|20 Jan 2010||#1|
| || |
Advance Notification for Out-of-Band Bulletin Release
Today we issued our Advanced Notification Service (ANS) to advise customers that we will be releasing MS10-002 tomorrow, January 21st, 2010. We are planning to release the update as close to 10:00 a.m. PST (UTC -8) as possible.  This is a standard cumulative update, accelerated from our regularly scheduled February release, for Internet Explorer with an aggregate severity rating of Critical. It addresses the vulnerability related to recent attacks against Google and small subset of corporations, as well as several other vulnerabilities. Once applied, customers are protected against the known attacks that have been widely publicized. We recommend that customers install the update as soon as it is available.  For customers using automatic updates, this update will automatically be applied once it is released.
Today we also updated Security Advisory 979352 to include technical details addressing additional customer questions.
The updated Security Advisory includes guidance in relation to reports of proof of concept (POC) code that bypasses Data Execution Prevention (DEP) and additional information on the exploitability of, and mitigations and workarounds for, Microsoft products that use mshtml.dll.
Based on our comprehensive monitoring of the threat landscape, we continue to see only limited attacks. To date, the only successful attacks that we are aware of have been against Internet Explorer 6.
We continue to recommend that customers update to Internet Explorer 8 to benefit from the improved security protection it offers.
Additional Technical Details Related to Security Advisory 979352
Data Execution Prevention (DEP) Bypass
There is a report of a new exploit that bypasses Data Execution Prevention (DEP). We have analyzed the Proof-of-Concept (POC) exploit code and have found that Windows Vista and later versions of Windows offer more effective protections in blocking the exploit due to the improved security protection offered by Address Space Layout Randomization (ASLR).
On Windows XP, which does not benefit from the improved security protection provided by ASLR, attacks using the DEP bypass techniques are likely to be more effective.
The DEP bypass exploit is not, at this time, publicly available and we have not seen it used in attacks.
Additional details on the DEP bypass exploit are provided in a Security Research and Defense Blog published today.
Microsoft E-Mail Products That Render using mshtml.dll Protected by Default
There have been reports that supported versions of Outlook, Outlook Express and Windows Live Mail are affected by the vulnerability in Security Advisory 979352.
For customers using the default configuration of all supported versions of Outlook, Outlook Express and Windows Live Mail the risk of exploit using Outlook as an attack vector is low. We are unaware of active exploit against supported versions of Outlook, Outlook Express or Windows Live.
By default, Outlook, Outlook Express and Windows Live Mail open HTML e-mail messages in the Restricted sites zone, which helps mitigate attacks seeking to exploit this vulnerability by preventing Active Scripting and ActiveX controls from being used. Additionally, Outlook 2007 uses a different component to render HTML e-mail, removing the risk of the exploit.
If customers have modified their default configuration to not run in Restricted sites zone, their environments will be in a less secure, more vulnerable, state.
Other products may also use the HTML rendering engine for Internet Explorer and could expose this vulnerability.  Any successful attack would require bypassing the default security mechanisms used by each individual application. Therefore customers who use these default application configurations may have reduced risk from being exploited through additional vectors.
Office Applications with Active Scripting Enabled Potentially Vulnerable
We are also aware that the vulnerability can be exploited by including an ActiveX control in a Microsoft Access, Word, Excel, or PowerPoint file. Customers would have to open a malicious file to be at risk of exploitation.
To prevent exploitation, we recommend that customers disable ActiveX Controls in Microsoft Office.
Detailed information on how to disable ActiveX Controls is included in the Security Advisory.
To be clear, applying the update for Internet Explorer addresses the issue across all products that may use mshtml.dll. Customers should install the update to be protected.
We continue to monitor the situation and will keep customers apprised of any changes to the situation or threat landscape through the Microsoft Security Response Center Blog.
Please join us Thursday, January 21 at 1:00 p.m. PST (UTC – 8) for a public webcast where we will present information on the bulletin and take customer questions. Registration information:
Date: Thursday Jan 21
Time: 1:00 p.m. PST (UTC -8)
*This posting is provided "AS IS" with no warranties, and confers no rights*
|My System Specs|
|Similar help and support threads for2: Advance Notification for Out-of-Band Bulletin Release|
|April 2010 Bulletin Release Advance Notification||News|
|March 2010 Bulletin Release Advance Notification||News|
|February 2010 Bulletin Release Advance Notification||News|
|January 2010 Bulletin Release Advance Notification||News|
|December 2009 Bulletin Release Advance Notification||News|
|November 2009 Bulletin Release Advance Notification||News|
|October 2009 Bulletin Release Advance Notification||System Security|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 10:51 AM.