Microsoft Security Bulletin: June 2013 Release!

3823_7103_securitybulletin_thumb_32407BF9_thumb_12CC8186

Welcome to another round of security updates. This is the last one for the financial year of you talk in that language.

The following tables outlined the bulletins being released this month. Make sure you prioritize these updates where appropriate in your environment.

Bulletin ID Bulletin Title and Executive Summary Maximum Severity Rating and Vulnerability Impact Restart Requirement Affected Software
MS13-047 Cumulative Security Update for Internet Explorer ( 2838727 ) This security update resolves nineteen privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Critical  Remote Code Execution Requires restart Microsoft Windows, Internet Explorer
MS13-048 Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229) This security update resolves one privately reported vulnerability in Windows. The vulnerability could allow information disclosure if an attacker logs on to a system and runs a specially crafted application or convinces a local, logged-in user to run a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system. Important  Information Disclosure Requires restart Microsoft Windows
MS13-049 Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends specially crafted packets to the server. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Important  Denial of Service Requires restart Microsoft Windows
MS13-050 Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege when an authenticated attacker deletes a printer connection. An attacker must have valid logon credentials and be able to log on to exploit this vulnerability. Important  Elevation of privilege Requires restart Microsoft Windows
MS13-051 Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571) This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Office document using an affected version of Microsoft Office software, or previews or opens a specially crafted email message in Outlook while using Microsoft Word as the email reader. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important  Remote Code Execution May require restart Microsoft Office

We have also created an exploitability index which helps customers further evaluate risk with vulnerabilities. It determines whether an update will be exploited within the first 30 days of the updates release. You can see the table here of this months updates and you can learn more about the Microsoft Exploitability Index here.

Jeffa

Technorati Tags: Security Updates,Patching,WSUS

Digg This