December 2010 - Microsoft Releases 17 Security Advisories
Severity: CRITICAL
Advisory Date: DEC 14, 2010
DESCRIPTION
Microsoft addresses the following vulnerabilities in its December batch of patches:
- (MS10-090) Cumulative Security Update for Internet Explorer (2416400)
Risk Rating: Critical
This security update resolves a total of seven vulnerabilities in Internet Explorer (IE). Of these vulnerabilities, the most severe flaws could allow remote users to remotely execute malicious codes on the affected system if a user views a specially crafted Web page via IE. Read more . - (MS10-091) Vulnerabilities in the OpenType Font (OTF) Driver Could Allow Remote Code Execution (2296199)
Risk Rating: Critical
This security update resolves several vulnerabilities in the Windows Open Type Font (OTF) driver, which could allow remote users to execute code remotely on the affected system. Read more . - (MS10-092) Vulnerability in Task Scheduler Could Allow Elevation of Privilege (2305420)
Risk Rating: Important
This security update resolves a vulnerability in Windows Task Scheduler, which could allow elevation of privilege if an attacker is logged on to an affected system and runs a specially crafted application. Read more . - (MS10-093) Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (2424434)
Risk Rating: Important
This vulnerability resolves a vulnerability in Windows Movie Maker, which could allow remote users to execute code on the affected system. Read more . - (MS10-094) Vulnerability in Windows Media Encoder Could Allow Remote Code Execution (2447961)
Risk Rating: Important
This update resolves a vulnerability in Windows Media Encoder, which could allow remote code execution if an attacker succeeds in convincing users to open a legitimate Windows Media Profile (.PRX) file that is located in the same network folder as a specially crafted library file. Read more . - (MS10-095) Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2385678)
Risk Rating: Important
This update resolves a vulnerability in Microsoft Windows, which could allow remote code execution if users open certain files located in the same network folder as a specially crafted library file. Read more . - (MS10-096) Vulnerability in Windows Address Book Could Allow Remote Code Execution (2423089)
Risk Rating: Important
This security update resolves a vulnerability in Windows Address Book, which could allow a remote user to execute code on the affected system. Read more . - (MS10-097) Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution (2443105)
Risk Rating: Important
This update resolves a vulnerability in the Internet Connection Signup Wizard of Microsoft Windows, which could allow remote code execution. This exploit works if a user opens an .INS or .ISP file located in the same network folder as a specially crafted library file. Read more . - (MS10-098) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2436673)
Risk Rating: Important
This update resolves vulnerabilities in Microsoft Windows, which could allow elevation of privilege. The exploit works if an attacker is logged on locally using valid logon credentials and runs a specially crafted application. Read more . - (MS10-099) Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591)
Risk Rating: Important
This update resolves a vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows.This update resolves a vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. Read more . - (MS10-100) Vulnerability in Consent User Interface Could Allow Elevation of Privilege (2442962)
Risk Rating: Important
This update resolves a vulnerability in the Consent User Interface (UI), which could allow elevation of privilege. Read more . - (MS10-101) Vulnerability in Windows Netlogon Service Could Allow Denial of Service (2207559)
Risk Rating: Important
This update resolves a vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. Read more . - (MS10-102) Vulnerability in Hyper-V Could Allow Denial of Service (2345316)
Risk Rating: Important
This update resolves a vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. An attacker with valid logon credentials could exploit the vulnerability and allow denial of service. Read more . - (MS10-103) Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2292970)
Risk Rating: Important
This update resolves vulnerabilities in Microsoft Publisher that could allow remote code execution. An attacker can exploit the vulnerability by opening a specially crafted Publisher file. Read more . - (MS10-104) Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution (2455005)
Risk Rating: Important
This update resolves a vulnerability in Microsoft SharePoint, which could allow remote code execution. The vulnerability is exploited if an attacker sends a specially crafted SOAP request to the Document Conversions Launcher Service in a SharePoint server environment that is using the Document Conversions Load Balancer Service. Read more . - (MS10-105) Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095)
Risk Rating: Important
This update resolves vulnerabilities in Microsoft Office, which could allow remote code execution. When users view a specially crafted image file using Microsoft Office, an attacker could gain the same user rights as the local user. Read more . - (MS10-106) Vulnerability in Microsoft Exchange Server Could Allow Denial of Service (2407132)
Risk Rating: Medium
This update resolves a vulnerability in Microsoft Exchange Server, which could allow denial of service on the affected system. Read more .
TREND MICRO PROTECTION INFORMATION
live casino online clients using OfficeScan with Intrusion Defense Firewall (IDF) plug-in may refer to the table below for the associated identifier/s and pattern version/s:
Microsoft Bulletin ID | Vulnerability ID | Identifier & Title | IDF First Pattern Version | IDF First Pattern Release Date |
---|---|---|---|---|
MS10-090 | CVE-2010-3340 | 1004539 - HTML Object Memory Corruption Vulnerability | 10-038 | Dec 15, 2010 |
MS10-090 | CVE-2010-3343 | 1004540 - Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability | 10-038 | Dec 15, 2010 |
MS10-090 | CVE-2010-3346 | 1004537 - HTML Element Memory Corruption | 10-038 | Dec 15, 2010 |
MS10-090 | CVE-2010-3962 | 1004496 - Vulnerability in Internet Explorer Could Allow Remote Code Execution | 10-035 | Nov 10, 2010 |
MS10-091 | CVE-2010-3957 | 1004541 - OpenType Font File CFF table Code Execution Vulnerability | 10-038 | Dec 15, 2010 |
MS10-091 | CVE-2010-3959 | 1004538 - OpenType Font File CMAP Table Paring Vulnerability | 10-038 | Dec 15, 2010 |
MS10-101 | CVE-2010-2742 | 1004542 - Windows Netlogon Service Denial Of Service | 10-038 | Dec 15, 2010 |
MS10-103 | CVE-2010-2569 | 1004544 - Size Value Heap Corruption in pubconv.dll Vulnerability | 10-038 | Dec 15, 2010 |
MS10-103 | CVE-2010-3955 | 1004545 - Array Indexing Memory Corruption Vulnerability | 10-038 | Dec 15, 2010 |
MS10-104 | CVE-2010-3964 | 1004536 - Sharepoint Office Document Conversions Launcher Service Remote Code Execution Vulnerability | 10-038 | Dec 15, 2010 |
MS10-105 | CVE-2010-3947 | 1004543 - TIFF Image Converter Buffer Overflow Vulnerability | 10-038 | Dec 15, 2010 |
MS10-105 | CVE-2010-3949 | 1004543 - TIFF Image Converter Buffer Overflow Vulnerability | 10-038 | Dec 15, 2010 |
MS10-105 | CVE-2010-3950 | 1004543 - TIFF Image Converter Buffer Overflow Vulnerability | 10-038 | Dec 15, 2010 |
SOLUTION
PATCH: