Microsoft cumulative security update for internet explorer ms10-071


















For more information about how to enable this setting in Outlook , see Microsoft Knowledge Base Article E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content. Because the message is still in Rich Text or HTML format in the store, the object model custom code solutions may behave unexpectedly. The vulnerability exists in the way that Internet Explorer handles content using specific strings when sanitizing HTML.

Are both updates necessary to be installed to be protected from the vulnerability? No, each update addresses a separate application. Only the update that corresponds with software running on your system needs to be applied. An attacker who successfully exploited this vulnerability, when a user is viewing HTML on a Web site that has not been properly sanitized by Internet Explorer, could execute script in the user's security context against a site.

To exploit this vulnerability, an attacker must have the ability to submit a specially crafted script to a target site. Due to the vulnerability, in specific situations the specially crafted script is not properly sanitized using toStaticHTML, and subsequently this could lead to attacker-supplied script being run in the security context of a user who views the malicious content on the Web site. For cross-site scripting attacks, this vulnerability requires that a user be visiting a compromised Web site for any malicious action to occur.

For instance, after an attacker has successfully submitted specially crafted script to the target site, any Web page on that site that contains the specially crafted script is a potential vector for persistent cross-site scripting attacks. When a user visits a Web page that contains the specially crafted script, the script could be run in the security context of the user on the site. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.

Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued. An attacker who successfully exploited this vulnerability, when a user is viewing HTML on a Web site that has not been properly sanitized by Internet Explorer, could execute script in the user's security context against the site.

An information disclosure vulnerability exists in the way that Internet Explorer processes CSS special characters. An attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone. The following mitigating factors may be helpful in your situation. In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability.

Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone, which disables script and ActiveX controls, removing the risk of an attacker being able to use this vulnerability to execute malicious code.

If a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.

An attacker who exploited the vulnerability when a user views a Web page could view content from another domain or Internet Explorer zone other than the domain or zone of the attacker's Web page. Internet Explorer improperly processes CSS special characters, potentially allowing disclosure of sensitive data. This update addresses the vulnerability by modifying the way that Internet Explorer handles CSS special characters. A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted.

An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system.

An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. This is a remote code execution vulnerability. When Internet Explorer attempts to access an object that has not been initialized or has been deleted, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.

An attacker who successfully exploited this vulnerability could gain the same user rights as a logged-on user. If the user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine.

In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by clicking a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site, or by opening an attachment sent through e-mail.

The update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory. An information disclosure vulnerability exists in the way that Internet Explorer improperly handles the Anchor element.

This behavior occurs during user operation when the Anchor element is not removed during content pasting and editing, potentially revealing personally identifiable information intended for deletion. Microsoft has not identified any mitigating factors for this vulnerability.

Microsoft has not identified any workarounds for this vulnerability. Potentially deleted information will remain in HTML content. This issue is not an exploitable vulnerability. Instead, it potentially exposes previously deleted content during user operation. This vulnerability requires that a user be logged on and utilizing the browser for HTML content creation.

The update addresses the vulnerability by modifying the way that Internet Explorer handles the Anchor element. A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted when a document in an HTML format is opened in Microsoft Word. An attacker could exploit the vulnerability by convincing the user to open a malicious Word document.

When a user closes the document, the vulnerability could allow remote code execution. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must open an attachment that is sent in an e-mail message. Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly.

Use Registry Editor at your own risk. For detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article Follow the steps in this article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.

Then, save the file by using the. Windows Registry Editor Version 5. You can apply this. You can also apply it across domains by using Group Policy. Impact of Workaround. There is no impact as long as the object is not intended to be used in Internet Explorer. How to undo the workaround.

Delete the registry keys previously added in implementing this workaround. When Internet Explorer attempts to access an object that has not been initialized or has been deleted when Microsoft Word has been closed, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.

An attacker can send a user a specially crafted Word document that is designed to exploit this vulnerability through Microsoft Word and convince the user to view the Word document.

This issue cannot be exploited directly through Internet Explorer. This vulnerability requires that a user be logged on and open a malicious Word document for any malicious action to occur. Therefore, any systems where Microsoft Word is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability. The update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory.

An information disclosure vulnerability exists in the way that Internet Explorer improperly handles the Anchor element. This behavior occurs during user operation when the Anchor element is not removed during content pasting and editing, potentially revealing personally identifiable information intended for deletion.

Potentially deleted information will remain in HTML content. This issue is not an exploitable vulnerability. Instead, it potentially exposes previously deleted content during user operation. This vulnerability requires that a user be logged on and utilizing the browser for HTML content creation.

The update addresses the vulnerability by modifying the way that Internet Explorer handles the Anchor element. A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted when a document in an HTML format is opened in Microsoft Word.

