Microsoft Security Bulletin Coverage (June 10, 2014)
Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of June, 2014. A list of issues reported, along with Dell SonicWALL coverage information are as follows:
MS14-030 Vulnerability in Remote Desktop Could Allow Tampering (2969259)
- CVE-2014-0296 RDP MAC Vulnerability
There are no known exploits in the wild.
MS14-031 Vulnerability in Remote Desktop Could Allow Tampering (2969259)
- CVE-2014-1811 TCP Denial of Service Vulnerability
There are no known exploits in the wild.
MS14-032 Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258)
- CVE-2014-1823 Lync Server Content Sanitization Vulnerability
IPS: 3943 “Microsoft Lync Server Information Disclosure Vulnerability (MS14-032)”
MS14-033 Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061)
- CVE-2014-1816 MSXML Entity URI Vulnerability
There are no known exploits in the wild.
MS14-034 Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261)
- CVE-2014-2778 Embedded Font Vulnerability
There are no known exploits in the wild.
MS14-035 Cumulative Security Update for Internet Explorer (2969262)
- CVE-2014-0282 Internet Explorer Memory Corruption Vulnerability
IPS: 3936 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 8” - CVE-2014-1762 Internet Explorer Memory Corruption Vulnerability
IPS: 3938 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 7” - CVE-2014-1764 Internet Explorer Elevation of Privilege Vulnerability
There are no known exploits in the wild. - CVE-2014-1766 Internet Explorer Memory Corruption Vulnerability
IPS: 3939 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 6” - CVE-2014-1769 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1770 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1771 TLS Server Certificate Renegotiation Vulnerability
There are no known exploits in the wild. - CVE-2014-1772 Internet Explorer Memory Corruption Vulnerability
IPS: 3941 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 5” - CVE-2014-1773 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1774 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1775 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1777 Internet Explorer Information Disclosure Vulnerability
There are no known exploits in the wild. - CVE-2014-1778 Internet Explorer Elevation of Privilege Vulnerability
There are no known exploits in the wild. - CVE-2014-1779 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1780 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1781 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1782 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1783 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1784 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1785 Internet Explorer Memory Corruption Vulnerability
IPS: 3929 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 1” - CVE-2014-1786 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1788 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1789 Internet Explorer Memory Corruption Vulnerability
IPS: 3930 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 2” - CVE-2014-1790 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1791 Internet Explorer Memory Corruption Vulnerability
IPS: 3933 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 3” - CVE-2014-1792 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1794 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1795 Internet Explorer Memory Corruption Vulnerability
IPS: 3934 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 4” - CVE-2014-1796 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1797 Internet Explorer Memory Corruption Vulnerability
IPS: 6308 “HTTP Client Shellcode Exploit 46” - CVE-2014-1799 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1800 Internet Explorer Memory Corruption Vulnerability
IPS: 3944 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 9” - CVE-2014-1802 Internet Explorer Memory Corruption Vulnerability
IPS: 3955 “Internet Explorer Memory Corruption Vulnerability (MS14- 035) 10” - CVE-2014-1803 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-1804 Internet Explorer Memory Corruption Vulnerability
IPS: 7454 “HTTP Client Shellcode Exploit 35a” - CVE-2014-1805 Internet Explorer Memory Corruption Vulnerability
IPS: 3480 “DOM Object Use-After-Free Attack 10a” - CVE-2014-2753 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2754 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2755 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2756 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2757 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2758 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2759 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2760 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2761 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2763 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2764 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2765 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2766 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2767 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2768 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2769 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2770 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2771 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2772 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2773 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2775 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2776 Internet Explorer Memory Corruption Vulnerability
There are no known exploits in the wild. - CVE-2014-2777 Internet Explorer Elevation of Privilege Vulnerability
There are no known exploits in the wild.
MS14-036 Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487)
- CVE-2014-1817 Unicode Scripts Processor Vulnerability
There are no known exploits in the wild. - CVE-2014-1818 GDI+ Image Parsing Vulnerability
There are no known exploits in the wild.