Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 February 2010 Security Bulletin Release
Pages: [1]   Go Down
  Print  
Author Topic: February 2010 Security Bulletin Release  (Read 549 times)
Tanya
TWI Addict
********



Karma: 1
Offline Offline

Posts: 4190


View Profile
February 2010 Security Bulletin Release
« Posted: February 10, 2010, 01:36:55 PM »


February 2010 Security Bulletin Release

   Today Microsoft released 13 bulletins addressing 26 vulnerabilities. 11 bulletins affect Windows and 2 affect older versions of Microsoft Office.                          ID                                                    Bulletin Title and Executive Summary                                                    Maximum Severity Rating and Vulnerability Impact                                                    Restart Requirement                                                    Affected Software                                                              MS10-006                                                     Vulnerabilities in SMB Client Could Allow Remote Code Execution (978251)                           This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a malicious SMB server.                                                 Critical              Remote Code Execution                                                 Requires restart                                                Microsoft Windows                                                          MS10-007                                                     Vulnerability in Windows Shell Handler Could Allow Remote Code Execution (975713)                           This security update resolves a privately reported vulnerability in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not impacted by this security update. The vulnerability could allow remote code execution if an application, such as a Web browser, passes specially crafted data to the ShellExecute API function through the Windows Shell Handler.                                                 Critical              Remote Code Execution                                                 Requires restart                                                Microsoft Windows                                                          MS10-008                                                     Cumulative Security Update of ActiveX Kill Bits (978262)                           This security update addresses a privately reported vulnerability for Microsoft software. This security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2.                            The vulnerability could allow remote code execution if a user views a specially crafted Web page that instantiates an ActiveX control with Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This update also includes kill bits for four third-party ActiveX controls.                                                 Critical              Remote Code Execution                                                 May require restart                                                Microsoft Windows                                                          MS10-009                                                     Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (974145)                           This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if specially crafted packets are sent to a computer with IPv6 enabled. An attacker could try to exploit the vulnerability by creating specially crafted ICMPv6 packets and sending the packets to a system with IPv6 enabled. This vulnerability may only be exploited if the attacker is on-link.                                                 Critical              Remote Code Execution                                                 Requires restart                                                Microsoft Windows                                                          MS10-013                                                     Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (977935)                           This security update resolves a privately reported vulnerability in Microsoft DirectShow. The vulnerability could allow remote code execution if a user opened a specially crafted AVI file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.                                                 Critical              Remote Code Execution                                                 Requires restart                                                Microsoft Windows                                                          MS10-003                                                     Vulnerability in Microsoft Office (MSO) Could Allow Remote Code Execution (978214)                           This security update resolves a privately reported vulnerability in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.                                                 Important              Remote Code Execution                                                 May require restart                                                Microsoft Office                                                          MS10-004                                                     Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution (975416)                           This security update resolves six privately reported vulnerabilities in Microsoft Office PowerPoint. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.                                                 Important              Remote Code Execution                                                 May require restart                                                Microsoft Office                                                          MS10-010                                                     Vulnerability in Windows Server 2008 Hyper-V Could Allow Denial of Service (977894)                           This security update resolves a privately reported vulnerability in Windows Server 2008 Hyper-V and Windows Server 2008 R2 Hyper-V. The vulnerability could allow denial of service if a malformed sequence of machine instructions is run by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to log on locally into a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.                                                 Important              Denial of Service                                                 Requires restart                                                Microsoft Windows                                                          MS10-011                                                     Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (978037)                           This security update resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000, Windows XP, and Windows Server 2003. Other versions of Windows are not affected. The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users.                                                Important              Elevation of Privilege                                                 Requires restart                                                Microsoft Windows                                                          MS10-012                                                     Vulnerabilities in SMB Server Could Allow Remote Code Execution (971468)                           This security update resolves several privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and standard default firewall configurations can help protect networks from attacks originating outside the enterprise perimeter that would attempt to exploit these vulnerabilities.                                                 Important              Remote Code Execution                                                 Requires restart                                                Microsoft Windows                                                          MS10-014                                                     Vulnerability in Kerberos Could Allow Denial of Service (977290)                           This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a specially crafted ticket renewal request is sent to the Windows Kerberos domain from an authenticated user on a trusted non-Windows Kerberos realm. The denial of service could persist until the domain controller is restarted.                                                 Important              Denial of Service                                                 Requires restart                                                Microsoft Windows                                                          MS10-015                                                     Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (977165)                           This security update resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users.                                                 Important              Elevation of Privilege                                                 Requires restart                                                Microsoft Windows                                                          MS10-005                                                     Vulnerability in Microsoft Paint Could Allow Remote Code Execution (978706)                           This security update resolves a privately reported vulnerability in Microsoft Paint. The vulnerability could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.                                                 Moderate              Remote Code Execution                                                 Requires restart                                                Microsoft Windows                                      
 Send via e-mail |  Submit to Digg |  Add to Live Favorites



http://feeds.bink.nu/~r/binkdotnu/~3/hk53PFIRa0c/february-2010-security-bulletin-release.aspx

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.234 seconds with 24 queries.