Trend Micro Security

2011 年 8 月:マイクロソフト 定例セキュリティ更新プログラム情報

  危険度: :
  情報公開日: 8 09, 2011

  概要

Microsoft addresses the following vulnerabilities in its August batch of patches:

  • (MS11-057) Cumulative Security Update for Internet Explorer (2559049)
    Risk Rating: Critical

    This security update addresses five privately and two publicly reported bugs in Internet Explorer, the most severe of which may lead to arbitrary code execution. The possible exploit scenario may include a user who views a maliciously-crafted Web page using Internet Explorer. Exploiting any of these vulnerabilities could give an attacker the same user right as the local user. Read more here.

  • (MS11-058) Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485)
    Risk Rating: Critical

    This security update resolves two reported vulnerabilities in Windows DNS Server which could lead to arbitrary code execution once a potential attacker registers a domain, create NAPTR DNS record and send a malicious NAPTR query to a particular DNS server. Read more here.

  • (MS11-059) Vulnerability in Data Access Components Could Allow Remote Code Execution (2560656)
    Risk Rating: Important

    This security update addresses a vulnerability in Microsoft Windows that may lead to remote code execution once a user opens a non-malicious Excel file located in the same network directory as a malicious library file. Read more here.


  • (MS11-060) Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978)
    Risk Rating: Important

    This security update addresses two vulnerability in Microsoft Visio that may allow an attacker to execute arbitrary code if unwitting user opens a specific Visio file. Exploiting these bugs may also allow an attacker to gain same user right as logged-on user. Read more here.

  • (MS11-061) Vulnerability in Remote Desktop Web Access Could Allow Elevation of Privilege (2546250)
    Risk Rating: Important

    This security update resolves a vulnerability in Remote Desktop Web Access. Specifically, it is a cross-site (XSS) vulnerability that could allow privilege elevation, which enables a potential attacker to execute malicious code on the affected system. Read more here.


  • (MS11-062) Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege (2566454)
    Risk Rating: Important

    This security update addresses a vulnerability in Windows XP and Windows Server 2003. Systems running on Windows Vista, Server 2008, Windows 7, and Server 2008 R2 are not affected. Successfully exploiting this may allow elevation of privilege. Read more here.


  • (MS11-063) Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2567680)
    Risk Rating: Important

    This security update addresses a reported vulnerability in Microsoft Windows that could give elevation of privilege to a potential attacker. Read more here.


  • (MS11-064) Vulnerabilities in TCP/IP Stack Could Allow Denial of Service (2563894)
    Risk Rating: Important

    This security update addresses two vulnerability in Microsoft Windows that could allow denial of service if an atatcker sends several malicious Internet Control Message Protocol (ICMP) messages or a malicious URL request to a server. Read more here.


  • (MS11-065) Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222)
    Risk Rating: Important

    This security update fixes a vulnerability in the Remote Desktop Protocol, which may allow denial of service if a system receives a series of malicious RDP packets. Read more here.


  • (MS11-066) Vulnerability in Microsoft Chart Control Could Allow Information Disclosure (2567943)
    Risk Rating: Important

    This security update resolves a vulnerability in ASP.NET Chart controls that may lead to unwanted data disclosure if a remote user sends a malicious GET request to a specific server. Read more here.


  • (MS11-067) Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure (2578230)
    Risk Rating: Important

    This security update fixes a vulnerability in Microsoft Report Viewer that could result to unwanted information disclosure once a user views a specific malicious Weg page. An attacker may convince users to visit the said site via several infection vectors such as spammed message. Read more here.


  • (MS11-068) Vulnerability in Windows Kernel Could Allow Denial of Service (2556532)
    Risk Rating: Medium

    This security update resolves a vulnerability in Microsoft Windows that may lead to denial of service if user visits a specific network share (or a Web site that points to it) that contains a malicious file. Read more here.


