Microsoft has released a series of updates for its products, which close 31 unique vulnerabilities (4 fixes with Critical status and 3 fixes with Important status). The extended vulnerability notification notice released on February 6th did not contain information about updates for the Internet Explorer browser. However, yesterday Microsoft included two critical fixes (Internet Explorer & VBScript flaw) on Patch Tuesday, one of which
MS14-010 closes 24 Remote Code Execution (RCE) vulnerabilities in all versions of IE6-11 on WinXP-8.1 x32 / x64. The second
MS14-011 fixes the critical RCE vulnerability (VBScript Scripting Engine) in all versions of WinXP-8.1 OS. A reboot is required to apply fixes.

A detailed report on closed vulnerabilities, product components and their versions can be found on the corresponding
page of security bulletins. Updates cover vulnerabilities in Windows, Internet Explorer, .NET Framework and Security Software. Note that earlier, last week, MS updated the Flash Player as part of IE10 + through Windows Update to close CVE-2014-0497 (Adobe APSB14-04).
')
Last week we
wrote about Pwn2Own 2014, in which participants are invited to remotely execute code through Internet Explorer 11 x64 on Windows 8.1 x64 with EMET enabled, and then elevate their privileges to system ones. One of the security rewriters,
0xdabbad00, indicated in his post that, in reality, the EMET settings are mostly useless in the case of IE10 + x64, since most of them are already included in Windows 8 x64. Thus, in fact, through EMET it is better to protect the 32-bit version of IE (or other similar software).

Fig. EMET vs. x64 MS-compiled files on Win8 / 8.1 x64, screenshot from the blog
0xdabbad00 .

For users, this information does not carry a significant payload, since we still
recommend using EMET as a free means of protection against exploits, including on Windows 8+ x64 . To date, not all browsers or software use native 64-bit modules (Google Chrome has sandbox capabilities, but comes only in the 32-bit version, Mozilla Firefox also does not have 64-bit Windows support), not to mention
support HEASLR ( / HIGHENTROPYVA).
February 11 is the Internet for 2014. This year, we’re online. While I’m suggesting that I’ve been reading this, I’m guessing that I’m reading my opinion. The version of the Enhanced Mitigation Experience Toolkit (EMET).
MicrosoftThe
MS14-010 update closes 24 vulnerabilities in all versions of Internet Explorer 6-11. Vulnerabilities are of the type Remote Code Execution (memory-corruption) and can be used by attackers for remote code delivery via a specially crafted web page (drive-by). One of the vulnerabilities CVE-2014-0268 can be used by attackers to increase their privileges in the system (Elevation of Privilege). Critical.
Update
MS14-011 closes the RCE vulnerability CVE-2014-0271, which is present in all versions of Windows XP - 8.1 x32 / x64. The vulnerability is present in the VBScript engine component (v.5.6 - 5.8) and allows attackers to remotely execute code through a browser (Internet Explorer). Critical.
Exploit code would be difficult to build .
Update
MS14-007 closes the RCE vulnerability CVE-2014-0263 (memory-corruption) in the Direct2D component on Windows 7 - 8 - 8.1 / RT 8.1. Vulnerability can be used by hackers to remotely deliver code through Internet Explorer. Critical.
Exploit code likely .
The
MS14-008 update fixes the RCE vulnerability CVE-2014-0294 in the Microsoft Forefront Protection for Exchange 2010 product. Attackers can execute arbitrary code in the system by sending a specially generated mail message (if MS Forefront Protection is active in the system). Critical.
Exploit code likely .
The
MS14-009 update fixes two vulnerabilities of the Elevation of Privilege type in all versions of the .NET Framework 1.0 SP3 - 4.5.1 component on all WinXP-8.1 OS and one Security Type Bypass vulnerability CVE-2014-0295 (ASLR improvements for vsavb7rt.dll) . Vulnerabilities can be exploited through specially formed web pages, while attackers can upgrade their privileges to system ones. Important.
CVE-2014-0295 is operated in-the-wild .
Update
MS14-005 fixes one Information Information Disclosure vulnerability CVE-2014-0266 in Microsoft XML Core Services 3.0. Important.
Vulnerability is exploited in-the-wild .
Update
MS14-006 fixes the CVE-2014-0254 type Denial of Service vulnerability in the TCP / IP Version 6 (IPv6) subsystem, attackers can cause the target system to hang (Windows 8 / RT) by sending a large number of specially crafted IPv6 packets. Important.
Exploit code unlikely .
1 - Exploit code likelyThe probability of exploiting the vulnerability is very high, attackers can use an exploit, for example, for remote code execution.
2 - Exploit code would be difficult to buildThe exploitation probability is average, since attackers are unlikely to be able to achieve a situation of sustainable exploitation, as well as due to the technical peculiarities of vulnerability and the complexity of developing an exploit.
3 - Exploit code unlikelyThe exploitation probability is minimal and attackers are unlikely to be able to develop successfully working code and take advantage of this vulnerability to conduct an attack.
We recommend our users to install updates as soon as possible and, if you have not already done so, enable automatic delivery of updates using Windows Update (by default this option is enabled).

be secure.