Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 13 vulnerabilities that were fixed in 8 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 8 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
A remote code execution vulnerability is caused when the Windows Print Spooler fails to handle a specially crafted print job.
Microsoft has released a security update that addresses the vulnerability by correcting how the Windows Print Spooler handles specially crafted print jobs.
This security update is rated Critical for all supported editions of Windows 7 and Windows Server 2008 R2.
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS13-001 for further details.
Workaround:
1) Disabling the Print Spooler service will help protect the affected system from attempts to exploit this vulnerability.
Impact of workaround #1 - Print-related components will not function properly; printing will be disabled.
Affected Software:
This security update is rated Critical for Microsoft XML Core Services 3.0, Microsoft XML Core Services 4.0, and Microsoft XML Core Services 6.0 on all affected editions of Windows XP, Windows Vista, Windows 7, Windows 8, and Windows RT; Critical for Microsoft XML Core Services 5.0 when installed with all supported editions of Microsoft Office 2003, Microsoft Office 2007, Microsoft Word Viewer, Microsoft Office Compatibility Pack, Microsoft Expression Web, Microsoft SharePoint Server 2007, and Microsoft Groove Server 2007; Moderate for Microsoft XML Core Services 3.0, 4.0, and 6.0 on all affected editions of Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
February 2013 Security Updates Are on MyOEM and ECE for XPe SP3 and Standard 2009 (KB2757638)
Workaround:
1) Restrict access to msxml3.dll or msxml6.dll
Impact of workaround. Websites that use XML may no longer display or function correctly.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS13-002 Microsoft Office SharePoint Server 2007 (32-bit editions)
MS13-002 Microsoft Office SharePoint Server 2007 (64-bit editions)
MS13-002 Microsoft XML Core Services 4.0 when installed on Windows (all versions)
MS13-002 Microsoft XML Core Services 5.0
MS13-002 Microsoft XML Core Services 6.0
MS13-002 Microsoft XML Core Services 6.0
MS13-002 Microsoft XML Core Services 6.0
MS13-002 Office 2003
MS13-002 Windows 8
MS13-002 Windows 8 for x64-based Systems
MS13-002 Windows Server 2003 - Itanium based
MS13-002 Windows Server 2003 x64 Edition
MS13-002 Windows Server 2012Security Only
MS13-002 Windows Vista
MS13-002 Windows Vista for x64-based Systems
MS13-002 Windows XP
MS13-002 Windows XP x64
A cross-site scripting (XSS) vulnerability exists in System Center Operations Manager that could allow specially crafted script code to run under the guise of the server. This is caused when the System Center Operations Manager improperly validates input. (CVE-2013-0009,CVE-2013-0010)
Affected Software:
Microsoft System Center Operations Manager 2007 Service Pack 1
Microsoft System Center Operations Manager 2007 R2
This security update is rated Important for all supported releases.
Microsoft System Center Operations Manager 2007 R2
Microsoft System Center Operations Manager 2007 Service Pack 1
Refer to Microsoft Security Bulletin MS13-003 for further details.
Microsoft .NET Framework is exposed to the following vulnerabilities:
1) An information disclosure vulnerability exists in the way the Windows Forms in .NET Framework handles pointers to unmanaged memory locations. (CVE-2013-0001).
2) An elevation of privilege vulnerability exists in the way that a Windows Forms method included in the .NET Framework validates the number of objects in memory before copying those objects into an array. (CVE-2013-0002).
3) An elevation of privilege vulnerability exists in the way that a System.DirectoryServices.Protocols (S.DS.P) namespace method in the .NET Framework validates the size of objects in memory prior to copying those objects into an array (CVE-2013-0003).
4) An elevation of privilege vulnerability exists in the way that .NET Framework validates the permissions of certain objects in memory. (CVE-2013-0004).
