October security bulletins microsoft 2011




















The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages.

Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Please rate your experience Yes No.

Any additional feedback? In this article. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP. NET page to that server and then executes the page, as could be the case in a Web hosting scenario.

This vulnerability could also be used by Windows. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.

An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library DLL file.

Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.

Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file such as a. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment.

The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application.

An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port or TCP ports and Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter.

Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet.

This is a denial of service vulnerability. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products. Need more help? Expand your skills.

Get new features first. Was this information helpful? Yes No. Thank you! Any more feedback? The more you tell us the more we can help.

Can you help us improve? Resolved my issue. Clear instructions. Easy to follow. No jargon. Pictures helped. Didn't match my screen.

As you probably know already, BlueHat is an invitation-only conference where security …. Announcing BlueHat v We fight for the user! Read More ». We fielded eight questions across all bulletins.

We invite our customers to join ….



0コメント

  • 1000 / 1000