| 
   
    | 
     
      | 
       
        | 
         
          | 
 |  
          | 
 | 
 | 
 |  
          | 
 | 
What is the
          purpose of this alert? | 
 |  
          | 
 | 
This alert
          is to provide you with an overview of the new security bulletin(s)
          being released on January 10, 2012. Security bulletins are released
 monthly to resolve critical problem vulnerabilities.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 | 
 |  
          | 
 | 
NEW SECURITY BULLETINS | 
 |  
          | 
 | 
 | 
 |  
          | 
 | 
           
            | 
Microsoft is releasing the following seven new
            security bulletins for newly discovered vulnerabilities:  |  
            | 
             
              | 
               
                | 
Bulletin
                ID  | 
Bulletin
                ID | 
Maximum
                Severity Rating  | 
Vulnerability
                Impact  | 
Restart
                Requirement | 
Affected
                Software  |  
                |  | 
Vulnerability in
                Windows Kernel Could Allow Security Feature Bypass (2644615)  | 
Important  | 
Security Feature Bypass | 
Requires restart | 
 
 
 
 
 Microsoft Windows XP,
                Windows Server 2003, Windows Vista, Windows Server 2008,
                Windows 7, and Windows Server 2008 R2.
 |  
                |  | 
Vulnerability in
                Windows Object Packager Could Allow Remote Code Execution
                (2603381)  | 
Important | 
Remote Code Execution | 
May require restart | 
Microsoft Windows XP
                and Windows Server 2003. |  
                |  | 
Vulnerability in
                Windows Client/Server Run-time Subsystem Could Allow Elevation
                of Privilege (2646524)  | 
Important | 
Elevation of Privilege | 
Requires restart | 
Microsoft Windows XP,
                Windows Server 2003, Windows Vista, and Windows Server 2008. |  
                |  | 
Vulnerabilities in
                Windows Media Could Allow Remote Code Execution (2636391)  | 
Critical  | 
Remote Code Execution | 
Requires restart | 
Microsoft Windows XP,
                Windows Server 2003, Windows Vista, Windows Server 2008,
                Windows 7, and Windows Server 2008 R2. |  
                |  | 
Vulnerability in
                Microsoft Windows Could Allow Remote Code Execution (2584146)  | 
Important | 
Remote Code Execution | 
May requires restart | 
Microsoft Windows XP, Windows
                Server 2003, Windows Vista, Windows Server 2008, Windows 7, and
                Windows Server 2008 R2. |  
                |  | 
Vulnerability in
                SSL/TLS Could Allow Information Disclosure (2643584)  | 
Important | 
Information Disclosure | 
Requires restart | 
Microsoft Windows XP,
                Windows Server 2003, Windows Vista, Windows Server 2008,
                Windows 7, and Windows Server 2008 R2. |  
                |  | 
Vulnerability in
                AntiXSS Library Could Allow Information Disclosure (2607664)  | 
Important | 
Information Disclosure | 
May requires restart | 
Microsoft Developer
                Tools and Software |  |  |  | 
 |  
          | 
 | 
  Note: The list
          of affected software in the summary table above is an abstract. To
          see the full list of affectedcomponents please visit the bulletin summary webpage at the
          link below and review the "Affected
 Software" section.
 | 
 |  
          | 
 | 
 | 
 |  
          | 
 | 
Summaries for new bulletin(s)
          may be found at http://technet.microsoft.com/security/bulletin/MS12-jan.Update the month and also the URL inside the hyperlink and remove
          this note.
 
 Microsoft Windows Malicious
          Software Removal Tool
 Microsoft is releasing an updated version of the Microsoft Windows
          Malicious Software Removal Tool on Windows Server Update Services
          (WSUS), Windows Update (WU), and the Download Center. Information on
          the Microsoft Windows Malicious Software Removal Tool is available at
          http://support.microsoft.com/?kbid=890830.
 
