Security
Headlines
HeadlinesLatestCVEs

Headline

Assessing risk for the June 2014 security updates

Today we released seven security bulletins addressing 66 unique CVE’s. Two bulletins have a maximum severity rating of Critical while the other five have a maximum severity rating of Important. This table is designed to help you prioritize the deployment of updates appropriately for your environment. Bulletin Most likely attack vector Max Bulletin Severity Max XI Likely first 30 days impact Platform mitigations and key notes MS14-035 (Internet Explorer) Victim browses to a malicious webpage.

msrc-blog
#xss#vulnerability#web#dos

Today we released seven security bulletins addressing 66 unique CVE’s. Two bulletins have a maximum severity rating of Critical while the other five have a maximum severity rating of Important. This table is designed to help you prioritize the deployment of updates appropriately for your environment.

Bulletin

Most likely attack vector

Max Bulletin Severity

Max XI

Likely first 30 days impact

Platform mitigations and key notes

MS14-035 (Internet Explorer)

Victim browses to a malicious webpage.

Critical

1

Likely to see reliable exploits developed within next 30 days.

CVE count (59) is result of focusing on in-the-wild exploits last month. These are the May + June fixes for issues not under active attack.

MS14-034 (Word 2007)

Victim opens malicious Office document.

Important

1

Likely to see reliable exploits developed within next 30 days.

Issue addressed in embedded font parsing. Reachable via either doc or docx. Word 2010 and later not affected.

MS14-036 (GDI+)

Victim open malicious graphics file or malicious PowerPoint document

Critical

1

Likely to see reliable exploits developed within next 30 days.

Issue addressed is in EMF+ record type parsing, an area we have not seen real-world attackers pursue recently. (Hence, table lists Word security update ahead of GDI+ update.)

MS14-033 (MSXML)

Victim browses to a malicious webpage or opens a malicious document, inadvertently sending local path name of downloaded file to attacker. Path name by default includes the user’s login name.

Important

3

Less likely to see widespread usage of information disclosure vulnerabilities.

Information disclosure only.

MS14-030 (Terminal Services)

Attacker acting as man-in-the-middle at the start of a Remote Desktop session may be able to read information from or tamper with RDP session.

Important

n/a

Less likely to see widespread usage of vulnerabilities enabling tampering.

Terminal Services NLA feature mitigates this vulnerability.

MS14-031 (TCP)

Attacker initiates large number of connections with malformed TCP options. Each connection temporarily consumes non-paged pool memory longer than it should, leading to resource exhaustion.

Important

3

Less likely to see widespread usage of vulnerability allowing resource exhaustion denial-of-service only.

Attacker must control TCP Options fields. Attacker would be unable to cause denial-of-service for systems behind network infrastructure that overwrites the TCP Options field.

MS14-032 (Lync Server XSS)

Victim clicks on a specially-crafted malicious link to an established Lync meeting. Attacker can take action in context of Lync Server service that victim would normally have access to take.

Important

3

Less likely to see widespread usage of this vulnerability.

XSS style vulnerability.

- Jonathan Ness, MSRC engineering team

msrc-blog: Latest News

Securing AI and Cloud with the Zero Day Quest