This security update is rated Important for Microsoft .NET Framework 1.0 Service Pack 3, Microsoft .NET Framework 1.1 Service Pack 1, Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4, and Microsoft .NET Framework 4.5 on all supported editions of Microsoft Windows. This update has no severity rating for Microsoft .NET Framework 3.0 Service Pack 2.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
February 2013 Security Updates Are on MyOEM and ECE for XPe SP3 and Standard 2009
Windows XP Service Pack 3 (Microsoft .NET Framework 1.0 Service Pack 3)
Windows XP Service Pack 3 (Microsoft .NET Framework 1.1 Service Pack 1)
Windows XP Service Pack 3 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows XP Service Pack 3 (Microsoft .NET Framework 4)
Windows XP Service Pack 3 (Microsoft .NET Framework 3.0 Service Pack 2)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 1.1 Service Pack 1)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 3.0 Service Pack 2)
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 1.1 Service Pack 1)
Windows Vista Service Pack 2 (Microsoft .NET Framework 4)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS13-004.
Workaround:
Workarounds for CVE-2013-0002,CVE-2013-0003,CVE-2013-0004.
To help protect against this vulnerability, change your settings to prompt before running XAML browser applications (XBAPs) or to disable XBAPs in the Internet and Local intranet security zones as follows: In Internet Explorer, click the Tools menu and then select Internet Options. Click the Security tab, click Internet, and then click Custom level. Under Settings, for Loose XAML, click Prompt or Disable, and then click OK. Click the Security tab, click Internet, and then click Custom level. Under Settings, for XAML browser applications, click Prompt or Disable, and then click OK. Click the Security tab, click Internet, and then click Custom level. Under Settings, for XPS documents, click Prompt or Disable, and then click OK. On the Security tab, click Custom level. Under .NET Framework-reliant components, set Run components not signed with Authenticode to either Prompt or Disable, and then click OK. Repeat this step for Run components signed with Authenticode, and then click OK. Click Local intranet, and then click Custom Level. Repeat steps 3 and 4. If you are prompted to confirm that you want to change these settings, click Yes. Click OK to return to Internet Explorer
The security update addresses the vulnerability by correcting the way that the Windows kernel-mode driver handles window broadcast messages.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS13-005.
Microsoft released a security update that addresses the vulnerability by modifying the way that the Windows SSL provider component handles encrypted network packets.
The security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012 and Windows RT.
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS13-006.
Workaround:
Configure Internet Explorer to disable SSLv2 and configure Internet Information Services to disable SSLv2.
A denial of service vulnerability exists in the OData specification. That is caused when the WCF Replace function improperly sanitizes specially crafted values, allowing the replication of data and the exhaustion of system resources. (CVE-2013-0005)
Affected Software:
Windows XP Service Pack 3 and Windows XP Professional x64 Edition Service Pack 2
- Microsoft .NET Framework 3.5 Service Pack 1)
- Microsoft .NET Framework 4
Windows Server 2003 Service Pack 2
- Microsoft .NET Framework 3.5 Service Pack 1
- Microsoft .NET Framework 4
Windows Vista Service Pack 2
- Microsoft .NET Framework 3.5 Service Pack 1
- Microsoft .NET Framework 4
Windows Server 2008 Service Pack 2
- Microsoft .NET Framework 3.5 Service Pack 1
- Microsoft .NET Framework 4
Windows 7, Windows 7 Service Pack 1
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4
Windows Server 2008 R2, Windows Server 2008 R2 Service Pack 1
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4
Windows 8
- Microsoft .NET Framework 3.5
Windows Server 2012
- Microsoft .NET Framework 3.5
- Management OData IIS Extension
This security update is rated Important for all supported releases.
Windows XP Service Pack 3 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows XP Service Pack 3 (Microsoft .NET Framework 4)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 3.5 Service Pack 1)
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 4)
Windows Vista Service Pack 2 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows Vista Service Pack 2 (Microsoft .NET Framework 4)
Windows Vista x64 Edition Service Pack 2 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows Vista x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Microsoft .NET Framework 3.5 Service Pack 1)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Microsoft .NET Framework 4)
Windows 7 for 32-bit Systems (Microsoft .NET Framework 3.5.1)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS13-007.
Affected Software:
Adobe Flash Player in Internet Explorer 10
Update for Internet Explorer Flash Player for Windows 8
Update for Internet Explorer Flash Player for Windows 8 x64-based systems
Update for Internet Explorer Flash Player for Windows Server 2012
Refer to KB2796096 to obtain further information.
These new vulnerability checks are included in Qualys vulnerability signature 2.2.330-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.