Microsoft Security Advisory (2757760): Vulnerabil​ity in Internet Explorer

Vulnerability in Internet Explorer Could Allow Remote Code Execution
Microsoft is investigating public reports of a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9. Internet Explorer 10 is not affected. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability.
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.
On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
Article including some suggested actions is continued here: http://technet.microsoft.com/en-us/security/adviso​ry/2757760
Related: http://nakedsecurity.sophos.com/2012/09/17/new-ie-​zero-day-exploit-poison-ivy/
ThinkPad: T530 / X1 Gen 2 / Helix - Yoga: Tablet 2 Pro (Win) / Yoga 3 Pro
If you find a post helpful and it answers your question, please click the "Accept As Solution" button.
Lenovo Advocate ~ I am not employed by Lenovo or Microsoft. I am a volunteer.
Microsoft MVP - Consumer Security
SpywareHammer

The suggested setting in EMET for IE is to be protected against ALL the available exploits --- that is to say, including Mandatory ASLR as well as BottomUpASLR.   Unless you experience an issue with it [and the EMET Notifier should advise you of any problems it encounters], there's no reason to "generically" turn-off MandatoryASLR.
Having said that, here are the common exceptions people need to be aware of:
1) Windows Media Player users should UNcheck Mandatory ASLR for their Windows Media Player.
2) Skype users should UNcheck EAF for their Skype.
3) Some versions of Trusteer Rapport are having trouble with Microsoft EMET - web browsers do not open at all or open a blank, unusable window. In such case, Windows XP users should UNcheck EAF protection for each of their web browsers; and Windows Vista and 7 users should UNcheck Mandatory ASLR protection for each of their web browsers.
4) Configuring the system setting for DEP changes a boot option for Windows. For systems using BitLocker, this will cause BitLocker to detect that “system boot information has changed” and you will be forced to enter your recovery key the next time you boot Windows. It is highly recommended that you have your recovery key ready before changing the system configuration setting for DEP on a system with BitLocker enabled.
Windows 7 Pro SP1 (64-bit), avast! V7 Free, MBAM Pro, Windows Firewall, EMET, OpenDNS Family Shield, IE9 & Firefox (both using WOT & KeyScrambler), MVPS HOSTS file, SpywareBlaster, WinPatrol PLUS, SAS (on-demand scanner), Secunia PSI.
[I am experimenting with Sandboxie, and believe computer-users who sandbox are acting prudently.]

Similar Messages

  • Microsoft Security Advisory (979267) on Flash Player 9

    Someone plaease answer this.
    We are currently using Adobe Flash player 9 on Windows XP operating system. We would like to know if Vulnerabilities in Adobe Flash Player 6 Provided in Windows XP, could Allow Remote Code Execution mentioned in Microsoft Security Advisory (979267), is resolved in Flash Player 9? For more details on vulnerability please refer "Microsoft Security Advisory (979267)".
    Since we have security related issue with this please consider this call at high priority.
    ~
    Satu28

    Updated:
    Flash player 10.2.159.1
    Uninstall the old: http://download.macromedia.com/pub/flashplayer/current/uninstall_flash_player.exe
    Install the new for IE: http://fpdownload.adobe.com/get/flashplayer/current/install_flash_player_ax.exe
    Plugin for other browsers: http://fpdownload.adobe.com/get/flashplayer/current/install_flash_player.exe
    ThinkPad: T530 / X1 Gen 2 / Helix - Yoga: Tablet 2 Pro (Win) / Yoga 3 Pro
    If you find a post helpful and it answers your question, please click the "Accept As Solution" button.
    Lenovo Advocate ~ I am not employed by Lenovo or Microsoft. I am a volunteer.
    Microsoft MVP - Consumer Security
    SpywareHammer

  • Microsoft security Advisory 2028859

    A serious security flaw has been found in Windows 7 systems running Aero.Untill microsoft releases a security patch users can disable the Aero theme to  prevent the issue from being exploited.
    To disable Windows Aero by changing the theme, perform the following steps for each user on a system:
    Click Start, select the Control Panel, and then click on Appearance and Personalization.
    Under the Personalization category, click on Change the Theme.
    Scroll to the bottom of the listed themes and select one of the available Basic and High Contrast Themes.
    For further information go through the below given link 
    http://www.microsoft.com/technet/security/advisory/2028859.mspx
    The above mentioned vulnerability only affects Windows 7 and Windows server 2008 R2 users.
    Cheers and regards,
    • » νιנαソѕαяα∂нι ѕαмανє∂αм ™ « •
    ●๋•کáŕádhí'ک díáŕý ツ
    I am a volunteer here. I don't work for Lenovo

