delete 64-bit, Itanium data; or create new accounts with Vista: 32-bit, full user rights. 64-bit (CVE 2012-0002, CVE 2008: 32-bit, 2012-0152) 64-bit, Itanium 2008 R2: 64-bit(1), 64-bit(2), Itanium(1), Itanium(2) Win 7: 32-bit(1), 32-bit(2), 64-bit(1), 64-bit(2) Windows Kernel Elevation of Fixes a vulnerability that could allow XP SP3: 12-042 Privilege Vulnerability elevation of privilege if an attacker 2707511 (32-bit) logs on to an affected system and 2003 SP2: runs a specially crafted application 2707511 (32-bit) that exploits the vulnerability. This Window 7: vulnerability affects all 32-bit editions 2709715 (64-bit) of Windows XP and Windows 2008 R2: Server 2003: (CVE 2012-0217), 2709715 (64-bit) and it also affects Windows 7 for x64-based Systems, and Windows Server 2008 R2 for x64-based Systems: (CVE 2012-1515) Windows C Run-Time Library Fixes a remote code vulnerability in Vista: 2654428 12-013 remote code execution vulnerability the way that the msvcrt.dll (32-bit), 2654428 calculates the size of a buffer in (64-bit) memory, allowing data to be copied 2008: 2654428 into memory that has not been (32-bit), 2654428 properly allocated. This vulnerability (64-bit) could allow remote code execution if Windows 7: a user opens a specially crafted 2654428 (32-bit), media file that is hosted on a 2654428 (64-bit) website or sent as an email 2008 R2: attachment. An attacker who 2654428 (64-bit) successfully exploits the vulnerability could gain the same user rights as the local user. (CVE 2012-0150) Windows Color Control Panel Fixes a vulnerability in Windows 2008: 2643719, 12-012 Insecure Library Loading Server 2008 and 2008 R2 that 2643719 (64-bit) vulnerability could allow remote code execution. 2008R2: The vulnerability is caused in the 2643719 way that the Color Control Panel handles the loading of DLL files when a user opens a legitimate file (example, .icm or .icc) which is in the same directory as the specially 135 Vulnerability in Indeo Codec Microsoft Windows DirectWrite Denial of Service Vulnerability MS Forefront Unified Access Gateway 2010 information disclosure vulnerability Windows Authenticode Signature Verification function bypass Privilege Vulnerability fixed by MS12-033 crafted dll file. An attacker could run arbitrary code in the context of the current user. (CVE 2010-5082) A vulnerability exists in the Indeo XP 32-bit SP3 codec for Windows XP SP3. The 2661637 vulnerability could allow remote code execution if a user opens a legitimate file from a directory which also contains a specially-crafted dll file. If successful, the attacker could then run arbitrary code as the logged-on user. The higher the privilege level of the logged-on user, the more damage could be done. (CVE 2010-3138) Fixes a vulnerability in Windows Vista:KB266536 DirectWrite. In an Instant 4 Messenger-based attack scenario, 2008:KB266536 the vulnerability could allow denial 4 of service if an attacker sends a Win specially crafted sequence of 7:KB2665364 Unicode characters directly to an Instant Messenger client. (CVE 2012-0156) Two information disclosure UAG 2010 vulnerabilities exist in Unified SP1: Access Gateway (UAG) 2010 SP1: KB2649261 A spoofing vulnerability could allow SP1 Update 1: an outside attacker to acquire KB2649262 authentication cookies and credentials for an internal UAG user, and an access vulnerability could allow an unauthenticated attacker on the (external) Internet to acquire confidential content from a UAG server's (internal) default Web page. (CVE 2012-0146, CVE 2012-0147) The