Security Bulletin
Microsoft Security Bulletin MS13-035 - Important
Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2821818)
Published: April 09, 2013
Version: 1.0
General Information
Executive Summary
This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow elevation of privilege if an attacker sends specially crafted content to a user.
This security update is rated Important for supported editions of Microsoft SharePoint Server 2010, Microsoft Groove Server 2010, Microsoft SharePoint Foundation 2010, and Microsoft Office Web Apps 2010. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerability by modifying the way that HTML strings are sanitized. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.
Recommendation. Customers can configure automatic updating to check online for updates from Microsoft Update by using the Microsoft Update service. Customers who have automatic updating enabled and configured to check online for updates from Microsoft Update typically will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates from Microsoft Update and install this update manually. For information about specific configuration options in automatic updating in supported editions of Windows XP and Windows Server 2003, see Microsoft Knowledge Base Article 294871. For information about automatic updating in supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2, see Understanding Windows automatic updating.
For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update at the earliest opportunity using update management software, or by checking for updates using the Microsoft Update service.
See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.
Knowledge Base Article
| Knowledge Base Article | 2821818 |
|---|---|
| File information | Yes |
| SHA1/SHA2 hashes | Yes |
| Known issues | Yes |
Affected and Non-Affected Software
The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
Affected Software
Microsoft Office
| Software | Maximum Security Impact | Aggregate Severity Rating | Updates Replaced |
|---|---|---|---|
| Microsoft InfoPath 2010 Service Pack 1 (32-bit editions) (2687422) |
None | No severity rating[1] | 2687436 in MS12-066 |
| Microsoft InfoPath 2010 Service Pack 1 (32-bit editions) (2760406) |
None | No severity rating[1] | 2687417 in MS12-066 |
| Microsoft InfoPath 2010 Service Pack 1 (64-bit editions) (2687422) |
None | No severity rating[1] | 2687436 in MS12-066 |
| Microsoft InfoPath 2010 Service Pack 1 (64-bit editions) (2760406) |
None | No severity rating[1] | 2687417 in MS12-066 |
| Software | Component | Maximum Security Impact | Aggregate Severity Rating | Updates Replaced |
|---|---|---|---|---|
| Microsoft SharePoint Server | ||||
| Microsoft SharePoint Server 2010 Service Pack 1 | [Microsoft SharePoint Server 2010 Service Pack 1 (wosrv)](http://www.microsoft.com/downloads/details.aspx?familyid=6c7d007f-5c8d-464c-af04-4e7800a2e2a6)[1] (2687421) | Elevation of Privilege | Important | 2687435 in [MS12-066](http://go.microsoft.com/fwlink/?linkid=260957) |
| Microsoft SharePoint Server 2010 Service Pack 1 | [Microsoft SharePoint Server 2010 Service Pack 1 (coreserver)](http://www.microsoft.com/downloads/details.aspx?familyid=c59c0d25-8d6c-4dda-a06b-e42891a9ddae)[1] (2760408) | Elevation of Privilege | Important | 2589280 in [MS12-066](http://go.microsoft.com/fwlink/?linkid=260957) |
| Microsoft Groove Server | ||||
| [Microsoft Groove Server 2010 Service Pack 1](http://www.microsoft.com/downloads/details.aspx?familyid=d63ee461-b823-4eb1-9e6d-82f380627fb5) (2687424) | Not applicable | Elevation of Privilege | Important | 2687402 in [MS12-066](http://go.microsoft.com/fwlink/?linkid=260957) |
| Microsoft SharePoint Foundation | ||||
| [Microsoft SharePoint Foundation 2010 Service Pack 1](http://www.microsoft.com/downloads/details.aspx?familyid=ac805c46-8661-4e99-84da-c395dc05beb0) (2810059) | Not applicable | Elevation of Privilege | Important | 2687434 in [MS12-066](http://go.microsoft.com/fwlink/?linkid=260957) |
Microsoft Office Web Apps
| Software | Component | Maximum Security Impact | Aggregate Severity Rating | Updates Replaced |
|---|---|---|---|---|
| Microsoft Office Web Apps 2010 Service Pack 1 (2760777) |
Not applicable | Elevation of Privilege | Important | 2687401 in MS12-066 |
| Affected Software | HTML Sanitization Vulnerability - CVE-2013-1289 | Aggregate Severity Rating | |
|---|---|---|---|
| Microsoft Office | |||
| Microsoft InfoPath 2010 Service Pack 1 (32-bit editions) | **No severity rating**[1] | **No severity rating** | |
| Microsoft InfoPath 2010 Service Pack 1 (64-bit editions) | **No severity rating**[1] | **No severity rating** | |
| Microsoft SharePoint Server | |||
| Microsoft SharePoint Server 2010 Service Pack 1 | **Important** Elevation of Privilege | **Important** | |
| Microsoft Groove Server | |||
| Microsoft Groove Server 2010 Service Pack 1 | **Important** Elevation of Privilege | **Important** | |
| Microsoft SharePoint Foundation | |||
| Microsoft SharePoint Foundation 2010 Service Pack 1 | **Important** Elevation of Privilege | **Important** | |
| Microsoft Offices Web Apps | |||
| Microsoft Office Web Apps 2010 Service Pack 1 | **Important** Elevation of Privilege | **Important** | |
HTML Sanitization Vulnerability - CVE-2013-1289
An elevation of privilege vulnerability exists in the way that HTML strings are sanitized. An attacker who successfully exploited this vulnerability could perform cross-site scripting attacks on affected systems and run script in the security context of the current user.
