Announcement

Collapse
No announcement yet.

Microsoft Security Advisory 3010060

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Microsoft Security Advisory 3010060


    General Information
    Executive Summary

    Microsoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The attack requires user interaction to succeed on Windows clients with a default configuration, as User Account Control (UAC) is enabled and a consent prompt is displayed.

    At this time, we are aware of limited, targeted attacks that attempt to exploit the vulnerability through Microsoft PowerPoint.

    See the Suggested Actions section of this advisory for more information.

    We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers. For information about protections released by MAPP partners, see MAPP Partners with Updated Protections.

    Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

    Mitigating Factors:

    In observed attacks, User Account Control (UAC) displays a consent prompt or an elevation prompt, depending on the privileges of the current user, before a file containing the exploit is executed. UAC is enabled by default on Windows Vista and newer releases of Microsoft Windows.
    An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
    In a web-based attack scenario, an attacker could host a website that contains a webpage that contains a specially crafted Office file that is used to attempt to exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website.
    Files from the Internet and from other potentially unsafe locations can contain viruses, worms, or other kinds of malware that can harm your computer. To help protect your computer, files from these potentially unsafe locations are opened in Protected View. By using Protected View, you can read a file and see its contents while reducing the risks. Protected View is enabled by default.

    Recommendation. Please see the Suggested Actions section of this advisory for more information.
    Advisory Details
    Issue References

    For more information about this issue, see the following references:

    References


    Identification

    Microsoft Knowledge Base Article


    3010060

    CVE Reference


    CVE-2014-6352
    Affected Software

    This advisory discusses the following software.

    Affected Software

    Operating System

    Windows Vista Service Pack 2

    Windows Vista x64 Edition Service Pack 2

    Windows Server 2008 for 32-bit Systems Service Pack 2

    Windows Server 2008 for x64-based Systems Service Pack 2

    Windows Server 2008 for Itanium-based Systems Service Pack 2

    Windows 7 for 32-bit Systems Service Pack 1

    Windows 7 for x64-based Systems Service Pack 1

    Windows Server 2008 R2 for x64-based Systems Service Pack 1

    Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

    Windows 8 for 32-bit Systems

    Windows 8 for x64-based Systems

    Windows 8.1 for 32-bit Systems

    Windows 8.1 for x64-based Systems

    Windows Server 2012

    Windows Server 2012 R2

    Windows RT

    Windows RT 8.1

    See more at the link

  • #2
    Re: Microsoft Security Advisory 3010060

    Thanks for the info,so never click on something you don't know where it's coming from CLICK ME
    MEGATHEMER​

    Comment


    • #3
      Re: Microsoft Security Advisory 3010060

      Thanks for the info Gary


      Sig & Avatar created by Master Cybacreep..

      Comment


      • #4
        Re: Microsoft Security Advisory 3010060

        thanks for the info


        Sig by Cybacreep

        Comment


        • #5
          Re: Microsoft Security Advisory 3010060

          I don't use MO, never liked it. But its good to know. Thanks for the share.
          sigpic

          Comment


          • #6
            Re: Microsoft Security Advisory 3010060

            Good to know thanks for the share Gary

            Comment


            • #7
              Re: Microsoft Security Advisory 3010060

              Very informative, thank you and ehhh... click me

              Comment


              • #8
                Re: Microsoft Security Advisory 3010060

                Thanks for another info brother Gary.

                Comment

                Working...
                X