Home > Microsoft Security > Microsoft Security Patches November 2011

Microsoft Security Patches November 2011

System Center Configuration Manager 2007 Configuration Manager 2007 Software Update Management simplifies the complex task of delivering and managing updates to IT systems across the enterprise. Saturday – Sunday 12:00 noon – 6:00 p.m. Includes all Windows content. How do I use these tables? have a peek here

Important Elevation of PrivilegeRequires restartMicrosoft Windows MS11-098 Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2633171) This security update resolves a privately reported vulnerability in Microsoft Windows. Important Elevation of PrivilegeMay require restartMicrosoft Windows MS11-062 Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege (2566454) This security update resolves a privately reported vulnerability in all supported For more information about how administrators can use Configuration Manager 2007 to deploy updates, see Software Update Management. Security Strategies and Community Update Management Strategies Security Guidance for Update Management provides additional information about Microsoft’s best-practice recommendations for applying security updates.

Note for MS11-0 90 [1]This specific operating system is not affected by the vulnerability described in this bulletin. However, as a defense-in-depth measure, Microsoft recommends that customers of this software apply this security update. The vulnerabilities are listed in order of bulletin ID then CVE ID. The vulnerability could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request.

You should review each of the assessments below, in accordance with your specific configuration, in order to prioritize your deployment. Note for MS11-0 99 [1]Severity ratings do not apply to this update for the specified software because the known attack vectors for the vulnerability discussed in this bulletin are blocked in Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.

For more information about how administrators can use Configuration Manager 2007 to deploy updates, see Software Update Management. For more information, see Microsoft Security Bulletin Summaries and Webcasts. Non-Security Updates on MU, WU, and WSUS For information about non-security releases on Windows Update and Microsoft Update, please see: Microsoft Knowledge Base Article 894199: Description of Software Update Services and https://technet.microsoft.com/en-us/library/security/ms11-feb.aspx For more information about how to deploy this security update using Windows Server Update Services, visit Windows Server Update Services.

An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. We appreciate your feedback. See also other software categories under this section, Affected Software and Download Locations, for more update files under the same bulletin identifier. Obtaining Other Security Updates Updates for other security issues are available from the following locations: Security updates are available from Microsoft Download Center.

Windows Server Update Services By using Windows Server Update Services (WSUS), administrators can quickly and reliably deploy the latest critical updates and security updates for Microsoft Windows 2000 operating systems and https://technet.microsoft.com/en-us/library/security/ms11-aug.aspx For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options. **Server Core installation The vulnerability could allow remote code execution if a user visits a Web site containing a specially crafted Windows Metafile (WMF) image.

The vulnerability could not be exploited remotely or by anonymous users. navigate here IT Service Center 303-735-4357 (5-HELP) [email protected] Monday – Friday 7:30 a.m. – 7:00 p.m. For information about SMS, visit the Microsoft Systems Management Server TechCenter. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion

For more information about what these ratings mean, and how they are determined, please see Microsoft Exploitability Index. For more information, see Microsoft Knowledge Base Article 913086. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes Check This Out The TechNet Security Center provides additional information about security in Microsoft products.

Bulletin IDVulnerability TitleCVE IDExploitability Index AssessmentKey Notes MS11-016 Microsoft Groove Insecure Library Loading Vulnerability CVE-2010-3146 1 - Consistent exploit code likely This vulnerability has been disclosed publicly and PoC code may Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. With Configuration Manager 2007, IT administrators can deliver updates of Microsoft products to a variety of devices including desktops, laptops, servers, and mobile devices.

For information about SMS, visit the Microsoft Systems Management Server TechCenter.

Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information on product lifecycles, visit Microsoft Support Lifecycle. Servers that do not have the DNS role enabled are not at risk. Important Remote Code ExecutionMay require restartMicrosoft Windows MS11-094 Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2639142) This security update resolves twoprivately reported vulnerabilities in Microsoft Office.

For customers of Microsoft Office for Mac, Microsoft AutoUpdate for Mac can help keep your Microsoft software up to date. Microsoft also provides information to help customers prioritize monthly security updates with any non-security updates that are being released on the same day as the monthly security updates. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query http://technologyprometheus.com/microsoft-security/microsoft-security-essentials-and-whs-2011.html The TechNet Security Center provides additional information about security in Microsoft products.

Some security updates require administrative rights following a restart of the system. For more information, see the MSDN article, Installing the .NET Framework. If a software program or component is listed, then the available software update is hyperlinked and the severity rating of the software update is also listed. By searching using the security bulletin number (such as, "MS07-036"), you can add all of the applicable updates to your basket (including different languages for an update), and download to the

Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options. **Server Core installation After this date, this webcast is available on-demand. Details Version:913086File Name:Windows-KB913086-201111.isoDate Published:11/7/2011File Size:370.6 MB KB Articles: KB2544893KB2570947KB2588516KB2601626KB2616310KB2617657KB2620704Security bulletins:MS11-037MS11-071MS11-083MS11-084MS11-085MS11-086 This DVD5 ISO image file contains the security updates for Windows released on Windows Update on November 8, 2011. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

We appreciate your feedback. For customers of Microsoft Office for Mac, Microsoft AutoUpdate for Mac can help keep your Microsoft software up to date. The vulnerability could allow remote code execution if an attacker logs on to an Active Directory domain and runs a specially crafted application.