Microsoft Security Updates July 2010 - gHacks Tech News

Microsoft Security Updates July 2010

Microsoft has just released four security bulletins on this months' Patch Tuesday fixing vulnerabilities in Microsoft software products. Three of the four bulletins have a maximum severity rating of critical, the highest rated, while one is rated as important.

Affected software includes several Microsoft operating systems and Microsoft Office, take a look at the listing below for additional details on every security bulletin released today.

  • Microsoft Security Bulletin MS10-042 - Critical
    Vulnerability in Help and Support Center Could Allow Remote Code Execution (2229593) - This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message.
  • Microsoft Security Bulletin MS10-043 - Critical
    Vulnerability in Canonical Display Driver Could Allow Remote Code Execution (2032276) - This security update resolves a publicly disclosed vulnerability in the Canonical Display Driver (cdd.dll). Although it is possible that the vulnerability could allow code execution, successful code execution is unlikely due to memory randomization. In most scenarios, it is much more likely that an attacker who successfully exploited this vulnerability could cause the affected system to stop responding and automatically restart.
  • Microsoft Security Bulletin MS10-044 - Critical
    Vulnerabilities in Microsoft Office Access ActiveX Controls Could Allow Remote Code Execution - This security update resolves two privately reported vulnerabilities in Microsoft Office Access ActiveX Controls. The vulnerabilities could allow remote code execution if a user opened a specially crafted Office file or viewed a Web page that instantiated Access ActiveX controls. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Microsoft Security Bulletin MS10-045 - Important
    Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution (978212) - This security update resolves a privately reported vulnerability. The vulnerability could allow remote code execution if a user opened an attachment in a specially crafted e-mail message using an affected version of Microsoft Office Outlook. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights
microsoft security updates
microsoft security updates
microsoft patch day
microsoft patch day deployment priority

Affected software:

  • MS10-042 - Windows XP, Windows XP Pro 64-bit, Windows Server 2003, Windows Server 2003 64-bit
  • MS10-043 - Windows 7 for x64-based Systems, Windows Server 2008 R2 for x64-based Systems
  • MS10-044 - Microsoft Office 2003 , Microsoft Office 2007
  • MS10-045 - Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2007

All vulnerabilities allow remote code execution on compromised systems. Additional information about this months' patches are available at the Technet blog post.

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:

Comments

  1. Paul(us) said on July 14, 2010 at 1:22 am
    Reply

    Hoi Martin thanks a lot for this fairy extensive and greatly helpful explanation of this month MS updates. What i really like are the pictures you implemented, ferry handy that i can open them in a new tab.

    1. Martin said on July 14, 2010 at 8:58 am
      Reply

      You are welcome Paulus ;)

  2. Crodol said on July 14, 2010 at 8:01 am
    Reply

    Almost everyone is recommending to install the updates, especially if the vulnerabilities are sever and exploitable… Now the question, did anyone of you readers ever become a victim (loose data or have any other problem) from something that could have been avoided if the system were updated???

    Somehow I have the feeling that it’s a waste of time to update the operating system all the time…

    1. Martin said on July 14, 2010 at 8:57 am
      Reply

      Crodol, you should always update. The change to become a victim depends on several factors, especially if an exploit is in the wild and how it is targeting computer systems. The worst case is an automated large scale attack. There is obviously a chance that you will never get hit even if you do not update, but then again, I would not want to take that chance.

  3. Hammet said on July 14, 2010 at 2:50 pm
    Reply
    1. Martin said on July 14, 2010 at 6:24 pm
      Reply

      And I have linked to it.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

Please note that your comment may not appear immediately after you post it.