High
          Priority Non-Security Updates High priority non-security updates Microsoft releases to be available
          on Microsoft Update (MU), Windows Update (WU), or Windows Server
          Update Services (WSUS) will be detailed in the KB article found at http://support.microsoft.com/?id=894199.
 | 
 |  
          | 
 | 
 | 
 |  
          | 
 | 
PUBLIC BULLETIN WEBCAST | 
 |  
          | 
 | 
 | 
 |  
          | 
 |  | 
 |  
          | 
 | 
 | 
 |  
          | 
 | 
           
            | 
NEW SECURITY BULLETIN
            TECHNICAL DETAILS |  
            | 
 |  
            | 
 |  
            | 
In the following tables of affected and
            non-affected software, software editions that are not listed are
            past their support lifecycle. To determine the support lifecycle
            for your product and edition, visit the Microsoft Support Lifecycle
            web site at http://support.microsoft.com/lifecycle/. |  
            | 
 |  
            | 
             
              | 
               
                | 
Bulletin
                Identifier | 
Microsoft
                Security Bulletin MS12-001 |  
                | 
Bulletin
                Title | 
Vulnerability in
                Windows Kernel Could Allow Security Feature Bypass (2644615) |  
                | 
Executive
                Summary | 
This security update
                resolves a privately reported vulnerability in Microsoft
                Windows. The vulnerability could allow an attacker to bypass
                the SafeSEH security feature in a software application. An
                attacker could then use other vulnerabilities to leverage the
                structured exception handler to run arbitrary code. 
 The security update addresses the vulnerability by modifying
                the way that the Windows kernel loads structured exception
                handling tables.
 |  
                | 
Severity
                Ratings and Affected Software | 
This security update is
                rated Important for supported x64-based editions of Windows XP
                and all supported editions of Windows Server 2003, Windows
                Vista, Windows Server 2008, Windows 7, and Windows Server 2008
                R2.  |  
                | 
Attack
                Vectors | 
                 
                  | 
• | 
An
                  attacker who successfully exploited this vulnerability could
                  bypass the SafeSEH security feature in a software application
                  and then use other vulnerabilities to leverage the structured
                  exception handler to run arbitrary code. |  |  
                | 
Mitigating
                Factors | 
                 
                  | 
• | 
Only
                  software applications that were compiled using Microsoft
                  Visual C++ .NET 2003 can be used to exploit this
                  vulnerability. |  |  
                | 
Restart
                Requirement | 
This update requires a
                restart.  |  
                | 
Bulletins
                Replaced by This Update | 
None |  
                | 
Full
                Details |  |  |  |  
            | 
 |  
            | 
 |  
            | 
 |  
            | 
             
              | 
Bulletin
              Identifier | 
Microsoft
              Security Bulletin MS12-002 |  
              | 
Bulletin
              Title | 
Vulnerability in Windows
              Object Packager Could Allow Remote Code Execution (2603381) |  
              | 
Executive
              Summary | 
This security update
              resolves a privately reported vulnerability in Microsoft Windows.
              The vulnerability could allow remote code execution if a user
              opens a legitimate file with an embedded packaged object that is
              located in the same network directory as a specially crafted
              executable file. 
 The security update addresses the vulnerability by correcting a
              registry key associated with the Windows Object Packager.
 |  
              | 
Severity
              Ratings and Affected Software | 
This security update is
              rated Important for all supported editions of Windows XP and
              Windows Server 2003.  |  
              | 
Attack
              Vectors | 
               
                | 
• | 
An attacker could place
                a legitimate file with an embedded packaged object and a
                specially crafted executable file in a network share, a UNC, or
                WebDAV location and then convince the user to open the
                legitimate file. |  |  
              | 
Mitigating
              Factors | 
               
                | 
• | 
An attacker who
                successfully exploited this vulnerability could gain the same
                user rights as the logged-on user. Users whose accounts are
                configured to have fewer user rights on the system could be
                less impacted than users who operate with administrative user
                rights. |  
                | 
• | 
The attacker cannot
                force the user to visit an untrusted remote file system or
                WebDAV share and open a legitimate file. |  
                | 
• | 
The file sharing
                protocol (SMB) is often disabled on the perimeter firewall. |  |  
              | 
Restart
              Requirement | 
This update may require a
              restart. |  
              | 
Bulletins
              Replaced by This Update | 
None |  
              | 
Full
              Details |  |  |  
            | 
 |  
            | 
 |  
            | 
 |  
            | 
             
              | 
Bulletin
              Identifier | 
Microsoft
              Security Bulletin MS12-003 |  
              | 
Bulletin
              Title | 
Vulnerability in Windows
              Client/Server Run-time Subsystem Could Allow Elevation of
              Privilege (2646524) |  
              | 
Executive
              Summary | 
This security update
              resolves one privately reported vulnerability in Microsoft
              Windows. The vulnerability could allow elevation of privilege if
              an attacker logs on to an affected system and runs a specially
              crafted application. The attacker could then take complete
              control of the affected system.
 The security update addresses the vulnerability by changing the
              way that the Client/Server Run-time Subsystem (CSRSS) processes
              Unicode characters.
 |  
              | 
Severity
              Ratings and Affected Software | 
               
                | 
• | 
This security update is
                rated Important for all supported editions of Windows XP,
                Windows Server 2003, Windows Vista, and Windows Server 2008.  |  
                | 
• | 
All supported editions
                of Windows 7 and Windows Server 2008 R2 are not affected by
                this vulnerability. |  |  
              | 
Attack
              Vectors | 
               
                | 
• | 
An attacker logs on to
                the affected system and runs a specially crafted application. |  |  
              | 
Mitigating
              Factors | 
               
                | 
• | 
This vulnerability can
                only be exploited on systems configured with a Chinese,
                Japanese, or Korean system locale. |  
                | 
• | 
An attacker must have
                valid logon credentials and be able to log on locally or
                remotely to exploit this vulnerability. |  |  
              | 
Restart
              Requirement | 
This update requires a
              restart. |  
              | 
Bulletins
              Replaced by This Update | 
MS11-063 |  
              | 
Full
              Details |  |  |  
            | 
 |  
            | 
 |  
            | 
 |  
            | 
             
              | 
Bulletin
              Identifier | 
Microsoft
              Security Bulletin MS12-004 |  
              | 
Bulletin
              Title | 
Vulnerabilities in
              Windows Media Could Allow Remote Code Execution (2636391) |  
              | 
Executive
              Summary | 
This security update
              resolves two privately reported vulnerabilities in Microsoft
              Windows. The vulnerabilities could allow remote code execution if
              a user opens a specially crafted media file.
 The security update addresses the vulnerabilities by correcting
              the way that Windows Media Player handles specially crafted MIDI
              files and the way that DirectShow parses media files.
 |  
              | 
Severity
              Ratings and Affected Software | 
               
                | 
• | 
This security update is
                rated Critical for all supported editions of Windows XP,
                Windows Server 2003, Windows Vista, and Windows Server 2008. |  
                | 
• | 
This security update is
                rated Important for all supported editions of Windows Media
                Center TV Pack for Windows Vista, Windows 7, and Windows Server
                2008 R2. |  |  
              | 
Attack
              Vectors | 
               
                | 
• | 
In an email attack
                scenario, an attacker could exploit the vulnerability by
                sending a user an email message containing a specially crafted
                media file and convincing the user to open the media file. |  
                | 
• | 
In a web-based attack
                scenario, an attacker would have to host a website that
                contains a specially crafted media file. |  |  
              | 
Mitigating
              Factors | 
               
                | 
• | 
Email scenario: The
                malicious file could be sent as an email attachment, but the
                attacker would have to convince the user to open the attachment
                in order to exploit the vulnerability. |  
                | 
• | 
Web scenario: An
                attacker would have no way to force users to visit a website
                hosting the specially crafted media file. Instead, an attacker
                would have to convince users to visit the website, typically by
                getting them to click a link in an email message or Instant
                Messenger message that directs them to the attacker's website. |  
                | 
• | 
An attacker who
                successfully exploited the vulnerabilities could gain the same
                user rights as the local user. Users whose accounts are
                configured to have fewer user rights on the system could be
                less impacted than users who operate with administrative user
                rights. |  |  
              | 
Restart
              Requirement | 
This update requires a
              restart. |  
              | 
Bulletins
              Replaced by This Update | 
MS10-033 |  
              | 
Full
              Details |  |  |  
            | 
 |  
            | 
 |  
            | 
 |  
            | 
             
