McAfee has announced that it provides coverage for the 11 security vulnerabilities disclosed by Microsoft. These vulnerabilities have been reviewed by McAfee AvertR Lab, and based on their findings.
McAfee recommends that users confirm the Microsoft product versioning outlined in the bulletins, and update as recommended by Microsoft and McAfee. This includes deploying solutions to ensure protection against the vulnerabilities outlined in this advisory.
“Today’s Microsoft patches emphasize the need for proactive browser protection and the risk of surfing the Web unprotected,” said Dave Marcus, security research and communications manager, McAfee Avert Labs. “The vulnerability in the Windows Media File Format is another warning that media files are potentially unsafe and people should use caution when opening or playing media files.”
Microsoft vulnerabilities include:
· Vulnerability in SMBv2 Could Allow Remote Code Execution
· Vulnerabilities in DirectX Could Allow Remote Code Execution
· Vulnerability in Message Queuing Could Allow Remote Code Execution
· Vulnerability in Windows Kernel Could Allow Elevation of Privilege
· Vulnerability in Macrovision Driver Could Allow Local Elevation of Privilege
· Vulnerability in Windows Media File Format Could Allow Remote Code Execution
· Cumulative Security Update for Internet Explorer