The Leader in Cloud Security SECURITY ADVISORY



Similar documents
CVE Adobe Flash Player Integer Overflow Vulnerability Analysis

Sandbox Roulette: Are you ready for the gamble?

MCAFEE FOUNDSTONE FSL UPDATE

Nessus scanning on Windows Domain

MCAFEE FOUNDSTONE FSL UPDATE

PCI Vulnerability Validation Report

The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk Rahul Kashyap

Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006

Windows Operating Systems. Basic Security

Enterprise Mobility Report 06/2015. Creation date: Vlastimil Turzík

Install this update to increase the performance of web sites that use Ajax. After you install this item, you may have to restart your computer.

Patch Assessment Content Update Release Notes for CCS Version: Update

Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement. MJ0011 th_decoder@126.com

Microsoft Security Bulletin MS Important

Virtualization System Security

Patch Management. A newsletter for IT Professionals. Issue 6. I. Background of Patch Management. Education Sector Updates

SSA : Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal)

IN10A. MICROSOFT WINDOWS CRITICAL UPDATES October 2014

Crystal Reports.Net 1.1 Patch

Linux Kernel. Security Report

Citect and Microsoft Windows XP Service Pack 2

Software Vulnerability Exploitation Trends. Exploring the impact of software mitigations on patterns of vulnerability exploitation

Patch Assessment Content Update Release Notes for CCS Version: Update

McAfee Policy Auditor Content Update Summary. New Checks

Understand Backup and Recovery Methods

Security Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products.

============================================================= =============================================================

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

Defense in Depth: Protecting Against Zero-Day Attacks

October Application Control: The PowerBroker for Windows Difference

Using Palo Alto Networks to Protect Microsoft SharePoint Deployments

Reverse Engineering and Computer Security

How To Manage A System Vulnerability Management Program

v4.8 Getting Started Guide: Using SpatialWare with MapInfo Professional for Microsoft SQL Server

The Security Development Lifecycle

Cloud Portal for imagerunner ADVANCE

MWR InfoSecurity Advisory. Interwoven Worksite ActiveX Control Remote Code Execution. 10 th March Contents

Abysssec Research. 1) Advisory information. 2) Vulnerable version

Date: 08/18/2015 Windows 2008R2 SP1 EndoWorks 7.4 Windows Updates Description Tested Pass/Fail Date

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Understanding Web Application Security Issues

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

Host-based Protection for ATM's

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

NCIRC Security Tools NIAPC Submission Summary Microsoft Baseline Security Analyzer (MBSA)

Windows Remote Access

Oracle Solaris Studio Code Analyzer

Unicenter Asset Intelligence r11

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

How To Install Caarcserve Backup Patch Manager (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

AvePoint CRM Migration Manager for Microsoft Dynamics CRM. Release Notes

Adobe Flash Player and Adobe AIR security

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

McAfee Data Loss Prevention Endpoint

Thick Client Application Security

Reporting Services. White Paper. Published: August 2007 Updated: July 2008

MOBILE PRINTING: Secure Printing From Your Handheld Devices

Insecurity in Security Software

Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.

CORPORATE AV / EPP COMPARATIVE ANALYSIS

NTP-AMP: AMPLIFICATION TACTICS AND ANALYSIS

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service

Windows OS Security/Critical Patch List for BD Workstations

Embedded Operating Systems in a Point of Sale Environment. White Paper

Internet accessible facilities management

Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003

Why should I care about PDF application security?

LESSON Windows Server Administration Fundamentals. Understand Updates

Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures

Enterprise Vault Installing and Configuring

USER GUIDE: MaaS360 Services

Microsoft Patch Analysis

MTP. MTP AirWatch Integration Guide. Release 1.0

Timbuktu Pro for Windows, version 8

Chapter 4 Application, Data and Host Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

AvePoint Tags 1.1 for Microsoft Dynamics CRM. Installation and Configuration Guide

Understanding Microsoft Web Application Security

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

IOActive Security Advisory

Software Vulnerability Assessment

Intellex Platform Security Update Process. Microsoft Security Updates. Version 06-10

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Skeletons in Microsoft s Closet - Silently Fixed Vulnerabilities. Andre Protas Steve Manzuik

Transcription:

The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft through their MAPPs program, has proactively deployed protections for the following 29 vulnerabilities spread across 9 security bulletins included in the December 2010 Microsoft patch cycle. Zscaler will continue to monitor exploits associated with all vulnerabilities in the October release and deploy additional protections as necessary. MS10-090 Cumulative Security Update for Internet Explorer (2416400) Severity: Critical CVE- 2010-3340 HTML Object Memory Corruption Vulnerability Description: A use after free error exists on Internet Explorer 6/7, which could lead to CVE- 2010-3343 HTML Object Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. CVE- 2010-3345 HTML Element Memory Corruption Vulnerability Description: A memory corruption vulnerability when handling elements may lead to remote CVE- 2010-3346 HTML Element Memory Corruption Vulnerability Description: A memory corruption vulnerability exists when handling HTML+Time, that could lead to a crash or possible remote code execution CVE- 2010-3962 Uninitialized Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted.