              | 
Bulletin
              Identifier | 
Microsoft
              Security Bulletin MS12-005 |  
              | 
Bulletin
              Title | 
Vulnerability in
              Microsoft Windows Could Allow Remote Code Execution (2584146) |  
              | 
Executive
              Summary | 
This security update
              resolves a privately reported vulnerability in Microsoft Windows.
              The vulnerability could allow remote code execution if a user
              opens a specially crafted Microsoft Office file containing a
              malicious embedded ClickOnce application.
 The security update addresses the vulnerability by changing the
              way that Windows Packager checks for unsafe files.
 |  
              | 
Severity
              Ratings and Affected Software | 
This security update is
              rated Important for all supported releases of Microsoft Windows.  |  
              | 
Attack
              Vectors | 
               
                | 
• | 
In an email attack
                scenario, an attacker could exploit the vulnerability by
                sending a specially crafted Microsoft Office file with an
                embedded ClickOnce application to the user and convincing the
                user to open the file. |  
                | 
• | 
In a web-based attack
                scenario, an attacker would have to host a website that
                contains an Office file that is used to attempt to exploit this
                vulnerability. In addition, compromised websites and websites
                that accept or host user-provided content could contain
                specially crafted content that could exploit this
                vulnerability.  |  |  
              | 
Mitigating
              Factors | 
               
                | 
• | 
An attacker would have
                no way to force users to visit a specially crafted website.
                Instead, an attacker would have to convince them to visit the website,
                typically by getting them to click a link that takes them to
                the attacker's site, and then convince them to open the
                specially crafted file. |  
                | 
• | 
An attacker who
                successfully exploited this vulnerability could gain the same
                user rights as the local user. Users whose accounts are
                configured to have fewer user rights on the system could be
                less impacted than users who operate with administrative user
                rights. |  |  
              | 
Restart
              Requirement | 
This update may require a
              restart. |  
              | 
Bulletins
              Replaced by This Update | 
None |  
              | 
Full
              Details |  |  |  
            | 
 |  
            | 
 |  
            | 
 |  
            | 
             
              | 
Bulletin
              Identifier | 
Microsoft
              Security Bulletin MS12-006 |  
              | 
Bulletin
              Title | 
Vulnerability in SSL/TLS
              Could Allow Information Disclosure (2643584) |  
              | 
Executive
              Summary | 
This security update
              resolves a publicly disclosed vulnerability in SSL 3.0 and TLS
              1.0. This vulnerability affects the protocol itself and is not
              specific to the Windows operating system. The vulnerability could
              allow information disclosure if an attacker intercepts encrypted
              web traffic served from an affected system. 
 The security update addresses the vulnerability by modifying the
              way that the Windows Secure Channel (SChannel) component sends
              and receives encrypted network packets.
 
 This security update also addresses the vulnerability first
              described in Microsoft Security Advisory 2588513.
 |  
              | 
Severity
              Ratings and Affected Software | 
This security update is
              rated Important for all supported releases of Microsoft Windows.  |  
              | 
Attack
              Vectors | 
               
                | 
• | 
An attacker could
                inject malicious code in an HTTP response or host a specially
                crafted website containing malicious code, forcing the browser
                to execute this malicious code. This code sends several
                requests, inside the same TLS/SSL session, to a third-party HTTPS
                website, where cookies are sent automatically if a previous
                authenticated session exists. This is a required condition in
                order to exploit this vulnerability. The attacker needs to be
                able to intercept this HTTPS traffic in order to exploit this
                vulnerability in SSL, resulting in the possibility to decrypt
                portions of the encrypted traffic (for example, authentication
                cookies). |  |  
              | 
Mitigating
              Factors | 
• TLS 1.1, TLS 1.2, and
              all cipher suites that do not use CBC mode are not affected.  |  
              | 
Restart
              Requirement | 
This update requires a
              restart. |  
              | 
Known
              Issues | 
Known
              Issues. Microsoft Knowledge Base Article 2643584
              documents the currently known issues that customers may
              experience when installing this security update. The article also
              documents recommended solutions for these issues. |  
              | 
Answers
              to Common Questions | 
Q: How
              is this security update related to MS11-099? A: In order to be protected from the web-based attack vector
              through Internet Explorer for the SSL and TLS Protocols
              Vulnerability (CVE-2011-3389) as described in this bulletin,
              customers must install both this update, MS12-006, and the Cumulative Security Update for Internet Explorer,
              MS11-099.
 Two different updates are needed because the modifications that
              are required to address the issue are located in different
              Microsoft products. This update, MS12-006, addresses the
              vulnerability affecting WinHTTP and provides the possibility to
              enable the protection system-wide. The MS11-099 update enables
              these protections for Internet Explorer.
 
