Handler on Duty: Didier Stevens
Threat Level: green
Microsoft Patch Tuesday 2008-06-10
Title | A vulnerabilities in the Bluetooth stack allows code execution when a large number of SDP (Service Discover Protocol) requests are made. |
---|---|
Replaces | |
Affected | Bluetooth |
KB | KB951376 |
Known Exploits | No |
Microsoft Rating | Critical |
ISC Client Rating | Critical |
ISC Server Rating | Critical |
CVE | Exploitability |
---|---|
2008-1453 | Unknown |
Title | Multiple vulnerabilities in MSIE allow code execution and cross domain information leaks. The memory corruption gives access to the same rights as the logged-on user has. The vulnerability in parsing headers allows for HTTP Request Splitting, |
---|---|
Replaces | MS80-24 |
Affected | MSIE |
KB | KB950759 |
Known Exploits | Yes |
Microsoft Rating | Critical |
ISC Client Rating | Patch now |
ISC Server Rating | Patch now |
CVE | Exploitability |
---|---|
2008-1442 | Unknown |
2008-1544 | Unknown |
Title | A vulnerability in the Speech API accepts commands sent to it over the speakers of the computer, allowing an attacker access to the same rights as the user has. The speach recognition must be enabled for this to work. |
---|---|
Replaces | MS80-23 |
Affected | ActiveX Kill Bits |
KB | KB950760 |
Known Exploits | Yes |
Microsoft Rating | Moderate |
ISC Client Rating | Important |
ISC Server Rating | Important |
CVE | Exploitability |
---|---|
2007-0675 | Unknown |
Title | Multiple input validation vulnerabilities allow code execution in DirectX. Affected are MPEG streams in ASF and AVI files and parameters of SAMI (Synchronized Accessible Media Interchange) files. |
---|---|
Replaces | MS70-64 |
Affected | DirectX |
KB | KB951698 |
Known Exploits | No |
Microsoft Rating | Critical |
ISC Client Rating | Critical |
ISC Server Rating | Critical |
CVE | Exploitability |
---|---|
2008-0011 | Unknown |
2008-1444 | Unknown |
Title | Privilege escalation vulnerability in WINS allows an attacker to gain complete control of a vulnerable system by sending crafted packets to the WINS server. |
---|---|
Replaces | MS40-45 |
Affected | WINS |
KB | KB948745 |
Known Exploits | No |
Microsoft Rating | Important |
ISC Client Rating | Less urgent |
ISC Server Rating | Less urgent |
CVE | Exploitability |
---|---|
2008-1451 | Unknown |
Title | Input validation failure in the LDAP implementation part of AD leads to a Denial of Service. |
---|---|
Replaces | MS80-03 |
Affected | Active Directory |
KB | KB953235 |
Known Exploits | No |
Microsoft Rating | Important |
ISC Client Rating | Less urgent |
ISC Server Rating | Less urgent |
CVE | Exploitability |
---|---|
2008-1445 | Unknown |
Title | Multiple input validation failures in the PGM packets allow a Denial of Service. PGM is active when MSMQ (Microsoft Message Queuing) is installed on a system. |
---|---|
Replaces | MS60-52 |
Affected | PGM (Pragmatic General Multicast) |
KB | KB950762 |
Known Exploits | No |
Microsoft Rating | Important |
ISC Client Rating | Important |
ISC Server Rating | Important |
CVE | Exploitability |
---|---|
2008-1440 | Unknown |
2008-1441 | Unknown |
We will update issues on this page for about a week or so as they evolve. We appreciate your updates!
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
- We use 4 levels:
- PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
- Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
- Important: Things where more testing and other measures can help.
- Less Urgent: practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
- The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.