[Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems'

Notification of New Vulnerabilties to Windows Systems Fixlet Messages winvulns-announcements at bigmail.bigfix.com
Thu Apr 25 05:20:13 PDT 2013


Fixlet Site - 'Vulnerabilities to Windows Systems'
Current Version: 338	Published: Wed, 24 Apr 2013 23:18:32  GMT

New Fixlets:
============

***************************************************************
Title: Vulnerability in SharePoint could allow information disclosure - MS13-030
Severity: Low
Fixlet ID: 1575801
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval15758.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1290
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft SharePoint Server 2013, in certain configurations involving legacy My Sites, does not properly establish default access controls for a SharePoint list, which allows remote authenticated users to bypass intended restrictions on reading list items via a direct request for a list's location, aka "Incorrect Access Rights Information Disclosure Vulnerability."

***************************************************************
Title: Kernel Race Condition Vulnerability - CVE-2013-1294 (MS13-031)
Severity: Medium
Fixlet ID: 1625701
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16257.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1294
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."

***************************************************************
Title: CSRSS Memory Corruption Vulnerability - MS13-033
Severity: High
Fixlet ID: 1626001
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16260.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1295
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "CSRSS Memory Corruption Vulnerability."

***************************************************************
Title: Elevation of privilege vulnerability in Windows Defender - MS13-034
Severity: High
Fixlet ID: 1629301
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16293.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0078
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Microsoft Antimalware Client in Windows Defender on Windows 8 and Windows RT uses an incorrect pathname for MsMpEng.exe, which allows local users to gain privileges via a crafted application, aka "Microsoft Antimalware Improper Pathname Vulnerability."

***************************************************************
Title: Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031)
Severity: Medium
Fixlet ID: 1645501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16455.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1284
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Race condition in the kernel in Microsoft Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Kernel Race Condition Vulnerability."

***************************************************************
Title: Active Directory Buffer Overflow Vulnerability - MS13-032
Severity: Medium
Fixlet ID: 1646301
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16463.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1282
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The LDAP service in Microsoft Active Directory, Active Directory Application Mode (ADAM), Active Directory Lightweight Directory Service (AD LDS), and Active Directory Services allows remote attackers to cause a denial of service (memory consumption and service outage) via a crafted query, aka "Memory Consumption Vulnerability."

***************************************************************
Title: Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2013-1293) - MS13-036
Severity: Medium
Fixlet ID: 1648501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16485.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1293
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The NTFS kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application that leverages improper handling of objects in memory, aka "NTFS NULL Pointer Dereference Vulnerability."

***************************************************************
Title: Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2013-1291) - MS13-036
Severity: High
Fixlet ID: 1650401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16504.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1291
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, Windows 7 Gold and SP1, and Windows 8 allows local users to cause a denial of service (reboot) via a crafted OpenType font, aka "OpenType Font Parsing Vulnerability" or "Win32k Font Parsing Vulnerability."

***************************************************************
Title: Internet Explorer Use After Free Vulnerability - CVE-2013-1304 (MS13-028)
Severity: High
Fixlet ID: 1651501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16515.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1304
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303.

***************************************************************
Title: Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2013-1283) - MS13-036
Severity: Medium
Fixlet ID: 1656301
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16563.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1283
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."

***************************************************************
Title: Microsoft Windows Kernel-Mode Driver privilege elevation vulnerability (CVE-2013-1292) - MS13-036
Severity: Medium
Fixlet ID: 1657501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16575.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1292
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Race Condition Vulnerability."

***************************************************************
Title: Microsoft Windows Remote Desktop Client remote code execution vulnerability - MS13-029
Severity: High
Fixlet ID: 1659801
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16598.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1296
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via a web page that triggers access to a deleted object, and allows remote RDP servers to execute arbitrary code via unspecified vectors that trigger access to a deleted object, aka "RDP ActiveX Control Remote Code Execution Vulnerability."

***************************************************************
Title: Vulnerability in HTML sanitization component could allow elevation of privilege - MS13-035
Severity: Medium
Fixlet ID: 1659901
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16599.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1289
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability."

***************************************************************
Title: Internet Explorer Use After Free Vulnerability - CVE-2013-1303 (MS13-028)
Severity: High
Fixlet ID: 1666201
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval16662.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1303
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304.



More information about the WinVulns-Announcements mailing list