Edit this essay
only $12.90/page

Microsoft Environment Analysis Essay Sample

Microsoft Environment Analysis Pages
Pages: Word count: Rewriting Possibility: % ()

Questions:
1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Answers:

1. The five vulnerabilities for tis workgroup LAN are based on the Microsoft Security Advisories. The numbers are as follows: a. Advisory # 2846338 – Vulnerability in Microsoft malware protection engine could allow remote code execution. This number involves privilege elevation. b. Advisory # 2719662 – Vulnerabilities in gadgets could allow remote code execution. c. Advisory #2854544 – Updates to improve crytograghy and digital certificate handling in Windows. d. Advisory # 2755801 – Update for vulnerabilities in Adobe flash player in Internet Explorer. e. Advisory # 2877140 – Vulnerability in Internet Explorer could allow remote code execution.

2. Yes

3. Advisory # 2719662 – Solution
Microsoft is announcing the availability of an automated Microsoft fix it solution that disables Windows sidebar and gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows sidebar and gadgets can help protect customers from potential attacks that leverage gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage gadgets to execute arbitrary code: Microsoft is aware that some legitimate gadgets running in Windows sidebar could contain vulnerabilities. An attacker who successfully exploited a gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could create a malicious gadget and then trick a user into installing the malicious gadget.

Once installed, the malicious gadget could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. In addition, gadgets can access your computer’s files, show you objectionable content, or change their behavior at any time. Gadgets could also potentially harm your computer. Recommendation: Customers who are concerned about vulnerable or malicious Gadgets should apply the automated Microsoft fix it solution as soon as possible. Advisory # 977981 – Solution

This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Advisory # 979352 – Solution

Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Search For The related topics

  • microsoft
  • security