Microsoft Security Bulletin Summary for December 2013

Number: AV13-043
Date: 10 December 2013

Purpose

The purpose of this advisory is to bring attention to the monthly Microsoft Security Bulletin Summary for December.

Assessment

The summary covers 11 bulletins (5 Critical and 6 Important), which address multiple vulnerabilities in Microsoft Windows, Internet Explorer and Microsoft Office products.

** CRITICAL **
MS13-096 - Vulnerability in Microsoft Graphics Component Could allow Remote Code Execution (2908005)
https://technet.microsoft.com/en-us/security/bulletin/ms13-096

MS13-097 - Cumulative Security Update for Internet Explorer (2898785)
https://technet.microsoft.com/en-us/security/bulletin/ms13-097

MS13-098 - Vulnerability in Windows Could Allow Remote Code Execution (2893294)
https://technet.microsoft.com/en-us/security/bulletin/ms13-098

MS13-099 - Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2915705)
https://technet.microsoft.com/en-us/security/bulletin/ms13-099

MS13-105 - Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2915705)
https://technet.microsoft.com/en-us/security/bulletin/ms13-105

** IMPORTANT**
MS13-100 - Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2904244)
https://technet.microsoft.com/en-us/security/bulletin/ms13-100

MS13-101 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430)
https://technet.microsoft.com/en-us/security/bulletin/ms13-101

MS13-102 - Vulnerability in LRPC Client Could Allow Elevation of Privilege (2898715)
https://technet.microsoft.com/en-us/security/bulletin/ms13-102

MS13-103 - Vulnerability in ASP.NET SignalR Could Allow Elevation of Privilege (2905244)
https://technet.microsoft.com/en-us/security/bulletin/ms13-103

MS13-104 - Vulnerability in Microsoft Office Could Allow Information Disclosure (2909976)
https://technet.microsoft.com/en-ca/security/bulletin/ms13-104

MS13-106 - Vulnerability in a Microsoft Office Shared Component Could Allow Security Feature Bypass
(2905238)
https://technet.microsoft.com/en-us/security/bulletin/ms13-106

Suggested action

CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.

References:

http://technet.microsoft.com/en-us/security/bulletin/ms13-dec

Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.
http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/_fl/CCIRCPublicPGPKey.txt

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589
E-mail: ps.communications-communications.sp@canada.ca

Date modified: