Microsoft’s first Patch Tuesday of 2013 fixes two critical vulnerabilities and five important vulnerabilities.
The first critical vulnerability, MS13-001, is a flaw in the Windows 7/Windows Server 2008 R2 print spooler service that if exploited could lead to remote code execution.
MS13-002 is the other critical flaw and affects Microsoft XML Core Services. This vulnerability also could lead to remote code execution if someone using Internet Explorer is enticed to surf to a malicious web page. This affects all currently released versions of Windows, including RT.
The five important patches include:
- MS13-003 – Elevation of privilege in Microsoft System Center Operations Manager 2007/R2
- MS13-004 – Elevation of privilege in Microsoft .NET Framework 3.5/3.5.1/4/4.5 on all MS OSs
- MS13-005 – Elevation of privilege in Microsoft Windows Vista/Server 2008/7/Server 2008 R2/8/Server 2012/RT
- MS13-006 – Security feature bypass in Microsoft Windows Vista/Server 2008/7/Server 2008 R2/8/Server 2012/RT
- MS13-007 – Denial of Service in Microsoft .NET Framework on Windows XP/Server 2003/Vista/Server 2008/7/Server 2008 R2/8/Server 2012
Microsoft also released an updated Flash Player for Internet Explorer 10 on Windows 8/Server 2012/RT to address CVE-2013-0630.
Microsoft also updated Security Advisory 973811 to include a new Microsoft FixIt that enables NTLMv2 settings for Windows XP/Server 2003 systems that allow these systems to use Extended Protection for Authentication. This appears to be in reaction to the recent NTLM hash cracking news that Duck wrote about last month.
Adobe also released an updated Flash Player for all platforms to address the aforementioned critical CVE. As always you can download the latest Flash Player at http://get.adobe.com/flashplayer.
Last, but not least, Adobe released updated versions of Adobe Acrobat and Adobe Reader 9/X/XI. This release fixes 26 vulnerabilities with the latest version numbers being 9.5.3, 10.1.5 and 11.0.1.
Adobe Reader updates can be downloaded directly at http://get.adobe.com/reader.
OK, enough time reading blogs for today, get patching!
The revoked certificate update has still NOT arrived to Win7 🙁
This is the first time I can recall when installing an MS Patch that I had to either "accept" or decline" the installation. In the past when I would click on install it would automatically install. I wonder if this is a new feature of Microsoft's
or, instead of Duck's work, which is great, the NTLM advisory could be due to the person acknowledged in the Advisory.
"Mark Gamache of T-Mobile USA for working with us to help protect customers from attacks against NTLMv1 (NT LAN Manager version 1) and LAN Manager (LM) network authentication."
They even gave a link… http://markgamache.blogspot.com/