Original Publication Date: 13-11-2014
Microsoft published its monthly Security Bulletin on October 14, 2014. Eight (8) bulletins were released that addressed a total of Twenty Four (24) vulnerabilities. The bulletins described vulnerabilities in Microsoft Windows, Microsoft Office and Internet Explorer. The vulnerabilities could allow an attacker to execute arbitrary code, security feature bypass, or elevation of privilege.
Cyberoam Threat Research Labs is currently studying the vulnerabilities. The Security Advisory will be updated as additional information is available.
The following table provides general information on the vulnerabilities described in the Microsoft Security Bulletins.
Microsoft Security Bulletin ID
Cumulative Security Update for Internet Explorer (2987107)
An attacker who successfully exploited these vulnerabilities could elevate privileges in affected versions of Internet Explorer.
Vulnerabilities in .NET Framework Could Allow Remote Code Execution (3000414)
An attacker who successfully exploited this vulnerability could take complete control of the affected system. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Vulnerability in Kernel-Mode Driver Could Allow Remote Code Execution (3000061)
An attacker could exploit this vulnerability by running a specially crafted application on an affected system. This could be achieved through obtaining valid logon credentials and logging on to the system or convincing a logged on, authenticated, user to execute an application on the attacker’s behalf.
Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass (2990942)
In a web-based attack scenario, an attacker could convince the user to visit a webpage that contains specially crafted content designed to exploit the vulnerability.
Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869)
User interaction is required to exploit this vulnerability. For an attack to be successful by sending an email message to a locally logged-on user, the user must open an attachment that contains a specially crafted OLE object. Many different types of attached documents can contain the affected OLE objects. All Office file types as well as many other third-party file types could contain a malicious OLE object.
Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434)
Vulnerability in Message Queuing Service Could Allow Elevation of Privilege (2993254)
An attacker could exploit this vulnerability by sending a specially crafted IOCTL request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system.
Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege (2998579)
An unauthenticated attacker could attack a system locally by inserting a specially crafted USB drive into the system.
13 November 2014
Initial public release containing information on the the vulnerabilities described in the Microsoft Security Bulletins.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.