Security
Headlines
HeadlinesLatestCVEs

Headline

Assessing risk for the February 2014 security updates

Today we released seven security bulletins addressing 31 unique CVE’s. Four bulletins have a maximum severity rating of Critical while the other three have a maximum severity rating of Important. We hope that the table below helps you prioritize the deployment of the updates appropriately for your environment. Bulletin Most likely attack vector Max Bulletin Severity Max Exploit-ability Likely first 30 days impact Platform mitigations and key notes MS14-010(Internet Explorer) Victim browses to a malicious webpage.

msrc-blog
#vulnerability#web#windows#dos#asp.net

Today we released seven security bulletins addressing 31 unique CVE’s. Four bulletins have a maximum severity rating of Critical while the other three have a maximum severity rating of Important. We hope that the table below helps you prioritize the deployment of the updates appropriately for your environment.

Bulletin

Most likely attack vector

Max Bulletin Severity

Max Exploit-ability

Likely first 30 days impact

Platform mitigations and key notes

MS14-010(Internet Explorer)

Victim browses to a malicious webpage.

Critical

1

Likely to see reliable exploits developed within next 30 days.

Addresses both memory corruption vulnerabilities and elevation of privilege vulnerabilities in a single package.

MS14-011(VBScript)

Victim browses to a malicious webpage.

Critical

1

Likely to see reliable exploits developed within next 30 days.

The single CVE addressed by this bulletin is included in MS14-010 for IE9 users. Customers with IE9 installed need not deploy MS14-011.

MS14-007(DirectWrite)

Victim browses to a malicious webpage.

Critical

1

Likely to see reliable exploits developed within next 30 days.

Internet Explorer is vector to this vulnerability in DirectWrite.

MS14-005(MSXML)

Victim browses to a malicious website to be exposed to this information leak vulnerability.

Important

3

Vulnerability first seen as ASLR bypass mechanism in targeted attacks during November 2013. May see attacks again begin using this again as details emerge.

As discussed in the SRDand FireEyeblogs during November 2013, this vulnerability was used along with another vulnerability in active attacks. The MS13-090 security update completely blocked all attacks described by those blog posts.

MS14-009(.NET Framework)

Most likely to be exploited vulnerability involves attacker initiating but not completing POST requests to ASP.NET web application, resulting in resource exhaustion denial of service.

Important

1

Resource exhaustion attacks involving CVE-2014-0253 already in progress in the wild.

CVE-2014-0253 addresses resource exhaustion “Slowloris” attack.CVE-2014-0257 addresses sandbox escape vulnerability invoving com objects running code out-of-process.CVE-2014-0295 addresses the vsab7rt.dll ASLR bypass described athttp://www.greyhathacker.net/?p=585.

MS14-008(Forefront Protection for Exchange)

Code is unlikely to be reachable. However, if attackers do find a way, it would involve a malicious email message being processed by the Forefront Protection for Exchange service.

Critical

2

Unlikely to see exploits developed targeting this vulnerability.

While this vulnerability’s attack vector appears attractive (email), the vulnerability is unlikely to be reachable. It was discovered internally by code analysis and we have not been successful in developing a real-world vulnerability trigger. We address it via security update out of an abundance of caution.

MS14-006(IPv6)

Attacker on the same subnet as victim (IPv6 link-local) sends large number of malicious router advertisements resulting in victim system bugcheck.

Important

3

Denial of service only.

This bugcheck is triggered by a watchdog timer on the system, not due to memory corruption. Affects Windows RT, Windows Server 2012 (not R2), and Windows 8 (not 8.1).

- Jonathan Ness, MSRC

msrc-blog: Latest News

Securing AI and Cloud with the Zero Day Quest