An attacker could exploit the vulnerability by convincing the user to open a malicious Word document. When a user closes the document, the vulnerability could allow remote code execution. Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly.

Use Registry Editor at your own risk. For detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article Follow the steps in this article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.

Then, save the file by using the. Windows Registry Editor Version 5. You can apply this. You can also apply it across domains by using Group Policy. For more information about Group Policy, visit the following Microsoft Web sites:. Impact of Workaround.

There is no impact as long as the object is not intended to be used in Internet Explorer. How to undo the workaround. Delete the registry keys previously added in implementing this workaround. When Internet Explorer attempts to access an object that has not been initialized or has been deleted when Microsoft Word has been closed, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.

An attacker can send a user a specially crafted Word document that is designed to exploit this vulnerability through Microsoft Word and convince the user to view the Word document. This issue cannot be exploited directly through Internet Explorer. This vulnerability requires that a user be logged on and open a malicious Word document for any malicious action to occur. Therefore, any systems where Microsoft Word is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.

An information disclosure vulnerability exists in Internet Explorer that could allow script to gain access to information in another domain or Internet Explorer zone. An attacker who exploited the vulnerability when a user views a Web page could view content from a different domain or Internet Explorer zone other than the domain or zone of the attacker's Web page.

During certain processes, Internet Explorer incorrectly allows scripts to access and read content from different domains. The update addresses the vulnerability by modifying the way that Internet Explorer handles script during certain processes. An attacker could exploit the vulnerability by convincing a user to view a specially crafted Word document.

When a user closes the Word document, the vulnerability could allow remote code execution. Note Modifying the Registry incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from incorrect modification of the Registry can be solved.

Modify the Registry at your own risk. Note In order to use 'FileOpenBlock' with the Microsoft Office system, all of the latest security updates for the Microsoft Office system must be applied. Users who have configured the File Block policy and have not configured a special "exempt directory" as discussed in Microsoft Knowledge Base Article will be unable to open Office files or earlier versions in Office or Microsoft Office System.

This vulnerability requires that a user be logged on and opening a malicious Word document for an attack to occur. Manage the software and security updates you need to deploy to the servers, desktop, and mobile systems in your organization. Security updates are also available from the Microsoft Download Center. You can find them most easily by doing a keyword search for "security update.

Finally, security updates can be downloaded from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content made available through Windows Update and Microsoft Update, including security updates, drivers and service packs. By searching using the security bulletin number such as, "MS" , you can add all of the applicable updates to your basket including different languages for an update , and download to the folder of your choosing.

Microsoft provides detection and deployment guidance for security updates. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article Microsoft Baseline Security Analyzer MBSA allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations.

Windows Server Update Services WSUS enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system.

For SMS 2. See also Downloads for Systems Management Server 2. See also Downloads for Systems Management Server For more detailed information, see Microsoft Knowledge Base Article : Summary list of monthly detection and deployment guidance articles.

Updates often write to the same files and registry settings required for your applications to run. This can trigger incompatibilities and increase the time it takes to deploy security updates. You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit.

The Application Compatibility Toolkit ACT contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Microsoft Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment. For information about the specific security update for your affected software, click the appropriate link:.

The following table contains the security update information for this software. You can find additional information in the subsection, Deployment Information , in this section. Note For supported versions of Windows XP Professional x64 Edition, this security update is the same as supported versions of the Windows Server x64 Edition security update. When you install this security update, the installer checks whether one or more of the files that are being updated on your system have previously been updated by a Microsoft hotfix.

Security updates may not contain all variations of these files. For more information about this behavior, see Microsoft Knowledge Base Article For more information about the installer, visit the Microsoft TechNet Web site. For more information about the terminology that appears in this bulletin, such as hotfix , see Microsoft Knowledge Base Article See the section, Detection and Deployment Tools and Guidance , earlier in this bulletin for more information.

Because there are several editions of Microsoft Windows, the following steps may be different on your system. If they are, see your product documentation to complete these steps.

You may also be able to verify the files that this security update has installed by reviewing the registry keys listed in the Reference Table in this section. These registry keys may not contain a complete list of installed files. Also, these registry keys may not be created correctly when an administrator or an OEM integrates or slipstreams this security update into the Windows installation source files. When you install this security update, the installer checks to see if one or more of the files that are being updated on your system have previously been updated by a Microsoft hotfix.

Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Please rate your experience Yes No. Any additional feedback? In this article. See Microsoft Knowledge Base Article IF : Any one of the following are true.

Windows : File Test : Mshtml. Windows : File The path to the mshtml. IF : Mshtml. Quick Help References To Objects [[.. What is a State? What is a Test? Other Help Topics Regular Expression Patterns Some object or state definitions are defined as regular expression patterns, you should interpret the regexp pattern while evaluating them. How does it work? Warning: This site and all data are provided as is.

It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk.



0コメント

  • 1000 / 1000