Please help to click 1!

Wednesday, 23 January 2013

Security update KB2756920 for Windows 7 and Windows Server 2008 R2



* MS13-004 - Important

 - Reason for Revision: V2.0 (January 22, 2013): Bulletin
   rereleased to reoffer security update KB2756920 for Windows 7
   and Windows Server 2008 R2 to systems that are running in
   specific configurations known to have potential compatibility
   issues. Customers who are reoffered the update should
   reinstall this update. See the update FAQ for more
   information.
 - Originally posted: January 8, 2013
 - Updated: January 22, 2013
 - Bulletin Severity Rating: Important
 - Version: 2.0

Friday, 11 January 2013

Oracle Java 7 Security Manager Bypass Vulnerability



Original release date: January 10, 2013
Last revised: --

Systems Affected

     Any system using Oracle Java 7 (1.7, 1.7.0) including

     * Java Platform Standard Edition 7 (Java SE 7)
     * Java SE Development Kit (JDK 7)
     * Java SE Runtime Environment (JRE 7)

     All versions of Java 7 through update 10 are affected.  Web
     browsers using the Java 7 plug-in are at high risk.


Overview

   A vulnerability in the way Java 7 restricts the permissions of Java
   applets could allow an attacker to execute arbitrary commands on a
   vulnerable system.


Description

   A vulnerability in the Java Security Manager allows a Java applet
   to grant itself permission to execute arbitrary code. An attacker
   could use social engineering techniques to entice a user to visit a
   link to a website hosting a malicious Java applet. An attacker
   could also compromise a legitimate web site and upload a malicious
   Java applet (a "drive-by download" attack).

   Any web browser using the Java 7 plug-in is affected. The Java
   Deployment Toolkit plug-in and Java Web Start can also be used as
   attack vectors.

   Reports indicate this vulnerability is being actively exploited,
   and exploit code is publicly available.

   Further technical details are available in Vulnerability Note
   VU#625617.


Impact

   By convincing a user to load a malicious Java applet or Java
   Network Launching Protocol (JNLP) file, an attacker could execute
   arbitrary code on a vulnerable system with the privileges of the
   Java plug-in process.


Solution

   Disable Java in web browsers

   This and previous Java vulnerabilities have been widely targeted by
   attackers, and new Java vulnerabilities are likely to be
   discovered. To defend against this and future Java vulnerabilities,
   disable Java in web browsers.

   Starting with Java 7 Update 10, it is possible to disable Java
   content in web browsers through the Java control panel applet. From
   Setting the Security Level of the Java Client:

   For installations where the highest level of security is required,
   it is possible to entirely prevent any Java apps (signed or
   unsigned) from running in a browser by de-selecting Enable Java
   content in the browser in the Java Control Panel under the Security
   tab.

   If you are unable to update to Java 7 Update 10 please see the
   solution section of Vulnerability Note VU#636312 for instructions
   on how to disable Java on a per browser basis.

Thursday, 10 January 2013

Red Hat Enterprise Linux 5.9 introduced

Customers with a Red Hat Enterprise Linux (RHEL) support contract are now able to download version 5.9 of the company's Linux distribution. The new release updates RHEL 5 to include Microsoft's Hyper V driver, OpenJDK 7 and Samba 3.6. This minor version update of RHEL 5 also marks the completion of the first support phase of the revised Red Hat support life cycle; it has taken five years to get to this point – RHEL 5 was introduced in 2007.

The integrated Hyper V driver is designed to make the Linux distribution work better under Microsoft's hypervisor – for example in clouds with Windows hosts. The drivers that have been developed by Microsoft have been part of the official Linux kernel for some time, but didn't meet the kernel developers' quality requirements up until a few months ago; this was probably the reason why Red Hat previously disregarded these drivers. The developers have also updated the more recent of the two included Samba variants to version 3.6; this version is part of the Samba3x packages and supports the second generation Server Message Block network protocol (SMB2), which is said to produce less overhead during data exchanges and works faster as a result. Red Hat has also updated the SystemTap system diagnostics software to version 1.8, introducing various minor improvements. Further new additions are OpenJDK 7 and version 5 of the rsyslog system logging service. However, both are optional, which means that systems will continue to use OpenJDK 6 and the older version of rsyslog unless users manually switch to the newer versions.
As usual, Red Hat has improved the distribution's support for new processors and has updated a whole range of drivers – including the bfa driver, which supports the Brocade Fibre Channel host adapter and is no longer classified as a technology preview. A new RHEL 5 component is the ib_qib driver that is intended for Qlogic InfiniBand host channel adapters and supersedes the ib_ipath driver, though that driver continues to be usable. Further details of the new features can be found in the product announcement and in the RHEL 5.9 release and technical notes.
                                                                         The RHEL life cycle Zoom
                                                                            Source: Red Hat