    Here is more information on Microsoft security advisory 2269637, mitigating it from Cisco devices:
    Vulnerability alert: http://tools.cisco.com/security/center/viewAlert.x?alertId=21268
    Mitigation buletin: http://tools.cisco.com/security/center/viewAlert.x?alertId=22317
    All security related advisories for cisco can be found from the Cisco SIO (Security Intelligence Operations):
    http://tools.cisco.com/security/center/home.x
    Hope that helps.

  • Microsoft Security Advisory (2269637)

    Microsoft Security Advisory (2269637)
    Insecure Library Loading Could Allow Remote Code  Execution
    This  vulnerability came out in August and is there a signature that will cover this in the ips and if not is there an idea if one is being reviewed?

    Here is more information on Microsoft security advisory 2269637, mitigating it from Cisco devices:
    Vulnerability alert: http://tools.cisco.com/security/center/viewAlert.x?alertId=21268
    Mitigation buletin: http://tools.cisco.com/security/center/viewAlert.x?alertId=22317
    All security related advisories for cisco can be found from the Cisco SIO (Security Intelligence Operations):
    http://tools.cisco.com/security/center/home.x
    Hope that helps.

  • Microsoft Security Advisory 3046015

    One of the workarounds for Microsoft Security Advisory 3046015 is to disable the RSA key exchange ciphers in Windows Vista and later systems by modifying the SSL Cipher Suite
    order in the Group Policy Object Editor but the cipher list in the Advisory is 1185 characters long but the max size for that GPO setting (SSL Cipher Suite order) is 1023 characters.

    Hi,
    Thank you for your update and feedback. It will be very beneficial for other community members who have similar questions.
    Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Out-of-Band Microsoft Security Advisory

    Microsoft Security Advisory (2659883)
    Vulnerability in ASP.NET Could Allow Denial of Service https://technet.microsoft.com/en-us/security/advisory/2659883
    Editing to add additional link: https://blogs.technet.com/b/msrc/archive/2011/12/28/advanced-notification-for-out-of-band-release-to...
    ThinkPad: T530 / X1 Gen 2 / Helix - Yoga: Tablet 2 Pro (Win) / Yoga 3 Pro
    If you find a post helpful and it answers your question, please click the "Accept As Solution" button.
    Lenovo Advocate ~ I am not employed by Lenovo or Microsoft. I am a volunteer.
    Microsoft MVP - Consumer Security
    SpywareHammer

    Hi -
    Here is a link to the forum post I made regarding the OS security update policy for Cisco Unity - http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Unified%20Communications%20and%20Video&topic=Unified%20Communications%20Applications&topicID=.ee835d2&CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.2cc231ee/2#selected_message
    Regards, Ginger

  • Microsoft Security Advisory 2963983

    https://technet.microsoft.com/library/security/2963983
    I called MS today not sure i had the right department, but the gentleman didn't know what I was referencing does anyone know of a site to get up to date information of this issue and when MS plans on releasing a patch?
    Also were advising everyone to disable the Adobe flash in internet explorer Add-on's, anything else that we can do to remedy this is greatly valued.
    Thank you,