MS10-091 Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Remote Code Execution (2296199) Severity: Critical CVE- 2010-3956 OpenType Font Index Vulnerability Description: A font index vulnerability in the ATMFD Adobe font driver included in Windows could lead to code execution when parsing a malicious font file. CVE- 2010-3957 OpenType Font Double Free Vulnerability Description: A double free vulnerability in the ATMFD Adobe font driver included in Windows could lead to code execution when parsing a malicious font file. CVE- 2010-3959 OpenType CMAP Table Vulnerability Description: A vulnerability in the ATMFD Adobe font driver included in Windows could lead to code execution when parsing a malicious font file. MS10-092 Vulnerability in Task Scheduler could allow for Elevation of Privilege (2305420) CVE- 2010-3338 Task Scheduler Vulnerability Description: A local vulnerability in the Windows task scheduler can lead to code execution in SYSTEM context. 2

MS10-098 Vulnerabilities in Windows Kernel- Mode Drivers Could Allow Elevation of Privilege (2436673) CVE- 2010-3940 Win32k PFE Pointer Double Free Vulnerability Description: An elevation of privilege vulnerability exists due to the way that the Windows kernel- mode drivers free objects that are no longer in use. CVE- 2010-3941 Win32k Double Free Vulnerability Description: An elevation of privilege vulnerability exists due to the way that the Windows kernel- mode drivers free objects that are no longer in use. CVE- 2010-3942 Win32k WriteAV Vulnerability Description: An elevation of privilege vulnerability exists in the way that Windows kernel- mode drivers improperly allocate memory when copying data from user mode. CVE- 2010-3943 Win32k Cursor Linking Vulnerability Description: An elevation of privilege vulnerability exists due to the way that Windows Kernel- mode drivers manage kernel- mode driver objects. CVE- 2010-3944 Win32k Memory Corruption Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows kernel- mode drivers improperly validate input passed from user mode. MS10-099 Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591) CVE- 2010-3963 Kernel NDProxy Buffer Overflow Vulnerability Description: An elevation of privilege vulnerability exists in the Routing and Remote Access NDProxy component of the Windows kernel due to improper validation of input passed from user mode to the kernel. MS10-100 Vulnerability in Consent User Interface Could Allow Elevation of Privilege (2442962) CVE- 2010-3961 Consent UI Impersonation Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Consent User Interface (UI) improperly processes special values read from the registry. 3

MS10-103 Vulnerabilities in Microsoft Office Publisher Could Allow Remote Code Execution (2292970) Microsoft Office XP Microsoft Office 2003 Microsoft Office 2007 Microsoft Office 2010 CVE- 2010-2569 Size Value Heap Corruption Vulnerability in pubconv.dll Description: A remote vulnerability in Publisher could cause heap corruption, resulting in arbitrary CVE- 2010-2570 Heap Overrun Vulnerability in pubconv.dll Description: A remote vulnerability in Publisher could cause a heap overflow, resulting in arbitrary CVE- 2010-2571 Memory Corruption Due To Invalid Index Into Array in Pubconv.dll Description: A remote vulnerability in Publisher could cause an integer overflow, resulting in arbitrary CVE- 2010-3954 Microsoft Publisher Memory Corruption Vulnerability Description: A remote vulnerability in Publisher could cause memory corruption, resulting in arbitrary CVE- 2010-3955 Array Indexing Memory Corruption Vulnerability Description: A remote vulnerability in Publisher could cause an integer overflow, resulting in arbitrary MS10-104 Vulnerability in Microsoft SharePoint Could Allow Remote Code Execution (2455005) Microsoft SharePoint Portal Server 2001 Microsoft SharePoint Portal Server 2003 Microsoft Windows SharePoint Services 2.0 Microsoft Windows SharePoint Services 3.0 SharePoint Foundation 2010 Microsoft SharePoint Server 2010 Microsoft Groove 2007 Microsoft SharePoint Workspace CVE- 2010-3964 Malformed Request Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that the Document Conversions Launcher Service validates SOAP requests before processing on a SharePoint server. 4

MS10-105 Vulnerabilities in Microsoft Office Graphics Filters Could Allow for Remote Code Execution (968095) Microsoft Office XP Microsoft Office 2003 Microsoft Office 2007 Microsoft Office 2010 Microsoft Office Converter Pack Microsoft Works 9 CVE- 2010-3945 Embedded OpenType Font Integer Overflow Vulnerability Description: A vulnerability in the.cgm image converter included in Office could cause a heap overflow, resulting in arbitrary CVE- 2010-3946 PICT Image Converter Integer Overflow Vulnerability Description: A bug in the PICT graphics converter in Microsoft Office could cause an integer overflow, resulting in arbitrary CVE- 2010-3947 TIFF Image Converter Heap Overflow Vulnerability Description: A vulnerability in the TIFFIM32.FLT filter that ships in Office XP could cause a heap overflow, resulting in arbitrary CVE- 2010-3949 TIFF Image Converter Buffer Overflow Vulnerability Description: A vulnerability exists in the TIFFIM32.FLT filter that ships in Office XP could cause a buffer overflow, resulting in arbitrary CVE- 2010-3950 TIFF Image Converter Memory Corruption Vulnerability Description: A vulnerability in the Microsoft Office Document Imaging tool could cause a memory corruption, resulting in arbitrary CVE- 2010-3951 FlashPix Image Converter Buffer Overflow Vulnerability Description: A vulnerability in the FlashPix Graphics Filter could cause a buffer overflow, resulting in arbitrary CVE- 2010-3952 FlashPix Image Converter Heap Corruption Vulnerability Description: A vulnerability in the FlashPix Graphics Filter could cause heap corruption, resulting in arbitrary About Zscaler Through a multi- tenant, globally- deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device, while empowering the end- user with a rich Internet experience. For more information, visit us at www.zscaler.com. Press Contacts Paula Dunne Office: +1-408- 776-1400, Mobile: +1-408- 893-8750 Paula.Dunne@zscaler.com Zscaler, and the Zscaler Logo are trademarks of Zscaler, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners. 5