The completion of the first support phase has marked the beginning of the Production 2 Phase in the life cycle of RHEL 5. In this phase, Red Hat will no longer integrate any major new features such as those introduced in RHEL 5.9. Even driver updates and other new hardware support improvements will only be made if they don't require much effort. Red Hat will, however, continue to issue minor releases and make new installation images available that include all changes made up to that point. This second maintenance phase will end in the first quarter of 2014. After that time, Red Hat will reduce the distribution's maintenance even further in the Production 3 Phase, which will still provide security patches and bug fixes, but no further minor releases or updated drivers.

                                                            Support phases of RHEL 5 and 6 Zoom
                                                                       Source: Red Hat


The third maintenance phase of RHEL 5 will end in the first quarter of 2017, but customers will be able to purchase three further years of support and extend the overall maintenance period of RHEL 5 to a total of thirteen years. If Red Hat keeps to its current release rhythm, RHEL 9 should already be available when this phase is complete. A first beta of RHEL 7 has been scheduled for the first half of 2013, and version 6.4 is already in beta testing. The fourth minor release of RHEL 6 should become available in a few weeks; in addition, Oracle Linux, CentOS, Scientific Linux and others will probably release their usual free-of-charge RHEL 5.9 clones over the coming weeks.

Friday, 4 January 2013

Microsoft Releases Security Advisory on Fraudulent Digital Certificates



Microsoft has released Security Advisory 2798897 in response to active attacks using fraudulent digital certificates issued by TURKTRUST Inc.
These fraudulent certificates could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This vulnerability affects all supported releases of Microsoft Windows.

This update revokes the trust of the fraudulent certificates and places them in the Microsoft Untrusted Certificate Store.

US-CERT encourages users and administrators to review Microsoft Security Advisory 2798897 and follow best-practice security policies to determine if the update should be applied.

Wednesday, 12 December 2012

Microsoft Security Bulletin MS12-043 - Critical

Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479)

General Information

Executive Summary

This security update resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website.
This security update is rated Critical for Microsoft XML Core Services 3.0, Microsoft XML Core Services 4.0, and Microsoft XML Core Services 6.0 on all supported editions of Windows XP, Windows Vista, and Windows 7; Critical for Microsoft XML Core Services 4.0 when installed on all supported editions of Windows 8; Critical for Microsoft XML Core Services 5.0 when installed with all supported editions of Microsoft Office 2003, Microsoft Office 2007, Microsoft Office Word Viewer, Microsoft Office Compatibility Pack, Microsoft Expression Web, Microsoft Office SharePoint Server 2007, Microsoft Groove 2007, and Microsoft Groove Server 2007; Moderate for Microsoft XML Core Services 3.0, 4.0, and 6.0 on all supported editions of Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2; and Moderate for Microsoft XML Core Services 4.0 when installed on all supported editions of Windows Server 2012. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerability by modifying the way that MSXML initializes objects in memory before use. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
This security update also addresses the vulnerability first described in Microsoft Security Advisory 2719615.
Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.
For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.
See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.
Known Issues. Microsoft Knowledge Base Article 2722479 documents the currently known issues that customers may experience when installing this security update. The article also documents recommended solutions for these issues. When currently known issues and recommended solutions pertain only to specific releases of this software, this article provides links to further articles.

