Microsoft Patch Tuesday Roundup - November 2011
The most interesting, and concerning, vulnerability patched this month is the remote TCP/IP code execution flaw fixed with MS11-083. The flaw can be triggered by sending a large number of UDP packets to a non-listening port on a remote host. There are several ways in which this could happen very easily, such as a poorly configured firewall, or an open port on a firewall that is allowing traffic the host is no longer listening on. The Microsoft Security and Defense team put together an article to gauge exploitability, and gave it a "2". I'm not sure that helps a whole lot, but if there is one thing that is certain, attackers will be looking to create an exploit for this flaw ASAP.
To help evaluate the vulnerabilities addressed by Microsoft’s Patch Tuesday, Tenable's Research team has published Nessus plugins for each of the security bulletins issued this month:
- MS11-083 - Nessus Plugin ID 56736 (Credentialed Check)
- MS11-084 - Nessus Plugin ID 56737 (Credentialed Check)
- MS11-085 - Nessus Plugin ID 56738 (Credentialed Check)
- MS11-085 - Nessus Plugin ID 56739 (Credentialed Check)
- Microsoft Security Bulletin Summary for November 2011
- OSVDB Microsoft Bulletins - Complete Reference
- Microsoft hosts BlueHatv11, releases four bulletins
Are You Vulnerable to the Latest Exploits?
Enter your email to receive the latest cyber exposure alerts in your inbox.