    Summary:
    For more information on these and other remediation options, please see
    Security Advisory 2963983.  Additional information on this limited, targeted attack can be found on the
    MSRC blog. 
    IE is widely recognized as the most secure browser against socially-engineered malware, the most common form of attack, blocking 99.9% of malware in a
    recent NSS Labs test. 
    We encourage you to consider upgrading to the latest version of IE for improved security features such as Enhanced Protected Mode, better backward compatibility through
    Enterprise Mode, increased performance, and support for the modern web standards that run today’s websites and services.
    On April 26, 2014, Microsoft released a
    Security Advisory (2963983) to notify customers of a vulnerability in IE.  At this time we are aware of limited, targeted attacks.  We encourage customers to follow the suggested mitigations outlined in the security advisory while an update is
    finalized.
    Guidance on suggested mitigations:
    Our investigation has revealed that Enhanced Protected Mode, on by default for the modern browsing experience in IE10 and IE11, as well as Enhanced Mitigation Experience Toolkit (EMET) 4.1 and EMET 5.0 Technical Preview, could help protect against this potential
    risk.  We encourage customers to follow the suggested mitigations outlined in the security advisory while an update is finalized.
    The Enhanced Mitigation Experience Toolkit 4.1: (EMET)
    helps mitigate the exploitation of this vulnerability by adding additional protection layers that make the vulnerability harder to exploit.  EMET 4.1 is supported by Microsoft, and is automatically configured to help protect Internet Explorer.  EMET
    can also be configured using Group Policy.  For more information, see
    Microsoft Knowledge Base Article 2458544.
    More details:
    Deploy the Enhanced Mitigation Experience Toolkit 4.1
    Pros:  Blocks potential exploits of this vulnerability
    Cons:  May be incompatible with some web apps
    Enable Enhanced Protected Mode
    Pros: Blocks potential exploits of this vulnerability
    Cons:  May be incompatible with some web apps; not available on 32-bit Windows 7
    Businesses who have upgraded to IE11 or IE10 can enable
    Enhanced Protected Mode
    (EPM) for additional security protection.   On Windows 8 and Windows 8.1, EPM is enabled by default for the modern, immersive browsing experience.  Customers using the touch-friendly IE11 browser on Windows tablets, for example, are already
    using EPM and may not be susceptible to this and similar attacks.   
    Enhanced Protected Mode can be enabled and managed through Group Policy.  To manually enable EPM in IE, perform the following steps:
    On the IE Tools menu, click Internet Options.
    In the Internet Options dialog box, click the Advanced tab, and then scroll down to the Security section of the settings list.
    Ensure the checkboxes next to Enable Enhanced Protected Mode and Enable 64-bit processes for Enhanced Protected Mode (for 64-bit systems) are selected.
    Click OK to accept the changes and return to IE.
    Restart your system.
    While Enhanced Protected Mode provides significant additional protection, it may not be compatible with some add-ons and enterprise web apps.  Also, while EPM is available for
    64-bit Windows 7, it is not an option for 32-bit Windows 7 installations. 
     Unregister VGX.DLL
    Pros:  Relatively simple workaround
    Cons:  May not protect against other exploits
    Known attacks currently take advantage of VGX.DLL, which provides support for Vector Markup Language (VML).  VML is not natively supported by most web browsers today,
    so this remediation option may have the least impact on enterprise web app compatibility. 
    To unregister VGX.DLL:
    Click Start, click Run, and type "%SystemRoot%\System32\regsvr32.exe" /u /s "%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll"
    After an update has been released and installed, you can re-register VGX.DLL with:  "%SystemRoot%\System32\regsvr32.exe" /s "%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll"
    These commands can be issued as batch files via Microsoft System Center Configuration Manager or other infrastructure management solutions. 
    Rob^_^

  • EMET is the "Do 1 Thing" of Microsoft Security Response Center for the Safer Internet Day 2014

    http://blogs.technet.com/b/msrc/archive/2014/02/11/safer-internet-day-2014-and-our-february-2014-security-updates.aspx

    It does seem as though the Apple Extreme is one of the major contributors, or at least the ways that the Apple TV and PowerMac communicate (or not) with it, or via it to each other. But each of the items seems to have their own quirks on their own as well (re-synching randomly, etc..).

  • Microsoft Security Advisory 3046015 AND Technet-connectivity.

    Goodday,
    I've changed the "SSL Cipher Suite Order" according to the 3046015-workaround (gpedit/Computer config./Adm. templates/Network/SSL Configuration/SSL Cipher Suite Order.
    I've also enabled this setting and rebooted.
    Since then I get no connection to the Technet-site. Eror: "This page canrsquo;t be displayed" (this is NOT a type-error!).
    Who knows what's up?
    Evert Rademaker.

