Security 10816 Published by

Microsoft updated the following security bulletins: MS11-049 - Important: Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893) - Version:1.3, MS11-043 - Critical: Vulnerability in SMB Client Could Allow Remote Code Execution (2536276) - Version:1.1, and MS11-028 - Critical: Vulnerability in .NET Framework Could Allow Remote Code Execution (2484015) - Version:2.2.



MS11-049 - Important: Vulnerability in the Microsoft XML Editor Could Allow Information Disclosure (2543893) - Version:1.3
Severity Rating: Important - Revision Note: V1.3 (June 22, 2011): Corrected the bulletin replacement information for Microsoft InfoPath 2007 and the Systems Management Server detection information for SQL Server. This is a bulletin change only. There were no changes to the detection or security update files.Summary: This security update resolves a privately reported vulnerability in Microsoft XML Editor. The vulnerability could allow information disclosure if a user opened a specially crafted Web Service Discovery (.disco) file with one of the affected software listed in this bulletin. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise the affected system.

Read more

MS11-043 - Critical: Vulnerability in SMB Client Could Allow Remote Code Execution (2536276) - Version:1.1
Severity Rating: Critical - Revision Note: V1.1 (June 22, 2011): Added a link to Microsoft Knowledge Base Article 2536276 under Known Issues in the Executive Summary.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit the vulnerability, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server.

Read more

MS11-028 - Critical: Vulnerability in .NET Framework Could Allow Remote Code Execution (2484015) - Version:2.2
Severity Rating: Critical - Revision Note: V2.2 (June 22, 2011): Corrected the bulletin replacement information. This is a bulletin change only. There were no changes to the detection or security update files.Summary: This security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.

Read more