Microsoft Security Bulletin: November 2013

3823_7103_securitybulletin_thumb_32407BF9_thumb_12CC8186

It’s that time again! More updates for you to consider in your environments and if you have a Surface device there is a new firmware update to improve performance and reliability.

The table below show the update details for this month along with a link for more information.

Bulletin ID Bulletin Title and Executive Summary Maximum Severity Rating and Vulnerability Impact Restart Requirement Affected Software
MS13-088 Cumulative Security Update for Internet Explorer (2888505) This security update resolves ten privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Critical  Remote Code Execution Requires restart Microsoft Windows, Internet Explorer
MS13-089 Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views or opens a specially crafted Windows Write file in WordPad. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Critical  Remote Code Execution Requires restart Microsoft Windows
MS13-090 Cumulative Security Update of ActiveX Kill Bits (2900986) This security update resolves a privately reported vulnerability that is currently being exploited. The vulnerability exists in the InformationCardSigninHelper Class ActiveX control. The vulnerability could allow remote code execution if a user views a specially crafted webpage with Internet Explorer, instantiating the ActiveX control. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Critical  Remote Code Execution May require restart Microsoft Windows
MS13-091 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093) This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted WordPerfect document file is opened in an affected version of Microsoft Office software. An attacker who successfully exploited the most severe vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Important  Remote Code Execution May require restart Microsoft Office
MS13-092 Vulnerability in Hyper-V Could Allow Elevation of Privilege (2893986) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker passes a specially crafted function parameter in a hypercall from an existing running virtual machine to the hypervisor. The vulnerability could also allow denial of service for the Hyper-V host if the attacker passes a specially crafted function parameter in a hypercall from an existing running virtual machine to the hypervisor. Important  Elevation of Privilege Requires restart Microsoft Windows
MS13-093 Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure (2875783) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker logs on to an affected system as a local user, and runs a specially crafted application on the system that is designed to enable the attacker to obtain information from a higher-privileged account. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Important  Information Disclosure Requires restart Microsoft Windows
MS13-094 Vulnerability in Microsoft Outlook Could Allow Information Disclosure (2894514) This security update resolves a publicly disclosed vulnerability in Microsoft Outlook. The vulnerability could allow information disclosure if a user opens or previews a specially crafted email message using an affected edition of Microsoft Outlook. An attacker who successfully exploited this vulnerability could ascertain system information, such as the IP address and open TCP ports, from the target system and other systems that share the network with the target system. Important  Information Disclosure May require restart Microsoft Office
MS13-095 Vulnerability in Digital Signatures Could Allow Denial of Service (2868626) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service when an affected web service processes a specially crafted X.509 certificate. Important  Denial of Service Requires restart Microsoft Windows

Make sure you assess these updates for the relevance in your environments.

Jeffa

Technorati Tags: Security Updates,Patching