Microsoft Patch Tuesday 2010-06-08

MS10-032
Title Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege
Replaces MS90-65
Affected Windows Kernel
KB KB979559
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-0484 1
2010-0485 1
2010-1255 1
MS10-033
Title Vulnerabilities in Media Decompression Could Allow Remote Code Execution
Replaces MS80-33, MS90-28, MS90-47
Affected DirectShow, DirectX, Windows Media Format Runtime, COM
KB KB979902
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-1879 1
2010-1880 1
MS10-034
Title Cumulative Security Update of ActiveX Kill Bits
Replaces MS10-008
Affected ActiveX, Internet Explorer 8
KB KB980195
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-0252 1
2010-0811 1
MS10-035
Title Cumulative Security Update for Internet Explorer
Replaces MS10-018
Affected Internet Explorer
KB KB982381
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-0255 2
2010-1257 3
2010-1259 1
2010-1260 0
2010-1261 0
2010-1262 1
MS10-036
Title Vulnerabilities in COM validation in Microsoft Office Could Allow Remote Code Execution
Replaces MS80-55, MS90-17, MS90-27, MS90-68, MS10-004, MS10-017, MS10-023, MS10-028
Affected Microsoft Office
KB KB983285
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-1263 1
MS10-037
Title Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege
Replaces
Affected Windows Kernel
KB KB980218
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-0819 2
MS10-038
Title Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution
Replaces MS10-017
Affected Excel
KB KB2027452
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2010-0821 2
2010-0822 1
2010-0823 2
2010-0824 1
2010-1245 1
2010-1246 1
2010-1247 1
2010-1248 1
2010-1249 1
2010-1250 1
2010-1251 2
2010-1252 2
2010-1253 1
2010-1254 1
MS10-039
Title Vulnerabilities in Microsoft SharePoint Could Allow Elevation of Privilege
Replaces MS80-77
Affected MS Infopath, Sharepoint Services
KB KB2028554
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2010-0817 1
2010-1257 3
2010-1264 3
MS10-040
Title Remote Code Execution Vulnerability in IIS
Replaces
Affected IIS
KB KB982666
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2010-1256 2
MS10-041
Title .Net Framework Data Tampering
Replaces MS90-61
Affected .Net
KB KB981343
Known Exploits Yes
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2009-0217 3
We will update issues on this page for about a week or so as they evolve. We appreciate your updates!
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
    • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.