Skip to main content
MSRC

Assessing risk for the January 2012 security updates

Today we released seven security bulletins. One has a maximum severity rating of Critical with the other six having a maximum severity rating of Important. We hope that the table below helps you prioritize the deployment of the updates appropriately for your environment.

Bulletin Most likely attack vector Max Bulletin Severity Max Exploit-ability rating Likely first 30 days impact Platform mitigations and key notes
MS12-004(Windows Media) Victim browses to a malicious website or opens a malicious media file. Critical 1 Likely to see exploit code developed in next 30 days. Windows 7 not affected by default by either of the two vulnerabilities.See this SRD blog post for more information.
MS12-005(Office) Victim opens a malicious PPS or DOC file. Important 1 Likely to see exploit code developed in next 30 days.
MS12-003(CSRSS) Attacker logs-in locally to a machine and exploits the vulnerability to elevate to a higher privilege level. Important 1 Likely to see exploit code developed in next 30 days. Only affects systems with double-byte consoles. (English locale not affected.) Windows Vista and later platforms not affected.
MS12-002(Object Packager) Victim browses to a malicious WebDAV or SMB share and opens a Publisher (PUB) file. Publisher executes a potentially malicious executable hosted on the same WebDAV or SMB share. Important 1 Likely to see exploit code developed in next 30 days.
MS12-006(SSL / TLS) Victim browses to a trusted website via HTTPS. A malicious attacker positioned on the network as a man-in-the-middle actively attacks the session by injecting content into the stream to exploit this vulnerability and a second vulnerability (to bypass the browser’s same origin policy) resulting in content from the HTTPS session being leaked to the attacker. Important 3 Exploit code for information disclosure is already available. However, this vulnerability cannot be leveraged for code execution. See this SRD blog post for more background on the vulnerability.
MS12-007(Anti-XSS Library) Web application expecting the anti-XSS library to sanitize content by removing script might inadvertently consume a string containing script. Important 3 This vulnerability cannot be leveraged for code execution.
MS12-001(Kernel) If an attacker is able to (separately) discover a code execution vulnerability in an application developed using Visual C++ 2003 RTM, it may be less difficult than it otherwise would be to subsequently develop an exploit due to SafeSEH not being enforced. Important 3 This vulnerability cannot be leveraged for code execution. See this SRD blog post for more background on the vulnerability.

- Jonathan Ness, MSRC Engineering


Related Posts

How satisfied are you with the MSRC Blog?

Rating

Feedback * (required)

Your detailed feedback helps us improve your experience. Please enter between 10 and 2,000 characters.

Thank you for your feedback!

We'll review your input and work on improving the site.