Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93105 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

MS Security Bulletin Summary - November 2013


  • Please log in to reply
6 replies to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 12 November 2013 - 12:30 PM

FYI...

- https://technet.micr...lletin/ms13-nov
Nov 12, 2013 - "This bulletin summary lists security bulletins released for November 2013...
(Total of -8-)

Microsoft Security Bulletin MS13-088 - Critical
Cumulative Security Update for Internet Explorer (2888505)
- https://technet.micr...lletin/ms13-088
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS13-089 - Critical
Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331)
- https://technet.micr...lletin/ms13-089
Critical - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS13-090 - Critical
Cumulative Security Update of ActiveX Kill Bits (2900986)
- https://technet.micr...lletin/ms13-090
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS13-091 - Important
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2885093)
- https://technet.micr...lletin/ms13-091
Important - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS13-092 - Important
Vulnerability in Hyper-V Could Allow Elevation of Privilege (2893986)
- https://technet.micr...lletin/ms13-092
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS13-093 - Important
Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure (2875783)
- http://technet.micro...lletin/ms13-093
Important - Information Disclosure - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS13-094 - Important
Vulnerability in Microsoft Outlook Could Allow Information Disclosure (2894514)
- http://technet.micro...lletin/ms13-094
Important - Information Disclosure - May require restart - Microsoft Office

Microsoft Security Bulletin MS13-095 - Important
Vulnerability in Digital Signatures Could Allow Denial of Service (2868626)
- https://technet.micr...lletin/ms13-095
Important - Denial of Service - Requires restart - Microsoft Windows
___

- http://blogs.technet...Redirected=true
12 Nov 2013

Bulletin Deployment Priority
- https://blogs.techne...ide_5F00_DP.png

Severity and Exploitability Index
- https://blogs.techne...00_Severity.png
___

- https://secunia.com/advisories/55054/ - MS13-088
- https://secunia.com/advisories/50000/ - MS13-089
- https://secunia.com/advisories/55611/ - MS13-090
- https://secunia.com/advisories/55539/ - MS13-091
- https://secunia.com/advisories/55550/ - MS13-092
- https://secunia.com/advisories/55558/ - MS13-093
- https://secunia.com/advisories/55574/ - MS13-094
- https://secunia.com/advisories/55629/ - MS13-095
___

November 2013 Office Update Release
- http://blogs.technet...te-release.aspx
12 Nov 2013 - "... There are 8 security updates (2 bulletins) and 18 non-security updates..."
___

ISC Analysis
- https://isc.sans.edu...l?storyid=17003
2013-11-12 18:00:41 UTC
___

November 2013 Security Bulletin Release - Q&A
- https://blogs.techne...Redirected=true
Nov 13, 2013
"... Q: Regarding the TIFF registry change (Fix it) in Microsoft Security Advisory 2896666, can you explain how this will affect TIFF usage?...
A: TIFF images will be blocked on the affected software and platforms listed in the advisory..."

.


Edited by AplusWebMaster, 16 November 2013 - 07:57 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#2 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 13 November 2013 - 06:51 AM

FYI...

XP update locks machines with SVCHOST red lined at 100%: Fix it with KB 2879017...
- http://www.infoworld...-2879017-230733
Nov 13, 2013 - "... when Windows Update accesses the Microsoft website to gather a list of available updates, the machine can lock up for five, 10, 15 minutes - or more - with the CPU and fan running at 100 percent. Then, if the customer waits long enough for the updates to appear, and clicks to install them, the XP machine goes racing away again for another five or 10 or more minutes, with the CPU redlined at 100 percent... The best solution appears to be a manual update to Internet Explorer. Yes, Microsoft has messed up wuauclt.exe so badly that it has to be repaired by installing an IE update - not a Windows update - to get it working properly. The fix is part of the October cumulative IE patch known as MS13-080/ KB 2879017*. If you manually download and install the October cumulative patch, then you should be able to use Windows Update with no problems... You would think that simply upgrading to the latest version of IE would solve the problem, but it doesn't. You have to manually download and apply the patch for your version of IE..."
* http://technet.micro...lletin/MS13-080
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#3 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 November 2013 - 07:14 AM

FYI...

MS13-088 - KB2888505
- http://windowssecret...ch-placeholder/
Nov 13, 2013 - "This month’s cumulative IE update fixes -10- newly reported vulnerabilities. KB 2888505 is rated -critical- for Versions 6–11. The only version to get a pass is the new Internet Explorer 11 for Windows 7. This update also includes -17- nonsecurity fixes, as detailed in MS Support article 2888505*... you must keep IE updated, even if you typically use another browser. IE is more than a browser: it’s a key component of the Windows operating system..."
* http://support.micro...b;en-us;2888505
 

:ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#4 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 20 November 2013 - 06:46 AM

FYI...

