Review of February 2013 Bulletin Release Information - 12 New Security Bulletins - One Updated Security Advisory - Microsoft Windows Malicious Software.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

Auditing Microsoft Active Directory
Dial In Number Pin: 3959 Information About Microsoft September 21, 2012 Security Bulletin Jeremy Tinder Security Program Manager Microsoft.
Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
Dial In Number Pin: 9049 Information About Microsoft April 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
WSUS Presented by: Nada Abdullah Ahmed.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Chapter 7 HARDENING SERVERS.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Monthly Security Bulletin Briefing
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Dial In Number Pin: 3879 Information About Microsoft May 2012 Security Bulletins Dustin Childs Sr. Security Program Manager Microsoft Corporation.
IT:Network:Microsoft Applications
Module 16: Software Maintenance Using Windows Server Update Services.
Dial In Number Pin: 3750 Information About Microsoft August 2011 Security Bulletins Jonathan Ness Security Development Manager, MSRC Microsoft.
Dial In Number PIN: 1056 Information About Microsoft December 2011 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
To receive our video stream in Live Meeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Microsoft ® Official Course Module 9 Configuring Applications.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Dial In Number Pin: 3959 Information About Microsoft December 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
2 New Security Bulletins and AdvisoriesNew Security Bulletins and Advisories –1 New Security Advisory –1 New Critical Bulletin –1 New Moderate Bulletin.
Module 4: Add Client Computers and Devices to the Network.
Dial In Number Pin: 3959 Information About Microsoft August 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Dial In Number Pin: 3959 Information About Microsoft’s January 2013 Out-of-Band Security Bulletin Jonathan Ness Security Development Manager.
Hands-On Microsoft Windows Server 2008
Dial In Number Pin: 5639 Information About Microsoft January 2012 Security Bulletins Dustin Childs Sr. Security Program Manager, MSRC Microsoft.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Dial In Number Pin: 3959 Information About Microsoft November 2012 Security Bulletins Jeremy Tinder Security Program Manager Microsoft Corporation.
Dial In Number Pin: 5453 Information About Microsoft June 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft Corporation.
Module 14: Configuring Server Security Compliance
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Dial In Number Pin: 3959 Information About Microsoft January 2013 Security Bulletins Andrew Gross Senior Security Program Manager Microsoft.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
C HAPTER 2 Introduction to Windows XP Professional.
二月份資訊安全公告 Feb 16, 2007 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.
Module 5: Configuring Internet Explorer and Supporting Applications.
Dial In Number Pin: 0336 Information About Microsoft February 2012 Security Bulletins Jonathan Ness Security Development Manager Microsoft.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處 五月份資訊安全公告 May 10, 2007.
PREVIOUS GNEWS. 3 Patches – 4 Critical – 53+ CVEs Affected – Kernel, AD, SharePoint, Office, and more MS Microsoft SharePoint Server, Remote Code.
Information About Microsoft Out-of-Band Security Bulletins.
Windows Administration How to protect your computer.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Information About Microsoft’s August 2004 Security Bulletins August 13, 2004 Feliciano Intini, CISSP, MCSE Security Advisor Premier Security Center Microsoft.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
十月份資訊安全公告 Oct 12, 2006 Richard Chen 陳政鋒 (Net+, Sec+, MCSE2003+Security, CISSP) 資深技術支援工程師 台灣微軟技術支援處.
TMG Client Protection 6NPS – Session 7.
MICROSOFT OUTLOOK and Outlook service Provider
Configuring Internet-related services
Severity and Exploitability Index
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Review of February 2013 Bulletin Release Information - 12 New Security Bulletins - One Updated Security Advisory - Microsoft Windows Malicious Software Removal Tool Resources Questions and Answers: Please Submit Now - Submit Questions via Twitter #MSFTSecWebcast

Severity & Exploitability Index Exploitability Index 1 RISK 2 3 DP Severity Critical IMPACT Important Moderate Low MS MS MS MS MS MS MS MS MS MS MS MS Internet Explorer Vector Markup Language DirectShowExchange OLE AutomationNFS ServerSharePoint.NET Framework Kernel-Mode Drivers Kernel TCP/IPCSRSS