    As is detailed in
    MS15-031, this vulnerability is now resolved by
    Windows Update KB3046049. Please let us know if you continue to experience issues after installation of this security update.
    Brandon
    Windows Outreach Team- IT Pro
    Windows for IT Pros on TechNet

  • "Security error accessing url" only in Internet Explorer

    I'm running Flex 4 with Flash 11.1.102.55. Here is my crossdomain.xml.
    <cross-domain-policy>
        <allow-access-from domain="*"/>
        <allow-http-request-headers-from domain="*" headers="SOAPAction"/>
    </cross-domain-policy>
    Chrome and Firefox are fine loading the web services. However, all versions of IE (7, 8 and 9) return this error:
    [RPC Fault faultString="Security error accessing url" faultCode="Channel.Security.Error" faultDetail="Unable to load WSDL. If currently online, please verify the URI and/or format of the WSDL (http://api.example.com/Service/Service.asmx?WSDL)"]

    I just downloaded IE 10 (I was running IE9) and the error message doesn't pop up. Go figure. Though the Audio player is positioned differently in every browser.

  • Security Advisory 3046310 - Managing Updates

    Just took at look at Security Advisory 3046310 (
    https://technet.microsoft.com/en-us/library/security/3046310.aspx ). It says that Windows 8/2012 will update automatically. I've checked a few machines and don't see the update yet in the Certs mmc. As for Windows 7 and Server 2008, I'm guessing I should
    apply the update in kb2677070.
    We manage our systems with SCCM 2012 and are looking for some guidance on using those tools for this Bulletin if possible.
    Orange County District Attorney

    Hi,
    According to Microsoft Security Advisory 3046310:
    for Windows 8, Windows 8.1, Windows RT, Windows RT 8.1, Windows Server 2012, and Windows Server 2012 R2 systems, you can check the Application log in the Event Viewer for an entry with the following values:
    Source: CAPI2
    Level: Information
    Event ID: 4112
    Description: Successful auto update of disallowed certificate list with effective date: Monday, December 5, 2013 (or later).
    Have you seen this event logged on these machines?
    If not, please ensure that these machines are connecting to Internet. In addition, ports TCP 80 and TCP 443 need to be open.
    Microsoft Security Advisory 3046310
    https://technet.microsoft.com/en-us/library/security/3046310.aspx?f=255&MSPPError=-2147217396
    Best Regards,
    Amy
    Please remember to mark the replies as answers if they help and un-mark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact
    [email protected]

  • Internet Explorer 11 Reverts to Custom level Security

    I set IE11 Security level to DEFAULT, but the level keeps reverting to CUSTOM.
    I would appreciate assistance in correcting this problem.

    Hi Bert26,
    Is this computer domain-joined?
    Please take the following steps for troubleshooting:
    1. Run the fix tool to diagnose and repair IE problems form the following link.
    http://support.microsoft.com/mats/ie_performance_and_safety
    2. Reset Internet Explorer setting. For more information, please refer to the following article.
    http://windows.microsoft.com/en-us/internet-explorer/reset-ie-settings#ie=ie-11
    Hope it will be helpful.
    Best regards,
    Fangzhou CHEN
    Fangzhou CHEN
    TechNet Community Support

  • Do I need Internet Explorer security updates if I use Firefox?

    Hello!
    I cannot find an answer to this question through a Google search so I'm asking it here please. I'm using Windows 7 and see lots of regular updates for Internet Explorer being installed. But I never use Internet Explorer, I only use Firefox. So I wanted to know, will I be putting my Firefox security at risk by not installing Internet Explorer updates released through Windows Upate? Does a flaw in one browser affect another?
    Thank you!
    Alice.

    Thank you for your quick reply jscher2000. Your advice makes sense, I'll keep updates for Internet Explorer going. It was just something I was curious about. For example, if someone used both Firefox and Chrome, would a flaw in one affect another? And whilst Googling earlier for an answer for my question before posting (didn't want to waste anyone's time with a repetitive question), I noticed some people have completely uninstalled Internet Explorer, so presumably they won't even be offered any IE updates.
    Thanks again!
    Alice.

  • Internet Explorer Vulnerability update

    How can I verify if my machine was properly patched? What's the KB number that I should be searching for in "Programs and Features"?

