March 2012- Microsoft Releases 6 Security Advisories
Publish date: February 20, 2013
Severity: HIGH
Advisory Date: MAR 13, 2012
DESCRIPTION
Microsoft addresses the following vulnerabilities in its March batch of patches:
- (MS12-017) Vulnerability in DNS Server Could Allow Denial of Service (2647170)
Risk Rating: Important
This update resolves a privately reported vulnerability in Microsoft Windows that could allow denial of service if a remote unauthenticated attacker sends a specially crafted DNS query to the target DNS server. Read more here. - (MS12-018) Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2641653)
Risk Rating: Important
This update resolves a privately reported vulnerability in Microsoft Windows that could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. Read more here. - (MS12-019) Vulnerability in DirectWrite Could Allow Denial of Service (2665364)
Risk Rating: Medium
This update resolves a publicly disclosed vulnerability in Windows DirectWrite. In an Instant Messenger-based attack scenario, the vulnerability could allow denial of service if an attacker sends a specially crafted sequence of Unicode characters directly to an Instant Messenger client. Read more here. - (MS12-020) Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)
Risk Rating: Critical
This security update resolves two privately reported vulnerabilities in the Remote Desktop Protocol. The more severe of these vulnerabilities could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. Read more here. - (MS12-021) Vulnerability in Visual Studio Could Allow Elevation of Privilege (2651019)
Risk Rating: Important
This security update resolves one privately reported vulnerability in Visual Studio. The vulnerability could allow elevation of privilege if an attacker places a specially crafted add-in in the path used by Visual Studio and convinces a user with higher privileges to start Visual Studio. Read more here. - (MS12-022) Vulnerability in Expression Design Could Allow Remote Code Execution (2651018)
Risk Rating: Important
This security update resolves one privately reported vulnerability in Microsoft Expression Design. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an .xpr or .DESIGN file) that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Read more here.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields the following vulnerabilities using the specified rules. Trend Micro customers using OfficeScan with the Intrusion Defense Firewall plugin are also protected from attacks using these vulnerabilities.
Microsoft Bulletin ID | Vulnerability ID | Rule Number & Title | Deep Security Pattern Version | Deep Security Pattern Release Date |
---|---|---|---|---|
MS12-017 | CVE-2012-0006 | 1004951 - DNS Denial Of Service Vulnerability (CVE-2012-0006) | 12-006 | Mar 13, 2012 |
MS12-020 | CVE-2012-0002 | 1004949 - Remote Desktop Protocol Vulnerability (CVE-2012-0002) | 12-006 | Mar 13, 2012 |
MS12-021 | CVE-2012-0008 | 1004950 - Microsoft Visual Studio - New Add-In Created | 12-006 | Mar 13, 2012 |
MS12-022 | CVE-2012-0016 | 1004946- Microsoft Expression Design Insecure Library Loading Vulnerability Over Network Share | 12-006 | Mar 13, 2012 |
MS12-012 | CVE-2012-0016 | 1004947- Microsoft Expression Design Insecure Library Loading Vulnerability Over WebDAV | 12-006 | Mar 13, 2012 |
OTHER INFORMATION
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more