{"id":144865,"date":"2013-12-11T01:10:00","date_gmt":"2013-12-11T00:10:00","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=144865"},"modified":"2022-09-28T14:56:29","modified_gmt":"2022-09-28T12:56:29","slug":"microsoft-security-bulletin-december-2013","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2013\/12\/11\/microsoft-security-bulletin-december-2013\/","title":{"rendered":"Patchday: Microsoft Security Bulletin December 2013 &#8211; Adobe flickt auch"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border: 0px;\" title=\"win7\" alt=\"win7\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2012\/03\/win7_thumb1.jpg\" width=\"44\" height=\"42\" align=\"left\" border=\"0\" \/> Microsoft hat mal wieder ein Sicherheits-Bulletin zum Dezember Patchday mit Informationen zu den zu schlie\u00dfenden Sicherheitsl\u00fccken in Windows, Office, Lync, Internet Explorer, Exchange, SharePoint und ASP.NET herausgegeben. \u00a0Von den 11 Patches sind 5 als kritisch eingestuft.\u00a0Zudem hat auch Adobe wieder flei\u00dfig gepatcht.<\/p>\n<p><!--more--><\/p>\n<h3>Patchday bei Microsoft<\/h3>\n<p>Die Details zum Dezember-Patchday finden sich auf <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms13-dec\" target=\"_blank\" rel=\"noopener\">dieser Website<\/a>. Insgesamt ver\u00f6ffentlicht Microsoft 11 Patches, die zahlreiche Sicherheitsl\u00fccken in Windows, Office, Lync, Internet Explorer, Exchange, SharePoint und ASP.NET schlie\u00dfen.<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=344108\" target=\"_blank\" rel=\"noopener\">MS13-096<\/a>: <strong>Vulnerability in Microsoft Graphics Component Could allow Remote Code Execution <\/strong><strong>(2908005<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves a publicly disclosed vulnerability in Microsoft Windows, Microsoft Office, and Microsoft Lync. The vulnerability could allow remote code execution if a user views content that contains specially crafted TIFF files.<br \/>\nCritical Remote Code Execution &#8211; May require restart<br \/>\nMicrosoft Windows, Microsoft Office, Microsoft Lync<\/p>\n<blockquote><p>Anmerkung: Dieser Patch schlie\u00dft die TIFF-L\u00fccke, die ich <a href=\"https:\/\/borncity.com\/blog\/2013\/11\/06\/sicherheitslcke-in-windows-vista-server-2008-office-2003-2010-und-lync\/\">hier schon mal adressiert <\/a>hatte.<\/p><\/blockquote>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=344111\">MS13-097<\/a>: <strong>Cumulative Security Update for Internet Explorer (2898785<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves seven privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br \/>\nCritical &#8211; Remote Code Execution &#8211; Requires restart<br \/>\nMicrosoft Windows, Internet Explorer<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=325389\">MS13-098<\/a>: <strong>Vulnerability in Windows <\/strong><strong>Could Allow Remote Code Execution (2893294<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user or application runs or installs a specially crafted, signed portable executable (PE) file on an affected system.<br \/>\nCritical &#8211; Remote Code Execution &#8211; Requires restart<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=344112\">MS13-099<\/a>: <strong>Vulnerability in Microsoft Scripting Runtime Object Library Could Allow Remote Code Execution (2909158)<\/strong><strong> <\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker convinces a user to visit a specially crafted website or a website that hosts specially crafted content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<br \/>\nCritical &#8211; Remote Code Execution &#8211; May require restart<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=329830\">MS13-105<\/a>: <strong>Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution <\/strong><strong>(<\/strong><strong>2915705<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves three publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft Exchange Server. The most severe of these vulnerabilities exist in the WebReady Document Viewing and Data Loss Prevention features of Microsoft Exchange Server. These vulnerabilities could allow remote code execution in the security context of the LocalService account if an attacker sends an email message containing a specially crafted file to a user on an affected Exchange server. The LocalService account has minimum privileges on the local system and presents anonymous credentials on the network.<br \/>\nCritical &#8211; Remote Code Execution &#8211; Does not require restart &#8211; Microsoft Exchange<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=329771\">MS13-100<\/a>: <strong>Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2904244)<\/strong><strong> <\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves multiple privately reported vulnerabilities in Microsoft Office server software. These vulnerabilities could allow remote code execution if an authenticated attacker sends specially crafted page content to a SharePoint server. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the security context of the W3WP service account on the target SharePoint site.