To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2013-1289.
Mitigating Factors
Microsoft has not identified any mitigating factors for this vulnerability.
Workarounds
Microsoft has not identified any workarounds for this vulnerability.
FAQ
What is the scope of the vulnerability?
This is an elevation of privilege vulnerability.
What causes the vulnerability?
The vulnerability is caused by the way that HTML strings are sanitized.
What is HTML sanitization?
HTML sanitization is a process that restricts HTML to elements that can be safely displayed in a browser.
What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could read content that the attacker is not authorized to read or use the victim's identity to take actions on the targeted site or application.
How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would have to convince a user to view specially crafted SharePoint content, which then runs a script in the context of the user.
In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website.
What systems are primarily at risk from the vulnerability?
Systems where users connect to a SharePoint server are primarily at risk from this vulnerability.
What does the update do?
The update addresses the vulnerability by modifying the way that HTML strings are sanitized.
When this security bulletin was issued, had this vulnerability been publicly disclosed?
No. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.
When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
Yes. Microsoft is aware of limited, targeted attacks attempting to exploit the vulnerability.
Update Information
Detection and Deployment Tools and Guidance
Several resources are available to help administrators deploy security updates.
- Microsoft Baseline Security Analyzer (MBSA) lets administrators scan local and remote systems for missing security updates and common security misconfigurations.
- Windows Server Update Services (WSUS), Systems Management Server (SMS), and System Center Configuration Manager (SCCM) help administrators distribute security updates.
- The Update Compatibility Evaluator components included with Application Compatibility Toolkit aid in streamlining the testing and validation of Windows updates against installed applications.
For more information about these tools and guidance in deploying security updates across networks, see Security Tools for IT Pros.
Security Update Deployment
Affected Software
For information about the specific security update for your affected software, click the appropriate link:
InfoPath 2010 (all editions)
Reference Table
The following table contains the security update information for this software.
| Security update file name | For all supported 32-bit editions of InfoPath 2010: infopath2010-kb2687422-fullfile-x86-glb.exe ipeditor2010-kb2760406-fullfile-x86-glb.exe |
| For all supported x64-based editions of InfoPath 2010: infopath2010-kb2687422-fullfile-x64-glb.exe ipeditor2010-kb2760406-fullfile-x64-glb.exe |
|
| Installation switches | See Microsoft Knowledge Base Article 912203 |
| Restart Requirement | In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012. |
| Removal Information | Use Add or Remove Programs item in Control Panel. |
| File Information | See Microsoft Knowledge Base Article 2687422 and Microsoft Knowledge Base Article 2760406 |
| Registry Key Verification | Not applicable |
| Security update file name | For all supported editions of Microsoft SharePoint Server 2010: wosrv2010-kb2687421-fullfile-x64-glb.exe coreserver2010-kb2760408-fullfile-x64-glb.exe |
| Installation switches | See Microsoft Knowledge Base Article 912203 |
| Restart Requirement | In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012. |
| Removal Information | This security update cannot be removed. |
| File Information | See Microsoft Knowledge Base Article 2687421 and Microsoft Knowledge Base Article 2760408 |
| Registry Key Verification | Not applicable |
| Security update file name | For all supported editions of Microsoft Groove Server 2010: emsgrs2010-kb2687424-fullfile-x64-glb.exe |
| Installation switches | See Microsoft Knowledge Base Article 912203 |
| Restart Requirement | In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012. |
| Removal Information | This security update cannot be removed. |
| File Information | See Microsoft Knowledge Base Article 2687424 |
| Registry Key Verification | Not applicable |
| Security update file name | For Microsoft SharePoint Foundation 2010 Service Pack 1: wss2010-kb2810059-fullfile-x64-glb.exe |
| Installation switches | See Microsoft Knowledge Base Article 912203 |
| Restart Requirement | In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012. |
| Removal Information | This security update cannot be removed. |
| File Information | See Microsoft Knowledge Base Article 2810059 |
| Registry Key Verification | Not applicable |
| Security update file name | For Office Web Apps 2010 Service Pack 1: wac2010-kb2760777-fullfile-x64-glb.exe |
| Installation switches | See Microsoft Knowledge Base Article 912203 |
| Restart Requirement | In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012. |
| Removal Information | This security update cannot be removed. |
| File Information | See Microsoft Knowledge Base Article 2760777 |
| Registry Key Verification | Not applicable |
