Monthly Archives: September 2014
2871997 – Update to Improve Credentials Protection and Management – Version: 3.0
Revision Note: V3.0 (September 9, 2014): Rereleased advisory to announce the release of update 2982378 to provide additional protection for usersâ credentials when logging into a Windows 7 or Windows Server 2008 R2 system. See Updates Related to this Advisory for details.
Summary: Microsoft is announcing the availability of updates for supported editions of Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 that improve credential protection and domain authentication controls to reduce credential theft.
MS14-SEP – Microsoft Security Bulletin Summary for September 2014 – Version: 1.0
Revision Note: V1.0 (September 9, 2014): Bulletin Summary published.
Summary: This bulletin summary lists security bulletins released for September 2014.
2905247 – Insecure ASP.NET Site Configuration Could Allow Elevation of Privilege – Version: 2.0
Revision Note: V2.0 (September 9, 2014): Advisory rereleased to announce the offering of the security update via Microsoft Update, in addition to the Download-Center-only option that was provided when this advisory was originally released.
Summary: Microsoft is announcing the availability of an update for Microsoft ASP.NET to address a vulnerability in ASP.NET view state that exists when Machine Authentication Code (MAC) validation is disabled through configuration settings. The vulnerability could allow elevation of privilege and affects all supported versions of Microsoft .NET Framework except .NET Framework 3.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1.
MS14-054 – Important: Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege (2988948) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerability and take complete control over an affected system. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.
MS14-052 – Critical: Cumulative Security Update for Internet Explorer (2977629) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and thirty-six privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
ManageEngine Desktop Central StatusUpdate Arbitrary File Upload
This Metasploit module exploits an arbitrary file upload vulnerability in ManageEngine DesktopCentral v7 to v9 build 90054 (including the MSP versions). A malicious user can upload a JSP file into the web root without authentication, leading to arbitrary code execution as SYSTEM. Some early builds of version 7 are not exploitable as they do not ship with a bundled Java compiler.
GDB Server Remote Payload Execution
This Metasploit module attempts to execute an arbitrary payload on a loose gdbserver service.
JobScheduler Path Traversal
JobScheduler versions prior to 1.7.4241 suffer from a path traversal vulnerability.
Alcasar 2.8 Remote Root Command Execution
Alcasar versions 2.8 and below remote root command execution exploit.