<br \/>\nImportant &#8211; Remote Code Execution &#8211; May require restart<br \/>\nMicrosoft SharePoint<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=325387\">MS13-101<\/a>: <strong>Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege <\/strong><strong>(2880430<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves five privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.<br \/>\nImportant &#8211; Elevation of Privilege &#8211; Requires restart<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=344110\">MS13-102<\/a>: <strong>Vulnerability in LRPC Client Could Allow Elevation of Privilege<\/strong><strong> (<\/strong><strong>2898715<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker spoofs an LRPC server and sends a specially crafted LPC port message to any LRPC client. An attacker who successfully exploited the vulnerability could then install programs; view, change, or delete data; or create new accounts with full administrator rights. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.<br \/>\nImportant &#8211; Elevation of Privilege &#8211; Requires restart<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=329969\">MS13-103<\/a>: <strong>Vulnerability in <\/strong><strong>ASP.NET <\/strong><strong>SignalR<\/strong><strong> Could A<\/strong><strong>llow Elevation of Privilege (2905244<\/strong><strong>)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves a privately reported vulnerability in ASP.NET SignalR. The vulnerability could allow elevation of privilege if an attacker reflects specially crafted JavaScript back to the browser of a targeted user.<br \/>\nImportant &#8211; Elevation of Privilege &#8211; Does not require restart<br \/>\nMicrosoft Developer Tools<\/p>\n<p>MS13-104: <strong>Vulnerability in Microsoft Office Could Allow Information Disclosure (2909976)<\/strong><strong> <\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves one privately reported vulnerability<strong> <\/strong>in Microsoft Office that could allow information disclosure if a user attempts to open an Office file hosted on a malicious website. An attacker who successfully exploited this vulnerability could ascertain access tokens used to authenticate the current user on a targeted SharePoint or other Microsoft Office server site.<br \/>\nImportant &#8211; Information Disclosure &#8211; May require restart<br \/>\nMicrosoft Office<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=329967\">MS13-106<\/a>: <strong>Vulnerability in a Microsoft Office Shared Component Could Allow Security Feature <\/strong><strong>Bypass <\/strong><strong>(2905238)<\/strong><strong><br \/>\n<\/strong><strong><br \/>\n<\/strong>This security update resolves one publicly disclosed vulnerability<strong> <\/strong>in a Microsoft Office shared component that is currently being exploited. The vulnerability could allow security feature bypass if a user views a specially crafted webpage in a web browser capable of instantiating COM components, such as Internet Explorer. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability that could take advantage of the ASLR bypass to run arbitrary code.<br \/>\nImportant &#8211; Security Feature Bypass &#8211; May require restart<br \/>\nMicrosoft Office<\/p>\n<h3><span style=\"color: #000000; font-size: 1.4em; line-height: 1.5em;\">Bei Adobe wird auch gepatcht<\/span><\/h3>\n<p>Auch die Firma Adobe hat am 10.12.2013 ihren Patchday gehabt. Laut <a href=\"http:\/\/www.heise.de\/newsticker\/meldung\/Patchday-Microsoft-und-Adobe-schliessen-kritische-Luecken-2063843.html\" target=\"_blank\" rel=\"noopener\">heise.de<\/a>\u00a0ver\u00f6ffentlichte Adobe neue Versionen von Flash, Shockwave und AIR.\u00a0Bei Flash beseitigen die 11.9.900.170 f\u00fcr Windows und Mac und 11.2.202.332 f\u00fcr Linux Sicherheitsl\u00fccken. \u00c4hnliches gilt f\u00fcr\u00a0Shockwave-Version 12.0.7.148. Einige zus\u00e4tzliche Hinweise finden sich <a href=\"http:\/\/www.heise.de\/newsticker\/meldung\/Patchday-Microsoft-und-Adobe-schliessen-kritische-Luecken-2063843.html\" target=\"_blank\" rel=\"noopener\">hier bei heise.de<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft hat mal wieder ein Sicherheits-Bulletin zum Dezember Patchday mit Informationen zu den zu schlie\u00dfenden Sicherheitsl\u00fccken in Windows, Office, Lync, Internet Explorer, Exchange, SharePoint und ASP.NET herausgegeben. \u00a0Von den 11 Patches sind 5 als kritisch eingestuft.\u00a0Zudem hat auch Adobe wieder &hellip; <a href=\"https:\/\/borncity.com\/blog\/2013\/12\/11\/microsoft-security-bulletin-december-2013\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[],"class_list":["post-144865","post","type-post","status-publish","format-standard","hentry","category-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/144865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=144865"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/144865\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=144865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=144865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=144865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}