    Please see:
    The Microsoft News Center:  
    http://blogs.technet.com/b/microsoft_blog/archive/2014/05/01/updating-internet-explorer-and-driving-security.aspx
    Security Tips & Talk post: 
    http://blogs.msdn.com/b/securitytipstalk/archive/2014/05/01/available-now-security-update-for-internet-explorer.aspx.
    ANS (MSRC) blog: 
    http://blogs.technet.com/b/msrc/archive/2014/05/01/out-of-band-release-to-address-microsoft-security-advisory-2963983.aspx  
    Bulletin Release (MSRC) blog: 
    http://blogs.technet.com/b/msrc/archive/2014/05/01/security-update-released-to-address-recent-internet-explorer-vulnerability.aspx
    Regards,
    Vincenzo Di Russo
    Microsoft® MVP Windows Internet Explorer, Windows & Security Expert - since 2003.
    Moderator in the Microsoft Community and TechNet Forums
    My MVP Profile

  • All Software Updates - Internet Explorer 11

    Just to confirm, Internet Explorer 11 is not suppose to be in the list of All Software Updates ?  There are cumulative and security updates for it, but no Internet Explorer 11 installation.  (though IE 7, 8, and 9 installations are listed)
    Thanks
    PS.  if we need to deploy using the offline installer, are there silent install switches for IE11 ?

    After synchronizing the Software Update Point in SCCM2012 R2, looking at the wsyncmgr.log, there were only a few errors (see below), probably related to the IE11 that we're missing.  Searching for information on "The Microsoft Software
    License Terms have not been completely downloaded and cannot be accepted" error refers to SCCM2012 going through a Proxy internet server, which we don't use.
    sync: SMS synchronizing updates, processed 14085 out of 14085 items (100%)
    Sync failures summary:
    Failed to sync update 5e174b97-938e-41b7-9428-b2f9978ddd2d. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update 359c5eeb-b7ff-447a-9986-5d6283a133f3. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update e67a6ad4-27ae-462f-a340-d7fdc9140619. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update a445f9b8-19d1-471e-a7ea-b4b60c102056. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update f13ddae9-edf3-4b5b-a874-14f35a089e8b. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update 1de9e76a-4e0b-4ee3-b2b2-cccd08f4ff59. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update 817ad2a6-3ca7-4fa2-aa32-9b906a2d9fdc. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Failed to sync update 87e13ecb-c669-43be-9e2a-01e567285031. Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.LicenseAgreement.GetById
    Sync failed: Failed to sync some of the updates. Source: Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WsusSyncAction.WSyncAction.SyncUpdates
    STATMSG: ID=6703 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_WSUS_SYNC_MANAGER" SYS=SC2012.corp.mcelhanney.com SITE=MCE PID=4700 TID=8864 GMTDATE=Wed Apr 22 20:59:22.117 2015 ISTR0="Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WsusSyncAction.WSyncAction.SyncUpdates"
    ISTR1="Failed to sync some of the updates" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=0

Maybe you are looking for

  • Generating CSV file with column names and data from the MySQL with JAVA

    Hi all, Give small example on ... How can I add column names and data to a CSV from from MySQL. like example sequence_no, time_date, col_name, col_name 123, 27-apr-2004, data, data 234, 27-apr-2004, data, data Pls give small exeample on this. Thanks

  • HELP R&R will not restore

    Thank You in advance. I have used this system for 10 mo and have never been able to reliably backup despite all of what the settings are. They have been set to backup daily but seem to back up when it feels like it. Last backup was 3/19/08. On to the

  • H:selectOneMenu and its value parameter trouble

    Hello! I have a form in my jsp page ^ <h:dataTable id="table" value="#{Reference.template.fields}" var="list" rowClasses="list_row_odd, list_row_even" columnClasses="align_right, align_left" width="100%" border="0" cellpadding="4" cellspacing="1">   

  • Find objects currently in memory

    I am currently helping a friend write a program that will take any object currently in memory with one of our applications and then return all the methods and public variables associated with that object. Our goal is to find them in memory or get the

  • New WRT54G

    Hi, I live in Australia and just bought a WRT54G Router with Firmware Version: v7.00.1, May. 4, 2006. But ive noticed on the linksys site, a later Firmware ver 7.00.6  4/11/2007 . For some reason it wont let me install it? My VLC media player pops up