Affected and Non-Affected Software

The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.
Affected Software
Windows Operating Systems and Components
Operating SystemComponentMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Windows XP
Windows XP Service Pack 3Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

KB954459 in MS08-069 replaced by KB2719985
Windows XP Professional x64 Edition Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2721693)
Remote Code ExecutionCriticalKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

KB954459 in MS08-069 replaced by KB2721693
Windows Server 2003
Windows Server 2003 Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2721693)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

KB954459 in MS08-069 replaced by KB2721693
Windows Server 2003 x64 Edition Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2721693)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

KB954459 in MS08-069 replaced by KB2721693
Windows Server 2003 with SP2 for Itanium-based SystemsMicrosoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2721693)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

KB954459 in MS08-069 replaced by KB2721693
Windows Vista
Windows Vista Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Vista x64 Edition Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008
Windows Server 2008 for 32-bit Systems Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008 for x64-based Systems Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008 for Itanium-based Systems Service Pack 2Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows 7
Windows 7 for 32-bit SystemsMicrosoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows 7 for 32-bit Systems Service Pack 1Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalNo updates replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows 7 for x64-based SystemsMicrosoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows 7 for x64-based Systems Service Pack 1Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionCriticalNo updates replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008 R2
Windows Server 2008 R2 for x64-based SystemsMicrosoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008 R2 for x64-based Systems Service Pack 1Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateNo updates replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008 R2 for Itanium-based SystemsMicrosoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateKB2079403 in MS10-051 replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Microsoft XML Core Services 3.0
(KB2719985)

Microsoft XML Core Services 4.0
(KB2721691)

Microsoft XML Core Services 6.0
(KB2719985)
Remote Code ExecutionModerateNo updates replaced by KB2719985

KB954430 in MS08-069 replaced by KB2721691

No updates replaced by KB2719985
Windows 8
Windows 8 for 32-bit SystemsMicrosoft XML Core Services 4.0
(KB2721691)
Remote Code ExecutionCriticalNone
Windows 8 for 64-bit SystemsMicrosoft XML Core Services 4.0
(KB2721691)
Remote Code ExecutionCriticalNone
Windows Server 2012
Windows Server 2012Microsoft XML Core Services 4.0
(KB2721691)
Remote Code ExecutionModerateNone

Microsoft Office Suites and Software
Office SoftwareComponentMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Microsoft Office Suites and Components
Microsoft Office 2003 Service Pack 3Microsoft XML Core Services 5.0[1]
(KB2687627)
Remote Code ExecutionCriticalKB951535 in MS08-069 replaced by KB2687324 or KB2687627
Microsoft Office 2007 Service Pack 2Microsoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalNone
Microsoft Office 2007 Service Pack 3Microsoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalNone
Other Microsoft Office Software
Microsoft Office Word ViewerMicrosoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalNone
Microsoft Office Compatibility Pack Service Pack 2Microsoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalNone
Microsoft Office Compatibility Pack Service Pack 3Microsoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalNone
Microsoft Groove 2007 Service Pack 2Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
Microsoft Groove 2007 Service Pack 3Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
[1]Although the rereleased update (KB2687627) replaces the original update (KB2687324) for Microsoft Office 2003 Service Pack 3, customers who have successfully installed the KB2687324 update do not need to install the KB2687627 update. For more information, see the update FAQ.
[2]Although the rereleased update (KB2687497) replaces the original update (KB2596679) for Microsoft Groove 2007 Service Pack 2 and Microsoft Groove 2007 Service Pack 3, customers who have successfully installed the KB2596679 update do not need to install the KB2687497 update. For more information, see the update FAQ.

Microsoft Developer Tools and Software
SoftwareComponentMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Microsoft Expression Web Service Pack 1Microsoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalNone
Microsoft Expression Web 2Microsoft XML Core Services 5.0
(KB2596856)
Remote Code ExecutionCriticalKB951550 in MS08-069 replaced by KB2596856

Microsoft Server Software
SoftwareComponentMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Microsoft Office SharePoint Server 2007 Service Pack 2 (32-bit editions)Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
Microsoft Office SharePoint Server 2007 Service Pack 2 (64-bit editions)Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
Microsoft Office SharePoint Server 2007 Service Pack 3 (32-bit editions)Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
Microsoft Office SharePoint Server 2007 Service Pack 3 (64-bit editions)Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
Microsoft Groove Server 2007 Service Pack 2Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
Microsoft Groove Server 2007 Service Pack 3Microsoft XML Core Services 5.0[2]
(KB2687497)
Remote Code ExecutionCriticalNone
[2]Although the rereleased update (KB2687497) replaces the original update (KB2596679) for affected editions of Microsoft Office SharePoint Server 2007 and Microsoft Groove Server 2007, customers who have successfully installed the KB2596679 update do not need to install the KB2687497 update. For more information, see the update FAQ.