Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 20 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
A remote code execution vulnerability exists in Active Directory. To exploit this vulnerability, an attacker would first need to acquire credentials to log on to an Active Directory domain. An attacker could then run a specially crafted application that could exploit the vulnerability and take complete control over the affected system.
Affected Software:
Active Directory, ADAM, and AD LDS when installed on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 (except Itanium), Windows 7, and Windows Server 2008 R2 (except Itanium).
This security update is rated Important.
Windows XP Service Pack 3 (Active Directory Application Mode (ADAM))
Windows XP Professional x64 Edition Service Pack 2 (Active Directory Application Mode (ADAM))
Windows Server 2003 Service Pack 2 (Active Directory)
Windows Server 2003 Service Pack 2 (Active Directory Application Mode )
Windows Server 2003 x64 Edition Service Pack 2 (Active Directory)
Windows Server 2003 x64 Edition Service Pack 2 (Active Directory Application Mode )
Windows Server 2003 with SP2 for Itanium-based Systems (Active Directory)
Windows Vista Service Pack 2 (Active Directory Lightweight Directory Service (AD LDS))
Windows Vista x64 Edition Service Pack 2 (Active Directory Lightweight Directory Service (AD LDS))
Please refer to Microsoft Security Bulletin MS11-095 for further details.
An elevation of privilege vulnerability exists due to the way that the Microsoft Office IME (Chinese) improperly exposes configuration options not designed to run on the secure desktop. (CVE-2011-2010)
Affected Software:
Microsoft Office 2010 and Microsoft Office 2010 Service Pack 1 (32-bit editions)
Microsoft Office 2010 and Microsoft Office 2010 Service Pack 1 (64-bit editions)
Microsoft Office Pinyin SimpleFast Style 2010 and Microsoft Office Pinyin New Experience Style 2010 (32-bit version)
Microsoft Office Pinyin SimpleFast Style 2010 and Microsoft Office Pinyin New Experience Style 2010 (64-bit version)
This security update is rated Important.
Refer to Microsoft Security Bulletin MS11-088 for further details.
Microsoft Windows kernel is prone to a remote code execution vulnerability when a Windows kernel-mode driver fails to properly handle the TrueType font type.
This vulnerability is reported to be included in the Duqu Trojan and has been used in targeted attacks.
Affected Software:
Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2639417)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-087 for further details.
Workaround:
1. Deny access to T2EMBED.DLL
Note See Microsoft Knowledge Base Article 2639658 to use the automated Microsoft Fix it solution to enable or disable this workaround to deny access to t2embed.dll.
Impact of Workaround -
Applications that rely on embedded font technology will fail to display properly.
A remote code execution vulnerability exists in the way that Microsoft Word handles specially crafted Word files.
Microsoft has released a security update that addresses the vulnerability by correcting the way that Microsoft Word parses specially crafted Word files.
Affected Software:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office for Mac 2011
This security update is rated Important.
Microsoft Office 2007 Service Pack 2 and Microsoft Office 2007 Service Pack 3
Microsoft Office 2010 and Microsoft Office 2010 Service Pack 1 (32-bit editions)
Microsoft Office 2010 and Microsoft Office 2010 Service Pack 1 (64-bit editions)
Refer to Microsoft Security Bulletin MS11-089.
Workaround:
Do not open untrusted office files.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS11-089 Microsoft Office 2007 Service Pack 2 and Microsoft Office 2007 Service Pack 3
MS11-089 Microsoft Office 2010 and Microsoft Office 2010 Service Pack 1 (32-bit editions)
MS11-089 Microsoft Office 2010 and Microsoft Office 2010 Service Pack 1 (64-bit editions)
MS11-089 Microsoft Office for Mac 2011
Affected Software:
Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
This security update is rated Critical.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2618451)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Please refer to Microsoft Security Bulletin MS11-090 for further details.
Multiple vulnerabilities exists in the file parsing code when Microsoft Office Publisher opens a malicious file.
This update resolves the following:
Publisher Function Pointer Overwrite Vulnerability - CVE-2011-1508
Publisher Out-of-bounds Array Index Vulnerablility - CVE-2011-3410
Publisher Invalid Pointer Vulnerability - CVE-2011-3411
Publisher Memory Corruption Vulnerability - CVE-2011-3412
Affected Software:
Microsoft Office Publisher 2003
Microsoft Office Publisher 2007
This security update is rated Important.
Previously this was a Zero Day detection.
Microsoft Office 2003 Service Pack 3 (Microsoft Publisher 2003 Service Pack 3)
Microsoft Office 2007 Service Pack 2 (Microsoft Publisher 2007 Service Pack 2)
Microsoft Office 2007 Service Pack 3 (Microsoft Publisher 2007 Service Pack 3)
Refer to Microsoft Security Bulletin MS11-091 for further details.
A vulnerability exists in the Windows Media Player XDS Codec filter during the processing of a specially crafted DVR-MS file. If a large length value is supplied within a certain chunk of a DVR-MS file, a heap allocation for the chunk data can fail and the return value of the allocation routine will not be checked for an error.
