Here are the things that we knew about the March 2011 Patch Tuesday until now. We knew that on the 8th of March, as part of the Patch Tuesday program, Microsoft would roll out 3 security bulletins. Out of these 3 security bulletins, 2 carry the 'important' rating (which refers to vulnerabilities whose exploitation could result in compromise of the confidentiality, integrity, or availability of users’ data, or of the integrity or availability of processing resources) and 1 carries the 'critical' rating (which refers to vulnerabilities whose exploitation could allow the propagation of an Internet worm without user action).
We also knew that the 3 security bulletins are meant to fix 4 vulnerabilities that plague the Microsoft Windows operating system and the Microsoft Office productivity suite. We know a bit more than that now. Redmond-based software giant Microsoft has released a few more details on the 3 security bulletins it released as part of the March 2011 Patch Tuesday. You can check them out below.
Title: Vulnerabilities in Windows Media Could Allow Remote Code Execution Severity: Critical Description: One publicly disclosed vulnerability in DirectShow and one privately reported vulnerability in Windows Media Player and Windows Media Center. The more severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Digital Video Recording (.dvr-ms) file. Most likely attack vector: The user is convinced to open a specially crafted .dvr-rms file. Affected software: Microsoft Windows
Title: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution Severity: Important Description: A publicly disclosed vulnerability in Windows Remote Desktop Client that could allow remote code execution if a user opens a legitimate Remote Desktop configuration (.rdp) file located in the same network folder as a specially crafted library file. Most likely attack vector: The user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. Affected software:
Title: Vulnerability in Microsoft Groove Could Allow Remote Code Execution Severity: Important Description: A publicly disclosed vulnerability in Microsoft Groove that could allow remote code execution if a user opens a legitimate Groove-related file that is located in the same network directory as a specially crafted library file. Affected software: Microsoft Office.
SPONSORED LINKS
The Microsoft Security Response Center (MSRC) has provided these visual representations of the March 2011 Patch Tuesday.