  • (MS11-069) Vulnerability in .NET Framework Could Allow Information Disclosure (2567951)
    Risk Rating: Medium

    This security update addresses a vulnerability in Microsoft .NET Framework that could lead to information disclosure once user views a malicious Web page using a browser that can run XAML Browser Applications. Read more here.


  トレンドマイクロの対策

マイクロソフトは、2011 年 8 月の定例セキュリティ更新プログラムをリリースし、以下の脆弱性に対応しています。

  • MS11-057:Internet Explorer 用の累積的なセキュリティ更新プログラム (2559049)
    危険度:緊急

    詳しくは こちら

  • MS11-058:DNS サーバーの脆弱性により、リモートでコードが実行される (2562485)
    危険度:緊急

    詳しくは こちら

  • MS11-059:Data Access Components の脆弱性により、リモートでコードが実行される (2560656)
    危険度:

    詳しくは こちら

  • MS11-060:Microsoft Visio の脆弱性により、リモートでコードが実行される (2560978)
    危険度:

    詳しくは こちら

  • MS11-061:リモート デスクトップ Web アクセスの脆弱性により、特権が昇格される (2546250)
    危険度:

    詳しくは こちら

  • MS11-062:リモート アクセス サービス NDISTAPI ドライバーの脆弱性により、特権が昇格される (2566454)
    危険度:

    詳しくは こちら

  • MS11-063:Windows クライアント/サーバー ランタイム サブシステムの脆弱性により、特権が昇格される (2567680)
    危険度:

    詳しくは こちら

  • MS11-064:TCP/IP スタックの脆弱性により、サービス拒否が起こる (2563894)
    危険度:

    詳しくは こちら

  • MS11-065:リモート デスクトップ プロトコルの脆弱性によりサービス拒否が発生する (2570222)
    危険度:

    詳しくは こちら

  • MS11-066:Microsoft Chart Control の脆弱性により、情報漏えいが起こる (2567943)
    危険度:

    詳しくは こちら

  • MS11-067:Microsoft Report Viewer の脆弱性により、情報漏えいが起こる (2578230)
    危険度:

    詳しくは こちら

  • MS11-068:Windows カーネルの脆弱性により、サービス拒否が起こる (2556532)
    危険度:

    詳しくは こちら

  • MS11-069:.NET Framework の脆弱性により、情報漏えいが起こる (2567951)
    危険度:

    詳しくは こちら


トレンドマイクロのサーバ向け総合セキュリティ製品「Trend Micro Deep Security(トレンドマイクロ ディープセキュリティ)」は、特定のフィルタを用いて以下の脆弱性から保護します。また、「Trend Micro 脆弱性対策オプション(ウイルスバスター コーポレートエディション プラグイン製品)」をご利用のユーザも、これらの脆弱性から保護されます。


Microsoft セキュリティ情報 ID CVE識別番号 フィルタ番号およびフィルタ名 Deep Security パターンバージョン Deep Security パターンリリース日
MS11-057 CVE-2011-1257 1004758 - Microsoft Internet Explorer Windows Open Race Condition Vulnerability (CVE-2011-1257) 11-024 2011年8月10日
CVE-2011-1963 1004759 - XSLT Memory Corruption Vulnerability (CVE-2011-1963) 11-024 2011年8月10日
MS11-058 CVE-2011-1966 1004761 - DNS NAPTR Query Vulnerability (CVE-2011-1966) 11-024 2011年8月10日
MS11-059 CVE-2011-1975 1004773 - Data Access Components Insecure Library Loading Vulnerability (CVE-2011-1975) 11-024 2011年8月10日
CVE-2011-1975 1004762 - Data Access Components Insecure Library Loading Vulnerability Over Network Share (CVE-2011-1975) 11-025 2011年8月24日
MS11-066 CVE-2011-1977 1004756 - Microsoft Chart Control Directory Traversal Vulnerability (CVE-2011-1977) 11-024 2011年8月10日

  その他の関連情報