WinVerifyTrust function XP:KB2653956 improperly validates the signature of 2003:KB265395 an executable file, allowing for the 6 potential execution of untrusted Vista:KB265395 code. (CVE 2012-0151) 6 Win 7:KB2653956 2008:KB265395 6 2008 R2:KB2653956 MS12-033 fixed a Plug and Play Vista 32 bit (PnP) Configuration Manager SP2:KB2690533 Vulnerability in Windows. The , 136 12-014 12-019 (superseded by 12-034 on all vulnerable platforms) 12-026 12-024 12-033 vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. (CVE 2012-0178) Multiple vulnerabilities fixed by MS12-034 MS12-034 fixed multiple vulnerabilities in Windows, Office, GDI+, .NET, and Silverlight. (CVE 2011-3402 CVE 2012-0159 CVE 2012-0165 CVE 2012-0167 CVE 2012-0180 CVE 2012-0181 CVE 2012-1848) Windows RDP Remote Code MS12-036 fixed a vulnerability in Execution Vulnerability (MS12-036) the Remote Desktop Protocol which allowed for potential remote code execution. (CVE 2012-0173) 137 Vista 64 bit SP2:KB2690533 W7 32 bit:KB2690533, W7 32 bit SP1:KB2690533 , W7 64 bit:KB2690533, W7 64 bit SP1:KB2690533 , 2008 32 bit SP2:KB2690533 , 2008 64 bit SP2:KB2690533 , 2008 Itanium SP2:KB2690533 , 2008 R2 64 bit:KB2690533, 2008 R2 64 bit SP1:KB2690533 , 2008 R2 Itanium:KB2690 533, 2008 R2 Itanium SP1:KB2690533 MS12-034 12-034 XP SP3 12-036 (32-bit):KB26859 39 XP SP2 (64-bit)KB268593 9 Vista SP2 (32-bit)KB268593 9 Vista SP2 (64-bit)KB268593 9 7 (32-bit)KB268593 9 Microsoft Lync Multiple Vulnerabilities (MS12-039) MDAC ADO cachesize heap overflow Four vulnerabilities have been patched in the following Microsoft Lync applications: Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync 2010 Attendant. The vulnerabilities include two TrueType font parsing vulnerabilities, a DLL injection vulnerability, and an HTML sanitization vulnerability. (CVE 2011-3402) (CVE 2012-0159) (CVE 2012-1849) (CVE 2012-1858) Microsoft Data Access Components (MDAC) ActiveX Data Objects (ADO) could allow command execution when parsing specially crafted XML code due to an attempt to access an uninitialized 138 7 SP1 (32-bit)KB268593 9 7 (64-bit)KB268593 9 7 SP1 (64-bit)KB268593 9 2003 SP2 (32-bit)KB268593 9 2003 SP2 (64-bit)KB268593 9 2003 SP2 (Itanium)KB2685 939 2008 SP2 (32-bit)KB268593 9 2008 SP2 (64-bit)KB268593 9 2008 SP2 (Itanium)KB2685 939 2008 R2 (64-bit)KB268593 9 2008 R2 SP1 (64-bit)KB268593 9 2008 R2 (Itanium)KB2685 939 Communicator 12-039 2007 R2:KB2708980 Lync 2010:KB2693282 Lync 2010 Attendee:KB26 96031 Lync 2010 Attendant:KB27 02444 XP: 2698365 2003: 2698365 Vista: 2698365 2008: 2698365 7: 2698365 2008 R2: 12-045 Remote Desktop Protocol Use After Free Vulnerability Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution VBScript and JScript Engines JavaScript integer overflow object. (CVE 2012-1891) The Windows XP implementation of the Remote Desktop Protocol (RDP) contains a use-after-free vulnerability. An unauthenticated remote attacker may be able to trigger the vulnerability by sending a sequence of specially crafted messages to the RDP service. This may result in heap corruption that could lead to arbitrary code execution. (CVE 2012-2526) Fixes three vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. (CVE 2012-2530 CVE 2012-2553 CVE 2012-2897 ) Also fixes a “use after free” coding error. The error could allow an authenticated local user to raise his privileges to administrator (or potentially even kernel) levels. (CVE2012-2527) 2698365 XP: 2723135 12-053 XP 12-055 (32-bit):KB27612212-075 6 XP (64-bit):KB276122 6 2003 (32-bit):KB276122 6 2003 (64-bit):KB276122 6 Vista (32-bit):KB276122 6 Vista (64-bit):KB276122 6 2008 (32-bit):KB276122 6 2008 (64-bit):KB276122 6 Win 7 (32-bit):KB276122 6 Win 7 (64-bit):KB276122 6 2008 R2:KB2761226 Win 8 (32-bit):KB276122 6 Win 8 (64-bit):KB276122 6 2012:KB276122 6 An integer overflow vulnerability XP: 2706045 12-056 allows command execution when a 2003: 2706045 139 user opens a specially crafted web Vista: 2706045 page in Internet Explorer or an 2008: 2706045 application or document which 7: 2706045 embeds a malicious ActiveX control. 2008 R2: (CVE 2012-2523) 2706045 Windows networking components Multiple vulnerabilities exist in XP: 2705219 remote code execution Windows remote administration 2003: 2705219 protocol that can lead to remote Vista: 2705219 code execution. Attackers that 2008: 2705219 successfully exploit any of these 7: 2705219 vulnerabilities could take complete 2008 R2: control of the system or cause a 2705219 denial of service. (CVE 2012-1850) (CVE 2012-1852) (CVE 2012-1853) Windows print spooler remote code A vulnerability exists in the XP: 2712808 execution vulnerability Windows print spooler service that 2003: 2712808 can lead to remote code execution. Vista: 2712808 Attackers that successfully exploit 2008: 2712808 this vulnerability could take complete 7: 2712808 control of the system. (CVE 2008 R2: 2012-1851) 2712808 Windows Kernel integer overflow Fixes a vulnerability which could XP: 2724197 allow a logged-on user to gain 2003: 2724197 administrative privileges. (CVE Vista: 2724197 2012-2529) 2008: 2724197 7: 2724197 2008 R2: 2724197 HTML Sanitization Vulnerability in Various products do not properly Communicator Various Products validate user-supplied HTML input, 2007 R2: which may result in a Cross Site 2726391 Scripting or privilege-escalation Lync 2010: vulnerability. An attacker could 2726382 exploit this weakness to steal a Lync 2010 user's session or other privileged Attendee: information. In a web-based attack 2726388 scenario, an attack could be SharePoint delivered by directing the user to a Server 2007: target SharePoint website. 2687405 (32-bit), Attackers may also target users of 2687405 (64-bit) Lync 2010 and Communicator 2007 SharePoint R2 by sending them a specially Server 2010: crafted message. (CVE 2012-2520) 2687435, 2589280 on 2010 MS Business Productivity Servers SharePoint Server Services 3.0: 2687356 (32-bit), 2687356 (64-bit) SharePoint Foundation 140 12-054 12-054 12-068 12-066 2010: 2687434 Microsoft Windows Briefcase Fixes two privately reported XP: 2727528 (32 12-072 remote code execution vulnerabilitiesvulnerabilities by modifying the way bit), 2727528 (64 that Microsoft Windows handles a bit) specially crafted briefcase. (CVE 2003: 2727528 2012-1527 CVE 2012-1528) (32 bit), 2727528 (64 bit) Vista: 2727528 (32 bit), 2727528 (64 bit) 2008: 2727528 (32 bit), 2727528 (64 bit) 7: 2727528 (32 bit), 2727528 (64 bit) 2008 R2: 2727528 (64 bit) 8: 2727528 (32 bit), 2727528 (64 bit) 2012: 2727528 (32 bit) Vulnerability in IP-HTTPS Fixes a vulnerability in Microsoft 2008 12-083 Component Could Allow Security Windows. The vulnerability could R2:KB2765809 Feature Bypass allow security feature bypass if an 2012:KB276580 attacker presents a revoked 9 certificate to an IP-HTTPS server commonly used in Microsoft DirectAccess deployments. (CVE 2012-2549) Vulnerability in DirectPlay Could Fixes a vulnerability in Microsoft XP:KB2770660 12-082 Allow Remote Code Execution Windows. The vulnerability could 2003:KB277066 allow remote code execution if an 0 