 Q: Why does this bulletin
              contain two updates for Windows XP Professional x64 Edition
              Service Pack 2 and Windows Server 2003 operating systems?
 A: This bulletin contains two updates, identified by package KB
              number, for Windows XP Professional x64 Edition Service Pack 2
              and Windows Server 2003 operating systems, as specified in the Affected Software table. The two updates are necessary because
              the modifications that are required to address the vulnerability
              in Windows XP Professional x64 Edition Service Pack 2 and Windows
              Server 2003 operating systems are located in separate components.
 |  
              | 
Bulletins
              Replaced by This Update | 
MS10-049, MS10-085, and
              MS10-095. |  
              | 
Full
              Details |  |  |  
            | 
 |  
            | 
 |  
            | 
 |  
            | 
             
              | 
Bulletin
              Identifier | 
Microsoft
              Security Bulletin MS12-007 |  
              | 
Bulletin
              Title | 
Vulnerability in AntiXSS
              Library Could Allow Information Disclosure (2607664) |  
              | 
Executive
              Summary | 
This security update
              resolves one privately reported vulnerability in the Microsoft
              Anti-Cross Site Scripting (AntiXSS) Library. The vulnerability
              could allow information disclosure if an attacker passes a
              malicious script to a website using the sanitization function of
              the AntiXSS Library. The consequences of the disclosure of that
              information depends on the nature of the information itself. 
 The update addresses the vulnerability by upgrading the AntiXSS
              Library to a version that is not affected by the vulnerability.
 |  
              | 
Severity
              Ratings and Affected Software | 
This security update is
              rated Important for the AntiXSS Library V3.x and the AntiXSS
              Library V4.0.  |  
              | 
Attack
              Vectors | 
               
                | 
• | 
An attacker could send
                specially crafted HTML to a target website that is using the
                sanitization module of the AntiXSS Library. When the AntiXSS
                Library incorrectly sanitizes the HTML, malicious script
                contained within the specially crafted HTML could be run on the
                affected web server. |  |  
              | 
Mitigating
              Factors | 
               
                | 
• | 
Only sites that use the
                sanitization module of the AntiXSS Library are affected by this
                vulnerability. |  
                | 
• | 
This vulnerability
                would not allow an attacker to execute code or to elevate the
                attacker's user rights directly, but it could be used to
                produce information that could be used to try to further
                compromise the affected system.  |  |  
              | 
Restart
              Requirement | 
This update may require a
              restart. |  
              | 
Bulletins
              Replaced by This Update | 
None |  
              | 
Full
              Details |  |  |  
            | 
 |  
            | 
REGARDING INFORMATION
            CONSISTENCY |  
            | 
 |  
            | 
 |  
            | 
We strive to provide you with accurate
            information in static (this mail) and dynamic (web-based) content.
            Microsoft's security content posted to the web is occasionally
            updated to reflect late-breaking information. If this results in an
            inconsistency between the information here and the information in
            Microsoft's web-based security content, the information in
            Microsoft’s web-based security content is authoritative.
 If you have any questions regarding this alert please contact your
            Technical Account Manager or Application Development Consultant.
 
 Thank you,
 Microsoft CSS Security Team
 |  
            | 
 |  | 
 |  
          | 
 | 
 | 
 |  |  
        |  |  |  |  | 
Comments