Bulletin Deployment Priority

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE ImportantNA3Information DisclosureCooperatively Disclosed CVE CVE CVE CriticalNA2Remote Code ExecutionCooperatively Disclosed CVE CVE CVE CVE CVE CriticalNA1Remote Code ExecutionCooperatively Disclosed CVE CVE CVE CVE Critical11Remote Code ExecutionCooperatively Disclosed Affected ProductsIE6 – IE10 on all supported versions of Windows ClientIE6 – IE10 on all supported versions of Windows Server Affected ComponentsInternet Explorer Deployment Priority1 Main TargetWorkstations Possible Attack Vectors An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. (All CVEs) The attacker could take advantage of compromised websites and websites that accept or host user-provided content or advertisements. (All CVEs) Impact of Attack An attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone. (CVE ) An attacker could gain the same user rights as the current user. (All CVEs except for CVE ) Mitigating Factors An attacker cannot force users to view the attacker-controlled content. (All CVEs) By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML messages in the Restricted sites zone. (All CVEs) By default, Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2 and Windows Server 2012 runs in a restricted mode that is known as Enhanced Security Configuration. (All CVEs) Additional Information Installations using Server Core are not affected. Severity levels do not apply to IE10 for CVE , this fix is a defense-in-depth. This bulletin replaces the December IE Bulletin (MS12-077) and the January Out of Band Bulletin (MS13-008). MS13-009: Cumulative Security Update for Internet Explorer ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Critical11Remote Code ExecutionCooperatively Disclosed Affected ProductsIE6 – IE10 on all supported versions of Windows Client and Windows Server Affected ComponentsVector Markup Language Deployment Priority1 Main TargetWorkstations Possible Attack Vectors An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. An attacker could embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could take advantage of compromised websites and websites that accept or host user- provided content or advertisements. Impact of AttackAn attacker could gain the same user rights as the current user. Mitigating FactorsAn attacker cannot force users to view the attacker-controlled content. Additional InformationInstallations using Server Core are not affected. MS13-010: Vulnerability in Vector Markup Language Could Allow Remote Code Execution ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE CriticalNA1Remote Code ExecutionPublicly Disclosed Affected Products All supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 Affected ComponentsDirectShow Deployment Priority2 Main TargetWorkstations Possible Attack Vectors an attacker could send a specially crafted media file (such as an.mpg file) to the user and then convince the user to open the file. Web-based: an attacker would have to host a website that contains specially crafted media content that could exploit this vulnerability. Impact of AttackAn attacker could run arbitrary code as the current user. Mitigating Factors The vulnerability cannot be exploited automatically through . An attacker cannot force users to visit a specially crafted website. Additional Information Installations using Server Core are not affected. At the time of release there were no known attacks using this vulnerability. MS13-011: Vulnerability in Media Decompression Could Allow Remote Code Execution ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Important33Denial of ServicePublicly Disclosed CVE Critical22Remote Code ExecutionPublicly Disclosed Affected ProductsAll supported editions of Microsoft Exchange Server 2007 and Microsoft Exchange Server 2010 Affected ComponentsOracle Outside in Libraries/WebReady Document Viewing Deployment Priority2 Main TargetExchange Server Systems Possible Attack Vectors An attacker could send an message containing a specially crafted file to a user on an affected version of Exchange. Impact of Attack An attacker could run arbitrary code as LocalService on the affected Exchange server. (CVE ) An attacker could cause the affected Exchange Server to become unresponsive if a user views a specially crafted file through Outlook Web Access in a browser. (CVE ) Mitigating Factors The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network. (CVE ) Additional Information CVE and CVE discussed in the Oracle Critical Patch Update Advisory - January 2013 affect Microsoft Exchange Server and are addressed by this update. At the time of release there were no known attacks using these vulnerabilities. MS13-012: Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Important11Remote Code ExecutionPublicly Disclosed CVE Important11Remote Code ExecutionPublicly Disclosed Affected ProductsAll supported editions of FAST Search Server 2010 for SharePoint Affected ComponentsOracle Outside in Libraries/Advanced Filter Pack Deployment Priority2 Main TargetFAST Search 2010 for SharePoint servers with the Advanced Filter Pack installed Possible Attack Vectors An attacker would need access to a file location that FAST Search 2010 for SharePoint indexes, and have the ability to upload a specially crafted file to that location. Impact of AttackAn attacker could run arbitrary code in the context of a user account with a restricted token. Mitigating Factors FAST Search Server 2010 for SharePoint is only affected by the vulnerabilities if the Advanced Filter Pack feature is enabled. By default, the Advanced Filter Pack feature is disabled. Additional Information CVE and CVE discussed in the Oracle Critical Patch Update Advisory - October 2012 affect FAST Search Server 2010 for SharePoint and are addressed by this update. At the time of release there were no known attacks using these vulnerabilities. MS13-013: Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Code Execution ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Important33Denial of ServiceCooperatively Disclosed Affected ProductsAll supported editions of Windows Server 2008 R2 and Windows Server 2012 Affected ComponentsNFS Server Deployment Priority3 Main TargetServers with the NFS Server role enabled Possible Attack VectorsAn attacker could attempt to rename a file or folder on a read-only share. Impact of AttackAn attacker could cause the affected system to stop responding and restart. Mitigating Factors An attacker must have access to the file share in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. This vulnerability only affects Windows servers with the NFS role enabled. Additional InformationInstallations using Server Core are affected (except Windows Server 2008). MS13-014: Vulnerability in NFS Server Could Allow Denial of Service ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Important11Elevation of PrivilegeCooperatively Disclosed Affected Products.NET Framework 2.0 SP2,.NET Framework 3.5,.NET Framework 3.5.1,.NET Framework 4, and.NET Framework 4.5 on all supported versions of Windows Client and Windows Server (except for.NET Framework 4.5 on Windows RT) Affected Components.NET Framework Deployment Priority2 Main TargetWorkstations Possible Attack Vectors Web-based: an attacker could host a specially crafted website that contains a specially crafted XBAP (XAML browser application) that could exploit this vulnerability. The attacker could also take advantage of websites that accept or host user-provided content or advertisements..NET Application based: this vulnerability could also be used by Windows.NET Framework applications to bypass Code Access Security (CAS) restrictions. Impact of AttackAn attacker could take complete control of the affected system. Mitigating Factors By default, Internet Explorer 9 and Internet Explorer 10 prevent XAML, which is used by XBAPs, from running in the Internet Zone. By default, Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 are configured to prompt the user before running XAML, which is used by XBAPs in the Internet Zone. Additional Information Installations using Server Core are affected..NET Framework 4 and.NET Framework 4 Client Profile affected. MS13-015: Vulnerability in.NET Framework Could Allow Elevation of Privilege ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder Multiple CVEsImportantNA2Elevation of PrivilegeCooperatively Disclosed Affected Products All supported versions of Windows Client and Windows Server (except for Windows 8, Windows RT and Windows Server 2012) Affected ComponentsKernel-Mode Drivers Deployment Priority2 Main TargetWorkstations Possible Attack VectorsAn attacker could run a specially crafted application designed to increase privileges. Impact of AttackAn attacker could gain increased privilege and read arbitrary amounts of kernel memory. Mitigating FactorsAn attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Additional Information Installations using Server Core are affected. Severity ratings do not apply for Windows 8, Windows RT and Windows Server However, as a defense-in-depth measure, Microsoft recommends customers apply this security update. CVEs: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE MS13-016: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Important22Elevation of PrivilegeCooperatively Disclosed CVE Important11Elevation of PrivilegeCooperatively Disclosed CVE Important22Elevation of PrivilegeCooperatively Disclosed Affected ProductsAll supported versions of Windows Client and Windows Server Affected ComponentsWindows Kernel Deployment Priority2 Main TargetWorkstations Possible Attack Vectors An attacker could run a specially crafted application that could exploit the vulnerability and take complete control over the affected system. Impact of AttackAn attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. Mitigating FactorsAn attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Additional InformationInstallations using Server Core are affected. MS13-017: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE Important33Denial of ServiceCooperatively Disclosed Affected Products All supported versions of Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 All supported versions of Vista, Windows 7, Windows 8, and Windows RT Affected ComponentsTCP/IP Deployment Priority3 Main TargetServers Possible Attack Vectors An unauthenticated attacker could send a specially crafted connection termination packet to the server. Impact of AttackAn attacker could cause the target system to stop responding and automatically restart. Mitigating FactorsMicrosoft has not identified any mitigating factors for this vulnerability. Additional InformationInstallations using Server Core are affected. MS13-018: Vulnerability in Windows TCP/IP Could Allow Denial of Service ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE ImportantNA2Elevation of PrivilegePublicly Disclosed Affected ProductsAll supported editions of Windows 7 and Windows Server 2008 R2 Affected Components Windows CSRSS Deployment Priority2 Main TargetWorkstations Possible Attack Vectors An attacker could run a specially crafted application that could exploit the vulnerability and take complete control over an affected system. Impact of AttackAn attacker could run arbitrary code in the context of the local system. Mitigating FactorsAn attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Additional Information Installations using Server Core are affected. At the time of release there were no known attacks using this vulnerability. MS13-019: Vulnerability in Windows Client/Server Run- time Subsystem (CSRSS) Could Allow Elevation of Privilege ( )

