August 2013 - Microsoft Releases 8 Security Advisories
DESCRIPTION
Microsoft addresses the following vulnerabilities in its August batch of patches:
- (MS13-059) Cumulative Security Update for Internet Explorer (2862772)
Risk Rating: Critical
This security updates addresses eleven reported vulnerabilities in Internet Explorer, which may lead to an attacker executing a malware onto vulnerable system. The attacker can also gain user rights similar to the currently logged in user. Read more here.
- (MS13-060) Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2850869)
Risk Rating: Critical
This security update addresses a reported vulnerability in Microsoft Windows, specifically in the Unicode Scripts Processor. This may allow an attacker to execute a malware once a user open a malware posing as a document or webpage that supports embedded OpenType fonts. Read more here.
- (MS13-061) Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2876063)
Risk Rating: Critical
This security update addresses three disclosed vulnerabilities in Microsoft Exchange Server, stemming from the WebReady Document viewing and Data Loss Prevention fetures. This may lead to malware execution in an unpatched system.. Read more here.
- (MS13-062) Vulnerability in Remote Procedure Call Could Allow Elevation of Privilege (2849470)
Risk Rating: Important
This security update resolves a privately reported vulnerability in Microsoft Windows that may allow an attacker to gain elevated privilege once an attacker sends a malicious RPC request. Read more here.
- (MS13-063) Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2859537)
Risk Rating: Important
This security update resolve a publicly disclosed vulnerability and three undisclosed ones in Microsoft Windows. An attacker must have valid logon credentials to exploit these vulnerabilities and execute a malware. Read more here.
- (MS13-064) Vulnerability in Windows NAT Driver Could Allow Denial of Service (2849568)
Risk Rating: Important
This security update addresses an undisclosed vulnerability in Windows NAT Driver in Microsoft Windows, which can lead to an attacker executing a denial-of-service attack. Read more here.
- (MS13-065) Vulnerability in ICMPv6 could allow Denial of Service (2868623)
Risk Rating: Important
This security update resolves an undisclosed vulnerability in Microsoft Windows that may allow a denial of service once a remote attacker sends a malicious ICMP packet to a vulnerable system. Read more here.
- (MS13-066) Vulnerability in Active Directory Federation Services Could Allow Information Disclosure (2873872)
Risk Rating: Important
This security update resolves an undisclosed vulnerability in Active Directory Federation Services (AD FS) that may allow unwanted data disclosure. With this disclosure, an attacker could then attempt to login a targeted network. . Read more here.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
MS Bulletin ID | Vulnerability ID | DPI Rule Number | DPI Rule Name | Release Date | IDF Compatibility |
MS13-059 | CVE-2013-3184 | 1005629 | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3184) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3187 | 1005630 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3187) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3188 | 1005631 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3188) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3189 | 1005632 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2013-3189) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3191 | 1005633 | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3191) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3193 | 1005634 | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3193) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3194 | 1005635 | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3194) | 13-Aug-13 | YES |
MS13-059 | CVE-2013-3199 | 1005636 | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3199) | 13-Aug-13 | YES |
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more