Don's Pages and my Music

Monday, January 25, 2010

Microsoft Security Bulletin MS10-002 - Critical: Cumulative Security Update for Internet Explorer (978207)

Microsoft Security Bulletin MS10-002 - Critical

Cumulative Security Update for Internet Explorer (978207)

Published: January 21, 2010

Version: 1.0

General Information

Executive Summary

This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This security update is rated Critical for all supported releases of Internet Explorer: Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and Internet Explorer 8 (except Internet Explorer 6 for supported editions of Windows Server 2003). For Internet Explorer 6 for supported editions of Windows Server 2003 as listed, this update is rated Moderate. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, validates input parameters, and filters HTML attributes. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.

This security update also addresses the vulnerability first described in Microsoft Security Advisory 979352.

Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.

For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.

See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.

Known Issues. None

Affected and Non-Affected Software

The software listed here have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.

Affected Software

Operating System Component Maximum Security Impact Aggregate Severity Rating Bulletins Replaced by This Update
Internet Explorer 5.01 and Internet Explorer 6 Service Pack 1        

Microsoft Windows 2000 Service Pack 4

Internet Explorer 5.01 Service Pack 4

Remote Code Execution

Critical

MS09-072

Microsoft Windows 2000 Service Pack 4

Internet Explorer 6 Service Pack 1

Remote Code Execution

Critical

MS09-072

Internet Explorer 6        

Windows XP Service Pack 2 and Windows XP Service Pack 3

Internet Explorer 6

Remote Code Execution

Critical

MS09-072

Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 6

Remote Code Execution

Critical

MS09-072

Windows Server 2003 Service Pack 2

Internet Explorer 6

Remote Code Execution

Moderate

MS09-072

Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 6

Remote Code Execution

Moderate

MS09-072

Windows Server 2003 with SP2 for Itanium-based Systems

Internet Explorer 6

Remote Code Execution

Moderate

MS09-072

Internet Explorer 7        

Windows XP Service Pack 2 and Windows XP Service Pack 3

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2003 Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2003 with SP2 for Itanium-based Systems

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Internet Explorer 8        

Windows XP Service Pack 2 and Windows XP Service Pack 3

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2003 Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows 7 for 32-bit Systems

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows 7 for x64-based Systems

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 R2 for x64-based Systems**

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 R2 for Itanium-based Systems

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the MSDN articles, Server Core and Server Core for Windows Server 2008 R2. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.

Frequently Asked Questions (FAQ) Related to This Security Update

Vulnerability Information

Severity Ratings and Vulnerability Identifiers

XSS Filter Script Handling Vulnerability - CVE-2009-4074

URL Validation Vulnerability - CVE-2010-0027

Uninitialized Memory Corruption Vulnerability - CVE-2010-0244

Uninitialized Memory Corruption Vulnerability - CVE-2010-0245

Uninitialized Memory Corruption Vulnerability - CVE-2010-0246

Uninitialized Memory Corruption Vulnerability - CVE-2010-0247

HTML Object Memory Corruption Vulnerability - CVE-2010-0248

HTML Object Memory Corruption Vulnerability - CVE-2010-0249

Update Information

Detection and Deployment Tools and Guidance

Security Update Deployment


Go there...
http://www.microsoft.com/technet/security/bulletin/ms10-002.mspx

No comments:

Post a Comment