Multiple Mircosoft Security Bulletins

Microsoft has released nine bulletins to address multiple vulnerabilities.

Four bulletins have a rating of “critical” and affect Windows XP, Windows 2003 and Vista, but Windows 7 and Windows Server 2008 R2 are not affected by three of the four critical vulnerabilities. There will be no security updates for Windows XP SP2 users, even though most updates for XP SP3 are likely to apply to SP2. As ever, XP SP2 users are advised to upgrade to SP3.

This advisory contains information released by Microsoft. Some of the information may have changed since it was released, please see http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx for further information and software update locations.

Critical: Vulnerability in Print Spooler Service Could Allow Remote Code Execution

The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system.

Critical: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution

The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution

The vulnerability could allow remote code execution if a user viewed a specially crafted document or Web page with an application that supports embedded OpenType fonts. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution

The most severe of these vulnerabilities could allow remote code execution if a client sends a specially crafted HTTP request to the server. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

Important: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution

This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.

The vulnerability could allow remote code execution if an attacker sent a specially crafted RPC response to a client-initiated RPC request. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker must convince the user to initiate an RPC connection to a malicious server under the attacker’s control. An attacker could not remotely exploit this vulnerability without user interaction.

Important: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution

This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.

The vulnerability could allow remote code execution if a user opened a specially crafted file using WordPad. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege

The vulnerability could allow elevation of privilege if an authenticated attacker sent specially crafted Lightweight Directory Access Protocol (LDAP) messages to a listening LSASS server. In order to successfully exploit this vulnerability, an attacker must have a member account within the target Windows domain. However, the attacker does not need to have a workstation joined to the Windows domain.

Important: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege

This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.

The vulnerability could allow elevation of privilege if an attacker logged on to an affected system that is configured with a Chinese, Japanese, or Korean system locale. An attacker who successfully exploited this vulnerability could then install programs; view, change, or delete data; or create new accounts with full user rights.