CDHaha Download


Posts Tagged ‘Component’

[4,621]

MS13-106 Vulnerability in a Microsoft Office Shared Component Could Allow Security Feature Bypass (2905238)

2013-12-13 |

OfficeThis security update resolves one publicly disclosed vulnerability in a Microsoft Office shared component that is currently being exploited. The vulnerability could allow security feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability that could take advantage of the ASLR bypass to run arbitrary code.

This security update is rated Important for supported editions of Microsoft Office 2007 and Microsoft Office 2010 software. The security update addresses the vulnerability by helping to ensure that the Microsoft Office shared component properly implements ASLR.
More

[3,235]

MS13-035 Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege

2013-04-13 |

HTML Component此安全更新解决了 Microsoft Office 中一个秘密报告的漏洞。如果攻击者将特制内容发送给用户,则该漏洞可能允许特权提升。

对于 Microsoft SharePoint Server 2010、Microsoft Groove Server 2010、Microsoft SharePoint Foundation 2010 和 Microsoft Office Web Apps 2010 的受支持版本,此安全更新的等级为“重要”。

此安全更新通过修改清理 HTML 字符串的方式来解决漏洞。
More

[3,797]

MS12-083 Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)

2012-12-13 |

IIS此安全更新可解决 Microsoft Windows 中一个秘密报告的漏洞。如果攻击者向 Microsoft DirectAccess 部署中的常用 IP-HTTPS 服务器呈现被吊销的证书,则该漏洞可能允许安全功能绕过。要利用此漏洞,攻击者必须使用从针对 IP-HTTPS 服务器身份验证的域颁发的证书。登录到组织内部的系统仍然需要系统或域凭据。

对于 Windows Server 2008 和 Windows Server 2012 的所有受支持版本,此安全更新等级为“重要”。该安全更新通过修改 Microsoft Windows 检查证书有效性的方式来解决漏洞。
More

[3,632]

MS12-081 Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857)

2012-12-13 |

File此安全更新可解决 Microsoft Windows 中一个秘密报告的漏洞。如果用户浏览到包含特制名称的文件或子文件夹的文件夹,则该漏洞可能允许远程执行代码。成功利用此漏洞的攻击者可以获得与当前用户相同的用户权限。那些帐户被配置为拥有较少系统用户权限的用户比具有管理用户权限的用户受到的影响要小。

对于 Windows XP、Windows Server 2003、Windows Vista、Windows Server 2008、Windows 7 和 Windows Server 2008 R2 的所有受支持版本,此安全更新的等级为“严重”。Windows 8、Windows Server 2012 和 Window RT 不受此漏洞的影响。该安全更新通过修改 Windows 处理包含特制名称的文件的方式来解决漏洞。
More

[3,294]

MS12-066 Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)

2012-10-11 |

HTML Component此安全更新可解决 Microsoft Office、Microsoft Communications Platforms、Microsoft Server 软件和 Microsoft Office Web Apps 中一个公开披露的漏洞。如果攻击者将特制内容发送给用户,则该漏洞可能允许特权提升。

对于 Microsoft InfoPath 2007、Microsoft InfoPath 2010、Microsoft Communicator 2007 R2、Microsoft Lync 2010、Microsoft Lync 2010 Attendee、Microsoft SharePoint Server 2007、Microsoft SharePoint Server 2010、Microsoft Groove Server 2010、Microsoft SharePoint Windows Services 3.0、Microsoft SharePoint Foundation 2010 和 Microsoft Office Web Apps 2010 的受支持版本,此安全更新的等级为“重要”。此安全更新通过修改清理 HTML 字符串的方式来解决漏洞。
More