attacker convinces a user to view a Vista:KB277066 specially crafted Office document 0 with embedded content. An attacker 2008:KB277066 who successfully exploits this 0 vulnerability could gain the same 7:KB2770660 user rights as the current user. 2008 R2 (64 (CVE 2012-1537) bit):KB2770660 Window 8:KB2770660 2012:KB277066 0 Microsoft Windows Kernel-Mode There are vulnerabilities in the KB2753842 12-078 Drivers Font Parsing Vulnerabilities handling of both “OpenType” and (OT), “TrueType” fonts, such that KB2779030 (TT) attempting to render characters XP: x86 (OT from a specially-crafted malicious TT), x64 (OT font file, even from a remote Web TT) page, may give an attacker 2003: x86 (OT complete control of the victim's TT), x64 (OT computer. (CVE 2012-2556, CVE TT), IA64 (OT 141 2012-4786) Microsoft Windows File Handling Component vulnerability Microsoft Word RTF listoverridecount Vulnerability in SharePoint Server 2010 Word Automation Services Microsoft Exchange Server RSS feed denial of service Kernel-Mode Driver Privilege Escalation Vulnerability TT) Vista: x86 (OT TT), x64 (OT TT) 2008: x86 (OT TT), x64 (OT TT), IA64 (OT TT) W7: x86 (OT TT), x64 (OT TT) 2008 R2: x64 (OT TT), IA64 (OT TT) W8: x86 (OT TT), x64 (OT TT) 2012: x64 (OT TT) Fixes a vulnerability in Windows file XP: 2758857 (32 12-081 handling component which could bit), 2758857 (64 allow remote code execution if a bit) user browses to a folder that 2003: 2758857 contains a file or subfolder with a (32 bit), 2758857 specially crafted name. An attacker (64 bit) who successfully exploited this Vista: 2758857 vulnerability could gain the same (32 bit), 2758857 user rights as the current user. (64 bit) (CVE 2012-4774) 2008: 2758857 (32 bit), 2758857 (64 bit) 7: 2758857 (32 bit), 2758857 (64 bit) 2008 R2: 2758857 (64 bit) Fixes a remote code execution SharePoint 12-079 vulnerability due to an error in the 2010: 2760405 way the /listoverridecount RTF header is parsed. (CVE 2012-2539) Fixes a vulnerability in the way Patch: 12-080 Microsoft Exchange Server 2010 MS12-080 and 2007 handle RSS feeds that could lead to a denial of service. Fixes a vulnerability in Oracle Outside due to a remote code execution vulnerability in the WebReady Document Viewing feature of Microsoft Exchange Server. (CVE 2012-3214) (CVE 2012-3217) (CVE 2012-4791) Fixes a vulnerability caused by Vista: 2778930 13-005 improper handling of windows (32 bit), 2778930 142 broadcast messages by the Windows kernel. The vulnerability could allow an attacker to gain full control of the effected system. (CVE 2013-0008) (64 bit) Server 2008 2778930 (32 bit), 2778930 (64 bit), 2778930 (IA64) Windows 7 2778930 (32 bit), 2778930 (64 bit) Server 2008 R2 2778930 (64 bit), 2778930 (IA64) Windows 8 2778930 (32 bit), 2778930 (64 bit) Server 2012 2778930 Windows print spooler remote code A vulnerability exists in the Windows 7: 13-001 execution vulnerability Windows print spooler service that 2769369 can lead to remote code execution. 2008 R2: Attackers that successfully exploit 2769369 this vulnerability could take complete control of the system. (CVE 2013-0011) Windows TCP FIN WAIT Fixes a vulnerability in the way that Vista SP2: 13-018 Vulnerability Microsoft Windows handles TCP 2790655 FIN responses when window size Vista (x64) is equal to zero. (CVE 2013-0075) SP2: 2790655 2008 (x86) SP2: 2790655 2008 (x64) SP2: 2790655 Windows 7 (x86) 2790655 Windows 7 (x64) 2790655 Windows 7 SP1 (x86) 2790655 Windows 7 SP1 (x64) 2790655 2008 R2 (x64) SP2: 2790655 2008 R2 SP1 (x64) SP2: 2790655 