CVESeverity Exploitability | Versions CommentNote LatestOlder CVE CriticalNA1Remote Code ExecutionCooperatively Disclosed Affected ProductsWindows XP Service Pack 3 Affected ComponentsOLE Automation Deployment Priority1 Main TargetWorkstations Possible Attack Vectors an attacker could send specially crafted RTF-formatted data to the user and then convince the user to open the file. Web-based: an attacker could host a website that contains a file that is used to exploit this vulnerability and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. Impact of AttackAn attacker could gain the same user rights as the local user. Mitigating FactorsAn attacker would have no way to force a user to visit a malicious site or open a specially crafted file. MS13-020: Vulnerability in OLE Automation Could Allow Remote Code Execution ( )

Microsoft Security Advisory ( ): Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 - On February 12, 2013, Microsoft released an update (KB ) for all supported editions of Windows 8, Windows Server 2012 and Windows RT. The update addresses the vulnerabilities described in Adobe Security Bulletin APSB13-05.

Detection & Deployment 1.The MBSA does not support detection on Windows 8, Windows RT, and Windows Server Windows RT systems only support detection and deployment from Windows Update, Microsoft Update and the Windows Store (except for MS which is available through WU only). 3.This update is available through the Microsoft Download Center only.

Other Update Information

During this release, Microsoft will increase/add detection capability for the following families in the MSRT: Win32/Sirefef: A multi-component family of malware that uses stealth to hide its presence on an affected computer. Win32/Sirefef February MSRT will be distributed to Windows 8 (x86 and x64) Available as a priority update through Windows Update or Microsoft Update Offered through WSUS 3.0 or as a download at:

Submit text questions using the “Ask” button. Don’t forget to fill out the survey. A recording of this webcast will be available within 48 hours on the MSRC blog. Register for next month’s webcast at: