Microsoft Security Bulletin Coverage (September 09, 2014)

By

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of September, 2014. A list of issues reported, along with Dell SonicWALL coverage information are as follows:

MS14-052 Cumulative Security Update for Internet Explorer (2977629)

  • CVE-2013-7331 Internet Explorer Resource Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2799 Internet Explorer Memory Corruption Vulnerability
    IPS:5454 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 14”
  • CVE-2014-4059 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4065 Internet Explorer Memory Corruption Vulnerability
    IPS:5413 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 13”
  • CVE-2014-4079 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4080 Internet Explorer Memory Corruption Vulnerability
    IPS:5410 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 12”
  • CVE-2014-4081 Internet Explorer Memory Corruption Vulnerability
    IPS:5397 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 11”
  • CVE-2014-4082 Internet Explorer Memory Corruption Vulnerability
    IPS:5385 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 10”
  • CVE-2014-4083 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4084 Internet Explorer Memory Corruption Vulnerability
    IPS:5367 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 9”
  • CVE-2014-4085 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4086 Internet Explorer Memory Corruption Vulnerability
    IPS:5365 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 8”
  • CVE-2014-4087 Internet Explorer Memory Corruption Vulnerability
    IPS:5355 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 7”
  • CVE-2014-4088 Internet Explorer Memory Corruption Vulnerability
    IPS:5351 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 6”
  • CVE-2014-4089 Internet Explorer Memory Corruption Vulnerability
    IPS:5338 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 5”
  • CVE-2014-4090 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4091 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4092 Internet Explorer Memory Corruption Vulnerability
    IPS:5336 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 4”
    IPS:5327 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 3”
  • CVE-2014-4093 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4094 Internet Explorer Memory Corruption Vulnerability
    IPS:5326 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 2”
  • CVE-2014-4095 Internet Explorer Memory Corruption Vulnerability
    IPS:5323 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 1 “
  • CVE-2014-4096 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4097 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4098 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4099 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4100 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4101 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4102 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4103 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4104 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4105 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4106 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4107 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wi
    ld.

  • CVE-2014-4108 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4109 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4110 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4111 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.

MS14-053 Vulnerability in .NET Framework Could Allow Denial of Service (2990931)

  • CVE-2014-4072 .NET Framework Denial of Service Vulnerability
    There are no known exploits in the wild.

MS14-054 Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege (2988948)

  • CVE-2014-4074 Task Scheduler Vulnerability
    There are no known exploits in the wild.

MS14-055 Vulnerabilities in Microsoft Lync Server Could Allow Denial of Service (2990928)

  • CVE-2014-4068 Lync Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4070 Lync XSS Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4071 Lync Denial of Service Vulnerability
    There are no known exploits in the wild.
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.