Windows 8 (x32) 2790655 Windows 8 (x64) 2790655 2012 (x64) SP2: 2790655 143 SSL Version 3 and TLS Security Feature Bypass Fixes a vulnerability in the way that Microsoft Windows SSL/TLS handle the SSL version 3 (SSLv3) and TLS protocols. The vulnerability could allow security feature bypass if an attacker injects specially crafted content into an SSL/TLS session. (CVE 2013-0013) Vista: 2785220 (32 bit), 2785220 (64 bit) Server 2008: 2785220 (32 bit), 2785220 (64 bit) Windows 7: 2785220 (32 bit), 2785220 (64 bit) 2008 R2: 2785220 Windows 8: 2785220 (32 bit), 2785220 (64 bit) 2012: 2785220 Windows Kernel integer overflow Fixes a vulnerability which could XP: 2799494 allow a logged-on user to gain 2003: 2799494 administrative privileges. (CVE Vista: 2799494 2013-1278) (CVE 2013-1279) 2008: 2799494 (CVE 2013-1280) 7: 2799494 2008 R2: 2799494 8: 2799494 2012: 2799494 Windows DirectShow Media Fixes a vulnerability which could XP: 2780091 Decompression vulnerability fixed by allow remote code execution if a (32-bit), 2780091 MS13-011 user opens a specially crafted (64-bit) media file (such as an .mpg file), 2003: 2780091 opens a Microsoft Office document (32-bit), 2780091 (such as a .ppt file) that contains (64-bit) a specially crafted embedded media Vista: 2780091 file, or receives specially crafted (32-bit), 2780091 streaming content. (CVE (64-bit) 2013-0077) 2008: 2780091 (32-bit), 2780091 (64-bit) Kernel-Mode Driver Privilege This security update resolves 30 XP: 2778344 (32 Escalation Vulnerabilities privately reported vulnerabilities in bit), 2778344 (64 Microsoft Windows. These bit) vulnerabilities exist when the Server 2003: Windows kernel-mode driver 2778344 (32 bit), improperly handles objects in 2778344 (64 bit) memory. An attacker who Vista: 2778344 successfully exploited these (32 bit), 2778344 vulnerabilities could gain elevated (64 bit) privileges and read arbitrary Server 2008: amounts of kernel memory. An 2778344 (32 bit), attacker must have valid logon 2778344 (64 bit) credentials and be able to log on Windows 7: locally to exploit these vulnerabilities.2778344 (32 bit), (CVE 2013-1248 CVE 2013-1249 2778344 (64 bit) CVE 2013-1250 CVE 2013-1251 Server 2008 CVE 2013-1252 CVE 2013-1253 R2: 2778344 (64 CVE 2013-1254 CVE 2013-1255 bit) 144 13-006 13-017 13-011 13-016 Windows CSRSS Privilege Elevation Vulnerability CVE 2013-1256 CVE 2013-1257 CVE 2013-1258 CVE 2013-1259 CVE 2013-1260 CVE 2013-1261 CVE 2013-1262 CVE 2013-1263 CVE 2013-1264 CVE 2013-1265 CVE 2013-1266 CVE 2013-1267 CVE 2013-1268 CVE 2013-1269 CVE 2013-1270 CVE 2013-1271 CVE 2013-1272 CVE 2013-1273 CVE 2013-1274 CVE 2013-1275 CVE 2013-1276 CVE 2013-1277) Fixes a vulnerability which might allow an authenticated user to execute arbitrary code in the context of the local system. (CVE 2013-0076) Windows NFS Server null dereference vulnerability Windows 7: 13-019 2790113 (32-bit), 2790113 (64-bit) Server 2008 R2: 2790113 (64-bit), 2790113 (IA64) 2008 R2: 13-014 2790978 2012: 2790978 Fixes a denial of service vulnerability in the Windows NFS server when handling a file operation on a read-only share. (CVE 2013-1281) Windows OLE Automation Remote This update corrects a memory Windows XP: Code Execution Vulnerability corruption vulnerability in the Object 2802968 Linking and Embedding (OLE) Automation library. (CVE 2013-1313) 13-020 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. Scan Session: autotest2; Scan Policy: heavy; Scan Data Set: 20 March 2013 10:38 Copyright 2001-2013 SAINT Corporation. All rights reserved. 145