Microsoft Security Bulletin Summary for June 2009
Patch Tuesday is here again. Here's the rundown of what was fixed.
Vulnerabilities in Active Directory Could Allow Remote Code Execution (971055)
This
security update resolves two privately reported vulnerabilities in
implementations of Active Directory on Microsoft Windows 2000 Server
and Windows Server 2003, and Active Directory Application Mode (ADAM)
when installed on Windows XP Professional and Windows Server 2003. The
more severe vulnerability could allow remote code execution. An
attacker who successfully exploited this vulnerability could take
complete control of an affected system remotely. An attacker could then
install programs; view, change, or delete data; or create new accounts
with full user rights. Firewall best practices and standard default
firewall configurations can help protect networks from attacks that
originate outside the enterprise perimeter. Best practices recommend
that systems that are connected to the Internet have a minimal number
of ports exposed.
Vulnerabilities in Windows Print Spooler Could Allow Remote Code Execution (961501)
This
security update resolves three privately reported vulnerabilities in
Windows Print Spooler. The most severe vulnerability could allow remote
code execution if an affected server received a specially crafted RPC
request. Firewall best practices and standard default firewall
configurations can help protect networks from attacks that originate
outside the enterprise perimeter. Best practices recommend that systems
that are connected to the Internet have a minimal number of ports
exposed.
Cumulative Security Update for Internet Explorer (969897)
This
security update resolves seven privately reported vulnerabilities and
one publicly disclosed vulnerability in Internet Explorer. The more
severe of the vulnerabilities could allow remote code execution if a
user views a specially crafted Web page using Internet Explorer. Users
whose accounts are configured to have fewer user rights on the system
could be less impacted than users who operate with administrative user
rights.
Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (969514)
This
security update resolves two privately reported vulnerabilities that
could allow remote code execution if a user opens a specially crafted
Word file. An attacker who successfully exploited either vulnerability
could take complete control of an affected system. An attacker could
then install programs; view, change, or delete data; or create new
accounts with full user rights.
Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (969462)
This
security update resolves several privately reported vulnerabilities
that could allow remote code execution if a user opens a specially
crafted Excel file that includes a malformed record object. An attacker
who successfully exploited any of these vulnerabilities could take
complete control of an affected system. An attacker could then install
programs; view, change, or delete data; or create new accounts with
full user rights.
Vulnerability in Microsoft Works Converters Could Allow Remote Code Execution (957632)
This
security update resolves a privately reported vulnerability in the
Microsoft Works converters. The vulnerability could allow remote code
execution if a user opens a specially crafted Works file. An attacker
who successfully exploited this vulnerability could gain the same user
rights as the local user. Users whose accounts are configured to have
fewer user rights on the system could be less impacted than users who
operate with administrative user rights.
Vulnerability in RPC Could Allow Elevation of Privilege (970238)
This
security update resolves a publicly disclosed vulnerability in the
Windows remote procedure call (RPC) facility where the RPC Marshalling
Engine does not update its internal state appropriately. The
vulnerability could allow an attacker to execute arbitrary code and
take complete control of an affected system. Supported editions of
Microsoft Windows are not delivered with any RPC servers or clients
that are subject to exploitation of this vulnerability. In a default
configuration, users could not be attacked by exploitation of this
vulnerability. However, the vulnerability is present in the Microsoft
Windows RPC runtime and could affect third-party RPC applications.
Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537)
This
security update resolves two publicly disclosed and two privately
reported vulnerabilities in the Windows kernel that could allow
elevation of privilege. An attacker who successfully exploited any of
these vulnerabilities could execute arbitrary code and take complete
control of an affected system. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user
rights. An attacker must have valid logon credentials and be able to
log on locally to exploit these vulnerabilities. The vulnerabilities
could not be exploited remotely or by anonymous users.
Vulnerabilities in Internet Information Services (IIS) Could Allow Elevation of Privilege (970483)
This
security update resolves one publicly disclosed vulnerability and one
privately reported vulnerability in Microsoft Internet Information
Services (IIS). The vulnerabilities could allow elevation of privilege
if an attacker sent a specially crafted HTTP request to a Web site that
requires authentication. These vulnerabilities allow an attacker to
bypass the IIS configuration that specifies which type of
authentication is allowed, but not the file system-based access control
list (ACL) check that verifies whether a file is accessible by a given
user. Successful exploitation of these vulnerabilities would still
restrict the attacker to the permissions granted to the anonymous user
account by the file system ACLs.
Vulnerability in Windows Search Could Allow Information Disclosure (963093)
This
security update resolves a privately reported vulnerability in Windows
Search. The vulnerability could allow information disclosure if a user
performs a search that returns a specially crafted file as the first
result or if the user previews a specially crafted file from the search
results. By default, the Windows Search component is not preinstalled
on Microsoft Windows XP and Windows Server 2003. It is an optional
component available for download. Windows Search installed on supported
editions of Windows Vista and Windows Server 2008 is not affected by
this vulnerability.
Read more: http://www.microsoft.com/technet/security/bulletin/ms09-jun.mspx
Comments
You can follow this conversation by subscribing to the comment feed for this post.
All Comments are Moderated and will be delayed!
Post a comment