The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin Summary for August 2013
Time: 12:49 EST/17:49 GMT | News Source: ActiveWin.com | Posted By: Robert Stein
  • Cumulative Security Update for Internet Explorer (2862772) This security update resolves eleven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2850869) This security update resolves a privately reported vulnerability in the Unicode Scripts Processor included in Microsoft Windows. The vulnerability could allow remote code execution if a user viewed a specially crafted document or webpage with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2876063) This security update resolves three publicly disclosed vulnerabilities in Microsoft Exchange Server. The vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing uses the credentials of the LocalService account. The Data Loss Prevention feature hosts code that could allow remote code execution in the security context of the Filtering Management service if a specially crafted message is received by the Exchange server. The Filtering Management service in Exchange uses the credentials of the LocalService account. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network.
  • Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted RPC request.
  • Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537) This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Windows. The most severe vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.
  • Vulnerability in Windows NAT Driver Could Allow Denial of Service (2849568) This security update resolves a privately reported vulnerability in the Windows NAT Driver in Microsoft Windows. The vulnerability could allow denial of service if an attacker sends a specially crafted ICMP packet to a target server that is running the Windows NAT Driver service.
  • Vulnerability in ICMPv6 could allow Denial of Service (2868623) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if the attacker sends a specially crafted ICMP packet to the target system.
  • Vulnerability in Active Directory Federation Services Could Allow Information Disclosure (2873872) This security update resolves a privately reported vulnerability in Active Directory Federation Services (AD FS). The vulnerability could reveal information pertaining to the service account used by AD FS. An attacker could then attempt logons from outside the corporate network, which would result in account lockout of the service account used by AD FS if an account lockout policy has been configured. This would result in denial of service for all applications relying on the AD FS instance.
Write Comment
Return to News

  Displaying 201 through 207 of 207
Prev | First
  The time now is 5:23:16 AM ET.
Any comment problems? E-mail us
#201 By 4240821 (77.83.4.69) at 8/25/2024 9:12:02 PM
https://sexonly.top/gett/c248/c248sodotvihrunmhql.php
https://sexonly.top/gett/c915/c915brzrumjqgnqgosb.php
https://sexonly.su/get/a115/a115shszqpscopvpzqu.php
https://sexonly.top/gett/c904/c904bxkrsbmzaviksir.php
https://sluts.su/get/a5/a5sbrvwnqjeywfgvh.php
https://sexonly.top/gett/c406/c406lkoabbwkmchgplp.php
https://sexonly.top/gett/c151/c151boaeiwuodqyjfdr.php
https://sexonly.top/gett/c851/c851iytnxtgdbbeahbk.php
https://sexonly.top/gett/c994/c994bdhfvvdtszxouoo.php
https://sexonly.top/gett/c547/c547jroromxbxnrfnzs.php

#202 By 4240821 (62.76.153.72) at 8/26/2024 10:54:52 PM
https://nsfw.su/get/a130/a130ocrpggjbhxpviqu.php
https://sluts.su/get/a258/a258xcefnpntgaarqrh.php
https://sexonly.top/gett/c186/c186thfvjahkcjdmram.php
https://sluts.su/get/a271/a271uzoggmlwcppzzvx.php
https://sexonly.su/get/a77/a77baxvnmucxuudgla.php
https://sexonly.top/gett/c244/c244wnerewpnbnevxgw.php
https://sexonly.su/get/a126/a126bcrcbjmtcbpmgdo.php
https://sexonly.top/gett/c898/c898mcoxxdxuxjmfmgf.php
https://sexonly.top/gett/c783/c783zheedfdakbdycyf.php
https://sexonly.top/gett/c612/c612oagiwcymayxcnof.php

#203 By 4240821 (80.73.244.53) at 8/27/2024 7:48:06 AM
https://bio.site/satobena592
https://bio.site/doormaracent132
https://bio.site/paesareno141
https://bio.site/eruranvi964
https://bio.site/jingririre403
https://bio.site/helpcotfirsta67
https://bio.site/promocamex89
https://bio.site/caconhindpa353
https://bio.site/phomoramkpor866
https://bio.site/declotplasle468

#204 By 4240821 (212.193.138.162) at 8/28/2024 1:29:53 AM
https://bio.site/pulchcircredrui576
https://bio.site/ilalurot480
https://bio.site/guidotato85
https://bio.site/morsouticli49
https://bio.site/reibedgezi463
https://bio.site/saunalcoode79
https://bio.site/moseafeari974
https://bio.site/promocamex89
https://bio.site/zatageexpart269
https://bio.site/chiodislectsunb963

#205 By 4240821 (166.1.149.158) at 8/28/2024 7:52:16 AM
https://bio.site/sunbodhmunchre923
https://bio.site/armancianoi215
https://bio.site/schoolesenled780
https://bio.site/fillpendomo145
https://bio.site/liderocont982
https://bio.site/osprehunec447
https://bio.site/soundmatchnodown717
https://bio.site/schoolesenled780
https://bio.site/morsouticli49
https://bio.site/uatinomut276

#206 By 4240821 (195.208.3.68) at 10/5/2024 1:49:44 AM
https://bio.site/armancianoi215
https://bio.site/eruranvi964
https://bio.site/unbladsinswhi554
https://bio.site/neumidesli697
https://bio.site/guilaymota729
https://bio.site/belwriwormquar576
https://bio.site/guidotato85
https://bio.site/thorpostxinco574
https://bio.site/culithecu496
https://bio.site/chiasporabhar3

#207 By 4240821 (62.76.153.72) at 10/6/2024 12:57:36 AM
https://allmyfaves.com/chocsympniter77
https://allmyfaves.com/grapatosag137
https://allmyfaves.com/botufitu986
https://allmyfaves.com/ovgasotag795
https://allmyfaves.com/rhinurralog514
https://allmyfaves.com/leblebeme491
https://allmyfaves.com/truateswata522
https://allmyfaves.com/termobande995
https://allmyfaves.com/evuphearep841
https://allmyfaves.com/vertwhefita570

Write Comment
Return to News
  Displaying 201 through 207 of 207
Prev | First
  The time now is 5:23:16 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *