Microsoft Security Bulletins For March 2014 overview

Martin Brinkmann
Mar 11, 2014
Updated • Mar 12, 2014
Microsoft, Windows Updates
|
6

Only one month to go before Microsoft will stop releasing public security updates for the Windows XP operating system.

On this month's patch day, we have five bulletins addressing vulnerabilities in Microsoft Windows, Internet Explorer, and Microsoft Silverlight.

Two of the bulletins have received an aggregate severity rating of critical, which means that at least one Microsoft product is affected this way. Other products may be affected in the same way, not as critical, or not at all.

The remaining three bulletins have received a severity rating of important, the second highest rating for vulnerabilities.

Below you find information needed to resolve these vulnerabilities on affected systems.

We highlight the operating system distribution, link to all bulletins and additional updates that Microsoft has released this month, provide you with a deployment guideline, and describe how you can download and install those updates on affected systems.

Executive Summary

  1. Microsoft has released five bulletins this month addressing 23 unique vulnerabilities.
  2. Affected products are Microsoft Windows, Internet Explorer, and Microsoft Silverlight.
  3. Two of the bulletins are rated critical in severity, the highest possible rating.
  4. Top deployment priority this month is MS14-012, a cumulative critical update for Internet Explorer that address 18 issues.
  5. Microsoft has seen limited attacks in the wild targeting Internet Explorer 10.

Video Summary

Operating System Distribution

Here we look at each version of the Windows operating system and how it is affected by this month's vulnerabilities.

On the client side, we have Windows XP and Windows Vista which are affected more than all other client systems. Both are affected by two critical and two important bulletins. Windows 7, Windows 8, and Windows 8.1 are affected by two critical and one important bulletin, while Windows RT and Windows RT 8.1 only by one critical and one important bulletin.

On the server side, all server versions are affected in the same way.

  • Windows XP:  2 critical, 2 important
  • Windows Vista: 2 critical, 2 important
  • Windows 7:   2 critical, 1 important
  • Windows 8:  2 critical, 1 important
  • Windows 8.1: 2 critical, 1 important
  • Windows RT: 1 critical, 1 important
  • Windows RT 8.1:  1 critical, 1 important
  • Windows Server 2003: 1 critical, 2 important, 1 moderate
  • Windows Server 2008: 1 critical, 2 important, 1 moderate
  • Windows Server 2008 R2: 1 critical, 2 important, 1 moderate
  • Windows Server 2012: 1 critical, 2 important, 1 moderate
  • Windows Server 2012 R2: 1 critical, 2 important, 1 moderate

Microsoft Developer Tools and Software

  • Microsoft Silverlight: 1 important

Deployment Guide

Microsoft publishes a deployment guide for system administrators, IT professionals, and interested end users each month.

The priority of deployment is a suggestion by the company that it bases on information such as severity of the vulnerability, exploitability, impact, and whether it is already in the wild or not.

march 2014 deployment guide

  • Tier 1 updates: MS14-012 Internet Explorer (critical)
  • Tier 2 updates: MS14-013 DirectShow (critical), MS14-014 Silverlight (important), MS14-015 KMD (important)
  • Tier 3 updates: MS14-016 SAMR (important)

Security Bulletins

  • MS14-012Cumulative Security Update for Internet Explorer (2925418) - Critical - Remote Code Execution
  • MS14-013Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (2929961)- Critical - Remote Code Execution
  • MS14-015Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2930275) - Important - Elevation of Privilege
  • MS14-016Vulnerability in Security Account Manager Remote (SAMR) Protocol Could Allow Security Feature Bypass (2934418) - Important - Security Bypass Feature
  • MS14-014Vulnerability in Silverlight Could Allow Security Feature Bypass (2932677)- Important - Security Bypass Feature

Changes to existing security content / new security content

  • Security Update for Windows 8 and Windows Server 2012 (KB2871690)
  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB2934802)
  • Revision of Security Advisory 2755801 with the latest update for Adobe Flash Player in Internet Explorer.
  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB2938527)

Non-security related updates

  • Update for Windows 8.1, Windows RT 8.1, Windows 8, and Windows RT (KB2894853)
  • Update for Windows Vista (KB2904266)
  • Update for Windows 8.1 and Windows Server 2012 R2 (KB2913760)
  • Update for Windows 7 (KB2918077)
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB2919442)
  • Dynamic Update for Windows 8.1 and Windows Server 2012 R2 (KB2920540)
  • Update for Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP (KB2922717)
  • Update for Windows Server 2003 (KB2927811)
  • Update for Windows 8, Windows RT, and Windows Server 2012 (KB2928678)
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB2928680)
  • Update for Windows 7, Windows Server 2008 R2, Windows Server 2008, and Windows Vista (KB2929733)
  • Update for Windows 8, Windows RT, Windows Server 2012, Windows 7, and Windows Server 2008 R2 (KB2929755)
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB2930157)
  • Dynamic Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB2930168)
  • Dynamic Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB2930169)
  • Dynamic Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB2930294)
  • Windows Malicious Software Removal Tool - March 2014 (KB890830)/Windows Malicious Software Removal Tool - March 2014 (KB890830) - Internet Explorer Version
  • Update for Root Certificates for Windows 8.1, Windows 8, Windows 7, Windows Vista, and Windows XP (KB931125)
  • Windows XP Home x86 and XP Professional x86 End of Support Notification (KB2934207)
  • Update for Windows 7 and Windows Server 2008 R2 (KB2923545)
  • System Update Readiness Tool for Windows 7, Windows Server 2008 R2, Windows Server 2008, and Windows Vista (KB947821) [February 2014]
  • Update for Windows 8.1 (KB2911106)

How to download and install the March 2014 security updates

Most Windows users will receive the updates via the automatic update feature of the Windows operating system. If you have not changed any update related settings, this is how you will get it as well.

Please note that you may need to check manually for updates to receive them as fast as possible, as Windows does not support real-time update checking.

If you have set your system to manual update, you need to either run the update check manually as well, or download the patches from Microsoft using the company's Download Center, or a third-party software that can do so for you.

Microsoft will release an ISO image in the coming hours that contains all security updates of the month. This too can be downloaded from the company's Download Center.

Consult our Windows Update guide to find out more about those options.

Additional information

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. Some Dude said on March 19, 2023 at 11:42 am
    Reply

    Are these articles AI generated?

    Now the duplicates are more obvious.

    1. boris said on March 19, 2023 at 11:48 pm
      Reply

      This is below AI generated crap. It is copy of Microsoft Help website article without any relevant supporting text. Anyway you can find this information on many pages.

  2. Paul(us) said on March 20, 2023 at 1:32 am
    Reply

    Yes, but why post the exact same article under a different title twice on the same day (19 march 2023), by two different writers?
    1.) Excel Keyboard Shortcuts by Trevor Monteiro.
    2.) 70+ Excel Keyboard Shortcuts for Windows by Priyanka Monteiro

    Why oh why?

    1. Clairvaux said on September 6, 2023 at 11:30 am
      Reply

      Yeah. Tell me more about “Priyanka Monteiro”. I’m dying to know. Indian-Portuguese bot ?

  3. John G. said on August 18, 2023 at 4:36 pm
    Reply

    Probably they will announce that the taskbar will be placed at top, right or left, at your will.

    Special event by they is a special crap for us.

  4. yanta said on August 18, 2023 at 11:59 pm
    Reply

    If it’s Microsoft, don’t buy it.
    Better brands at better prices elsewhere.

  5. John G. said on August 20, 2023 at 4:22 am
    Reply

    All new articles have zero count comments. :S

  6. Anonymous said on September 5, 2023 at 7:48 am
    Reply

    WTF? So, If I add one photo to 5 albums, will it count 5x on my storage?
    It does not make any sense… on google photos, we can add photo to multiple albums, and it does not generate any additional space usage

    I have O365 until end of this year, mostly for onedrive and probably will jump into google one

  7. St Albans Digital Printing Inc said on September 5, 2023 at 11:53 am
    Reply

    Photo storage must be kept free because customers chose gadgets just for photos and photos only.

  8. Anonymous said on September 5, 2023 at 12:47 pm
    Reply

    What a nonsense. Does it mean that albums are de facto folders with copies of our pictures?

    1. GG said on September 6, 2023 at 8:24 am
      Reply

      Sounds exactly like the poor coding Microsoft is known for in non-critical areas i.e. non Windows Core/Office Core.

      I imagine a manager gave an employee the task to create the album feature with hardly any time so they just copied the folder feature with some cosmetic changes.

      And now that they discovered what poor management results in do they go back and do the album feature properly?

      Nope, just charge the customer twice.

      Sounds like a go-getter that needs to be promoted for increasing sales and managing underlings “efficiently”, said the next layer of middle management.

  9. d3x said on September 5, 2023 at 7:33 pm
    Reply

    When will those comments get fixed? Was every editor here replaced by AI and no one even works on this site?

  10. Scroogled said on September 5, 2023 at 10:47 pm
    Reply

    Instead of a software company, Microsoft is now a fraud company.

  11. ard said on September 7, 2023 at 4:59 pm
    Reply

    For me this is proof that Microsoft has a back-door option into all accounts in their cloud.
    quote “…… as the MSA key allowed the hacker group access to virtually any cloud account at Microsoft…..”
    unquote

    so this MSA key which is available to MS officers can give access to all accounts in MS cloud.This is the backdoor that MS has into the cloud accounts. Lucky I never got any relevant files of mine in their (MS) cloud.

  12. Andy Prough said on September 7, 2023 at 6:52 pm
    Reply

    >”Now You: what is your theory?”

    That someone handed an employee a briefcase full of cash and the employee allowed them access to all their accounts and systems.

    Anything that requires 5-10 different coincidences to happen is highly unlikely. Occam’s razor.

  13. TelV said on September 8, 2023 at 12:04 pm
    Reply

    Good reason to never login to your precious machine with a Microsoft a/c a.k.a. as the cloud.

  14. Anonymous said on September 18, 2023 at 1:23 pm
    Reply

    The GAFAM are always very careless about our software automatically sending to them telemetry and crash dumps in our backs. It’s a reminder not to send them anything when it’s possible to opt out, and not to opt in, considering what they may contain. And there is irony in this carelessness biting them back, even if in that case they show that they are much more cautious when it’s their own data that is at stake.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.