원본기사보기: Assessing risk for the June 2014 security updates
Today we released seven security bulletins addressing 66 unique CVE’s. Two bulletins have a maximum severity rating of Critical while the other five have a maximum severity rating of Important. This table is designed to help you prioritize the deployment of updates appropriately for your environment.
Bulletin
Most likely attack vector
Max Bulletin Severity
Max XI
Likely first 30 days impact
Platform mitigations and key notes
MS14-035
(Internet Explorer)Victim browses to a malicious webpage.
Critical
1
Likely to see reliable exploits developed within next 30 days.
CVE count (59) is result of focusing on in-the-wild exploits last month. These are the May + June fixes for issues not under active attack.
MS14-034
(Word 2007)Victim opens malicious Office document.
Important
1
Likely to see reliable exploits developed within next 30 days.
Issue addressed in embedded font parsing. Reachable via either doc or docx. Word 2010 and later not affected.
MS14-036
(GDI+)Victim open malicious graphics file or malicious PowerPoint document
Critical
1
Likely to see reliable exploits developed within next 30 days.
Issue addressed is in EMF+ record type parsing, an area we have not seen real-world attackers pursue recently. (Hence, table lists Word security update ahead of GDI+ update.)
MS14-033
(MSXML)Victim browses to a malicious webpage or opens a malicious document, inadvertently sending local path name of downloaded file to attacker. Path name by default includes the user’s login name.
Important
3
Less likely to see widespread usage of information disclosure vulnerabilities.
Information disclosure only.
MS14-030
(Terminal Services)Attacker acting as man-in-the-middle at the start of a Remote Desktop session may be able to read information from or tamper with RDP session.
Important
n/a
Less likely to see widespread usage of vulnerabilities enabling tampering.
Terminal Services NLA feature mitigates this vulnerability.
MS14-031
(TCP)Attacker initiates large number of connections with malformed TCP options. Each connection temporarily consumes non-paged pool memory longer than it should, leading to resource exhaustion.
Important
3
Less likely to see widespread usage of vulnerability allowing resource exhaustion denial-of-service only.
Attacker must control TCP Options fields. Attacker would be unable to cause denial-of-service for systems behind network infrastructure that overwrites the TCP Options field.
MS14-032
(Lync Server XSS)Victim clicks on a specially-crafted malicious link to an established Lync meeting. Attacker can take action in context of Lync Server service that victim would normally have access to take.
Important
3
Less likely to see widespread usage of this vulnerability.
XSS style vulnerability.
'IT 와 Social 이야기 > Security' 카테고리의 다른 글
[Imperva] Top Security Trends for 2014 (0) | 2014.06.12 |
---|---|
[IBM Security Systems] Pinpointing Vulnerabilities in Android Applications like Finding a Needle in a Haystack (0) | 2014.06.12 |
[Lookout] Mobile Security at the World Cup (0) | 2014.06.11 |
[US-CERT: Bulletin(SB14-160)] 2014년 6월 2일까지 발표된 보안 취약점 (0) | 2014.06.10 |
[Qamar Farooq] Online security & encryption (0) | 2014.06.09 |