Microsoft has released a security update that addresses the vulnerability by modifying the way that Windows Media Player and Windows Media Center open specially crafted .dvr-ms files.
Affected Software:
Windows XP (including Windows XP Media Center Edition 2005)
Windows Vista
Windows 7
This security update is rated Critical.
Note: Previously this was an iDefense vulnerability with ID: 647554
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2619339)
Windows XP Media Center Edition 2005 Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-092.
Workaround:
It is possible to use Windows ACLs to block access to the vulnerable library. To prevent this library from loading, use the calcs program included with Windows:
cacls "%windir%\system32\encdec.dll" /E /P everyone:N
This will prevent Windows Media Player from loading this library. To undo this workaround, use the following command:
cacls "%windir%\system32\encdec.dll" /E /Reveryone
Affected Software:
Windows XP
Windows Server 2003
This security update is rated Important.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2624667)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS11-093 for further details.
Affected Software:
Microsoft PowerPoint 2007 Service Pack 2
Microsoft PowerPoint 2010
Microsoft Office 2008 for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2 and Microsoft PowerPoint Viewer 2007 Service Pack 2.
This security update is rated Important.
Microsoft Office 2007 Service Pack 2 (Microsoft PowerPoint 2007 Service Pack 2)
Microsoft Office 2010 (32-bit editions) (Microsoft PowerPoint 2010 (32-bit editions))
Microsoft Office 2010 (64-bit editions) (Microsoft PowerPoint 2010 (64-bit editions))
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
Microsoft PowerPoint Viewer 2007 Service Pack 2
Microsoft Office 2007 Service Pack 2 (Microsoft PowerPoint 2007 Service Pack 2)
Microsoft Office 2010 (32-bit editions) (Microsoft PowerPoint 2010 (32-bit editions))
Microsoft Office 2010 (64-bit editions) (Microsoft PowerPoint 2010 (64-bit editions))
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
Microsoft PowerPoint Viewer 2007 Service Pack 2
Refer to Microsoft Security Bulletin MS11-094 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS11-094 Microsoft Office 2007 Service Pack 2(Microsoft PowerPoint 2007 Service Pack 2)
MS11-094 Microsoft Office 2008 for Mac
MS11-094 Microsoft Office 2010 (32-bit editions)(Microsoft PowerPoint 2010 (32-bit editions))
MS11-094 Microsoft Office 2010 (64-bit editions)(Microsoft PowerPoint 2010 (64-bit editions))
MS11-094 Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
MS11-094 Microsoft PowerPoint Viewer 2007 Service Pack 2
Microsoft Excel is vulnerable to a remote code execution vulnerability due to incorrect handling of objects in memory.
Affected Software:
Microsoft Office Excel 2003
Microsoft Office 2004 for Mac
This security update is rated Important.
Microsoft Office 2003 Service Pack 3 (Microsoft Excel 2003 Service Pack 3)
Microsoft Office 2003 Service Pack 3 (Microsoft Excel 2003 Service Pack 3)
Refer to Microsoft Security Bulletin MS11-096 for further details.
An elevation of privilege vulnerability exists in the Client/Server Run-time Subsystem (CSRSS), allowing arbitrary code to be executed in the context of another process.
This security update is rated Important for all supported releases of Microsoft Windows.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2620712)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Please refer to Microsoft Security Bulletin MS11-097 for further details.
Affected Software:
32-bit editions of Windows XP
32-bit editions of Windows Server 2003
32-bit editions of Windows Vista
32-bit editions of Windows Server 2008
32-bit editions of Windows 7
This security update is rated Important.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2633171)
Windows Server 2003 Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2003 Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-098 for further details.
Internet Explorer is prone to an information disclosure vulnerability because the Internet Explorer XSS Filter allows attackers to read content from different domains through trial and error attacks. (CVE-2011-1992)
A remote code execution vulnerability exists in the way that Internet Explorer handles the loading of DLL files. Internet Explorer does not properly restrict the path used for loading external libraries. (CVE-2011-2019)
Internet Explorer is prone to an information disclosure vulnerability because, during certain processes, Internet Explorer incorrectly renders Web pages. (CVE-2011-3404)
Affected Software:
Windows XP Service Pack 3 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Server 2003 Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8)
Windows Vista Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Vista x64 Edition Service Pack 2(Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 for x64-based Systems Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (Internet Explorer 6,Internet Explorer 7,Internet Explorer 8,Internet Explorer 9)
This security update is rated Important.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2011 Security Updates are Live on ECE for XPe and Standard 2009 (KB2618444)
Windows XP Service Pack 3 (Internet Explorer 6)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 Service Pack 2 (Internet Explorer 6)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6)
Windows XP Service Pack 3 (Internet Explorer 7)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 Service Pack 2 (Internet Explorer 7)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 7)
Windows Vista Service Pack 2 (Internet Explorer 7)
Windows Vista x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for x64-based Systems Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (Internet Explorer 7)
Please refer to Microsoft Security Bulletin MS11-099 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.28.299-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.