Microsoft announced the release of a series of patches aimed at eliminating vulnerabilities in their products. Reported
earlier in the pre-release (July 4), security fixes cover a total of 35 unique vulnerabilities (6 fixes with the Critical status and 1 with the Important status). Detailed report you can find
here .
Critical update MS13-055 is aimed at eliminating vulnerabilities like
Remote Code Execution , which are present in all versions of Internet Explorer, starting with version 6 and ending with the latest IE 10 (for all Windows XP operating systems - 8 - RT, x32 and x64, for OS server versions like Moderate). Another critical update
MS13-052 is aimed at eliminating the vulnerabilities of Remote Code Execution in the
Silverlight platform and.
NET Framework (for all Windows XP - 8 - RT, x32 and x64).
The company announced a fix for LPE 0day vulnerability CVE-2013-3660 (
MS13-055 ), which we
wrote about in more detail in our last post on patch tuesday.
')
Within several updates (MS13-052, MS13-053, MS13-054), the company fixes the CVE-2013-3129 vulnerability that is present in the code of various components (the
.NET Framework ,
Silverlight and the Win32 subsystem driver,
win32k.sys ) during processing TrueType font files. A specially crafted TrueType file, when opened, may result in the remote execution of arbitrary code in the system (RCE). In this case, an attacker can gain complete control over the compromised system.
MS13-052 fixes 7 vulnerabilities in the
.NET Framework and
Microsoft Silverlight 5 (RCE). CVE-2013-3129, CVE-2013-3131, CVE-2013-3132, CVE-2013-3133, CVE-2013-3134, CVE-2013-3171, CVE-2013-3178.
MS13-053 fixes 8 vulnerabilities in the OS kernel (
win32k.sys ) such as Remote Code Execution and Elevation of Privilege (RCE). CVE-2013-1300, CVE-2013-1340, CVE-2013-1345, CVE-2013-3129, CVE-2013-3167, CVE-2013-3172, CVE-2013-3173, CVE-2013-3660.
MS13-054 fixes the CVE-2013-3129 vulnerability when processing font files in the OS itself, in Office, Visual Studio and Lync (RCE) products.
Exploit code likely .
MS13-055 fixes 17 vulnerabilities in Internet Explorer of type memory corruption (RCE). An attacker can remotely execute arbitrary code on the system through a specially crafted web page. The update covers all versions of IE.
MS13-056 fixes the cross-platform (XP-7) RCE vulnerability CVE-2013-3174 in the
DirectShow component of the OS, which can be exploited by attackers using a specially crafted graphical GIF file.
Exploit code likely .
MS13-057 fixes cross-platform (XP-7-RT) RCE vulnerability CVE-2013-3127 in the Windows Media Format Runtime Library component (wmvdecod.dll). Attackers can exploit the vulnerability through a specially crafted file for a Windows Media application.
Exploit code would be difficult to build .
MS13-058 fixes the CVE-2013-3154 Elevation of Privilege type vulnerability in MS Defender (release of Windows 7). CVE-2013-3154.
Exploit code likely .
1 -
Exploit code likelyThe probability of exploiting the vulnerability is very high, attackers can use an exploit, for example, for remote code execution.
2 -
Exploit code would be difficult to buildThe exploitation probability is average, since attackers are unlikely to be able to achieve a situation of sustainable exploitation, as well as due to the technical peculiarities of vulnerability and the complexity of developing an exploit.
3 -
Exploit code unlikelyThe exploitation probability is minimal and attackers are unlikely to be able to develop successfully working code and take advantage of this vulnerability to conduct an attack.
We recommend that our users install updates as soon as possible and, if you have not already done so, enable automatic delivery of updates using Windows Update (this option is enabled by default).

be secure.