CNET's spyware, viruses, & security forum is the best source for finding the latest news, help, and troubleshooting advice from a community of experts. Discussions cover how to detect, fix, and remove viruses, spyware, adware, malware, and other vulnerabilities on Windows, Mac OS X, and Linux.
Microsoft Security Bulletin Summary for January 2013
Published : January 08, 2013
Microsoft released 7 new security updates today, as part of their routine monthly security update cycle. As indicated below, Two (2) are identified as critical and five (5) as Important.
The bulletins address 12 vulnerabilities in Microsoft Windows, Office, Developer Tools and Windows Server.
Microsoft also released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.
• MS13-001 - Vulnerability in Windows Print Spooler Components Could Allow Remote Code Execution (2769369) • MS13-002 - Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (2756145)
• MS13-003 - Vulnerabilities in System Center Operations Manager Could Allow Elevation of Privilege (2748552) • MS13-004 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2769324) • MS13-005 - Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) • MS13-006 - Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) • MS13-007 - Vulnerability in Open Data Protocol Could Allow Denial of Service (2769327)
Dustin Childs @ the Microsoft Security Center Blog:
For those who need to prioritize deployment, Microsoft recommends focusing on the following Critical updates first:
MS13-002 (Microsoft XML Core Services)
This security update resolves two issues in Microsoft XML Core Services that could allow remote code execution if an affected system browsed to a specially crafted website. You'll notice there are updates available for supported versions of Microsoft Windows and Office, as well as certain Developer Tools and Server Software. This means you may be offered more than one update for this issue. Along with all of the other bulletins releasing today, the issues were privately disclosed and we're not aware of any attacks or customer impact.
Security Advisory 2755801
With this month's release, we are revising Security Advisory 2755801 to provide the latest update addressing issues in Adobe Flash Player for IE 10. This is a cumulative update, which means customers do not need to install previous updates as a prerequisite for installing the current update. We remain committed to working closely with Adobe to deliver quality protections that are aligned with Adobe's update process.
Security Advisory 973811
This advisory is being revised to add a Fix it that automatically sets Windows XP and Server 2003 systems to only allow NTLMv2. This has long been considered a best practice, and this release will make it even easier to implement. The KB article has also been updated to include all recommendations and best practices for various NTLM authentication scenarios. Applying the Fix it also enables the NTLMv2 settings required for users to take advantage of Extended Protection for Authentication as described in the advisory.