MS to fix XP update SVCHOST redline issue 'soon'
- http://www.infoworld...sue-soon-230940
Nov 15, 2013 - "... The Microsoft Update team has analyzed the latest manifestation, come up with an explanation, and has promised that a permanent solution will arrive "as soon as possible." Windows Update team member Doug Neal has just posted a message to the Patch Management Mailing List that explains what's happening when Windows XP's Windows Update agent, wuauclt.exe (running in a SVCHOST wrapper), drives CPU utilization to 100 percent - and can keep WinXP machines pegged at 100 percent for -15- minutes or longer.
   'The problem is caused by the Windows Update client evaluating an exceptionally long supersedence chain - something IE6 and IE7 have more than any other version of IE due to their time in market. Each 'link' in the chain doubles the CPU resources needed to evaluate it over the previous version. The chain is so long that the design stymies the WUA client.'
... Neal concludes by saying:
    'While I can't provide a date for when this will be done, we know it's an issue affecting customer PCs and we're working to get it out as soon as possible to halt the impact'..."
 

:ph34r:  :(


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#5 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 21 November 2013 - 03:26 PM

FYI...

KB 2670838 - fuzzy fonts ...
- http://www.infoworld...indows-7-231035
Nov 18, 2013 - "... Microsoft didn't solve the problem, but it did publish a list of video drivers thought to conflict with the patch. The company also modified the installer to avoid planting the font-busting patch on machines running the identified bad video drivers. That list, toward the bottom of article KB 2670838*, has gone through -eight- major revisions... seeing complaints all over the Web that installing Internet Explorer 11 on Windows 7 can -trigger- the same problem - and the fuzzy fonts appear even on machines that aren't running any of the identified problematic video drivers... also seeing reports that the fuzzy fonts crop up on Firefox, Chrome, and - remarkably - Internet Explorer itself. Some people report that the fuzziness goes away if the pages are refreshed enough times. Others see fuzzy characters only on some pages, but very similar pages don't have the problem. If you have a case of the font fuzzies and are using IE10, the only known solution involves uninstalling KB 2670838. But if you've installed IE11, you may or may not have KB 2670838 - and if you do have it, uninstalling doesn't fix the problem..."
* http://support.micro...b/2670838/en-us
Sep 30, 2013 - Rev 8.0
 

:ph34r: :ph34r: :(


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#6 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 22 November 2013 - 08:29 AM

FYI...

CVE-2013-3918 Exploit...
- http://www.threattra...3-3918-exploit/
Nov 22, 2013 - "...  If you haven’t updated your OS yet, -now- is the time to do it... We were able to retrieve a piece of the exploit malware... Here is a malformed HTML website I used to test the exploit on.
> http://www.threattra...A4CACC6ED89.jpg
As you can see, there’s nothing special about it. All one can see is a white page with the text “Hello man” on it. What users don’t know is that infiltration and code execution happens in the background. They don’t see anything happening until it’s already too late..."

- https://web.nvd.nist...d=CVE-2013-3918 - 9.3 (HIGH)
Last revised: 11/15/2013 - "... as exploited in the wild in November 2013, aka 'InformationCardSigninHelper' Vulnerability."

Microsoft Security Bulletin MS13-090 - Critical
Cumulative Security Update of ActiveX Kill Bits (2900986)
- http://technet.micro...lletin/MS13-090
___

- http://blog.trendmic...rlight-exploit/
Nov 25, 2013 - "... independent security researchers found that the Angler Exploit Kit had added Silverlight to their list of targeted software, using CVE-2013-0074. When we analyzed the available exploit, we found that in addition to CVE-2013-0074, a second vulnerability, CVE-2013-3896, in order to bypass ASLR. These vulnerabilities are discussed in two separate Microsoft security bulletins, namely MS13-022 and MS13-087, respectively..."
 

:ph34r: :ph34r:  :(


Edited by AplusWebMaster, 26 November 2013 - 02:21 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#7 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 November 2013 - 06:55 AM

FYI...

.NET Framework 4.5.1
- http://windowssecret...box-one/#story6
November 27, 2013 - "Skip this serving of .NET Framework 4.5.1... 2858725..."

KB 2858725
- http://support.micro....com/kb/2858725
Last Review: Nov 26, 2013 - Rev 4.0

How to temporarily block the installation of the .NET Framework 4.5.1 ...
- http://support.micro....com/kb/2721187
Last Review: Nov 26, 2013 - Rev 3.0
Applies to:
•Microsoft .NET Framework 4.5.1, when used with:
Windows Vista Ultimate
Windows 7 Ultimate
Windows Server 2008 Enterprise
Windows Server 2008 R2 Enterprise
Windows Server 2012 Standard
___

.NET Framework Cleanup Tool
- http://blogs.msdn.co...28/8904493.aspx
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 28 November 2013 - 11:07 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users