Posts

Microsoft Security Bulletin Coverage (June 10, 2014)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of June, 2014. A list of issues reported, along with Dell SonicWALL coverage information are as follows:

MS14-030 Vulnerability in Remote Desktop Could Allow Tampering (2969259)

  • CVE-2014-0296 RDP MAC Vulnerability
    There are no known exploits in the wild.

MS14-031 Vulnerability in Remote Desktop Could Allow Tampering (2969259)

  • CVE-2014-1811 TCP Denial of Service Vulnerability
    There are no known exploits in the wild.

MS14-032 Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258)

  • CVE-2014-1823 Lync Server Content Sanitization Vulnerability
    IPS: 3943 “Microsoft Lync Server Information Disclosure Vulnerability (MS14-032)”

MS14-033 Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061)

  • CVE-2014-1816 MSXML Entity URI Vulnerability
    There are no known exploits in the wild.

MS14-034 Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261)

  • CVE-2014-2778 Embedded Font Vulnerability
    There are no known exploits in the wild.

MS14-035 Cumulative Security Update for Internet Explorer (2969262)

  • CVE-2014-0282 Internet Explorer Memory Corruption Vulnerability
    IPS: 3936 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 8”
  • CVE-2014-1762 Internet Explorer Memory Corruption Vulnerability
    IPS: 3938 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 7”
  • CVE-2014-1764 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1766 Internet Explorer Memory Corruption Vulnerability
    IPS: 3939 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 6”
  • CVE-2014-1769 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1770 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1771 TLS Server Certificate Renegotiation Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1772 Internet Explorer Memory Corruption Vulnerability
    IPS: 3941 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 5”
  • CVE-2014-1773 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1774 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1775 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1777 Internet Explorer Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1778 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1779 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1780 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1781 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1782 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1783 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1784 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1785 Internet Explorer Memory Corruption Vulnerability
    IPS: 3929 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 1”
  • CVE-2014-1786 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1788 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1789 Internet Explorer Memory Corruption Vulnerability
    IPS: 3930 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 2”
  • CVE-2014-1790 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1791 Internet Explorer Memory Corruption Vulnerability
    IPS: 3933 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 3”
  • CVE-2014-1792 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1794 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1795 Internet Explorer Memory Corruption Vulnerability
    IPS: 3934 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 4”
  • CVE-2014-1796 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1797 Internet Explorer Memory Corruption Vulnerability
    IPS: 6308 “HTTP Client Shellcode Exploit 46”
  • CVE-2014-1799 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1800 Internet Explorer Memory Corruption Vulnerability
    IPS: 3944 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 9”
  • CVE-2014-1802 Internet Explorer Memory Corruption Vulnerability
    IPS: 3955 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 10”
  • CVE-2014-1803 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1804 Internet Explorer Memory Corruption Vulnerability
    IPS: 7454 “HTTP Client Shellcode Exploit 35a”
  • CVE-2014-1805 Internet Explorer Memory Corruption Vulnerability
    IPS: 3480 “DOM Object Use-After-Free Attack 10a”
  • CVE-2014-2753 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2754 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2755 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2756 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2757 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2758 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2759 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2760 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2761 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2763 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2764 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2765 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2766 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2767 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2768 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2769 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2770 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2771 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2772 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2773 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2775 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2776 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2777 Internet Explorer Elevation of Privilege Vulnerability
    There are no known exploits in the wild.

MS14-036 Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487)

  • CVE-2014-1817 Unicode Scripts Processor Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-1818 GDI+ Image Parsing Vulnerability
    There are no known exploits in the wild.