Today Microsoft released three security bulletins: one is rated Critical and two are rated Important. The bulletins address four unique vulnerabilities in Microsoft Windows and Microsoft Office.
Wolfgang Kandek, Qualys CTO, comments: “Of the three bulletins, only one is of critical severity: MS10-015. It addresses a vulnerability in Windows Media Player that can be exploited when playing a specially crafted media file of type “dvr-ms”. Microsoft normally rates this type of file format vulnerabilities as only “important” because user interaction is required. However this particular flaw has a component that allows for an attack through a browser link and allows its exploitation in automated “drive-by” fashion. We recommend patching immediately for MS10-015.”
Vulnerabilities in Windows Media Could Allow Remote Code Execution
This security update resolves one publicly disclosed vulnerability in DirectShow and one privately reported vulnerability in Windows Media Player and Windows Media Center. The more severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. In all cases, a user cannot be forced to open the file; for an attack to be successful, a user must be convinced to do so.
Vulnerability in Remote Desktop Client Could Allow Remote Code Execution
This security update resolves a publicly disclosed vulnerability in Windows Remote Desktop Client. The vulnerability could allow remote code execution if a user opens a legitimate Remote Desktop configuration (.rdp) file located in the same network folder as a specially crafted library file. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.
Vulnerability in Microsoft Groove Could Allow Remote Code Execution
This security update resolves a publicly disclosed vulnerability in Microsoft Groove that could allow remote code execution if a user opens a legitimate Groove-related file that is located in the same network directory as a specially crafted library file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
To learn more about patching challenges and techniques read our interview with Wolfgang Kandek, where he offers his extensive knowledge on the subject.