Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.0441 Security Updates for Microsoft Windows Store Applications 27 March 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Windows Modern Mail Publisher: Microsoft Operating System: Windows 8 Windows RT Windows Server 2012 Impact/Access: Provide Misleading Information -- Unknown/Unspecified Resolution: Patch/Upgrade CVE Names: CVE-2013-1299 Original Bulletin: http://technet.microsoft.com/en-us/security/advisory/2819682 - --------------------------BEGIN INCLUDED TEXT-------------------- Microsoft Security Advisory (2819682) Security Updates for Microsoft Windows Store Applications Published: Tuesday, March 26, 2013 Version: 1.0 Executive Summary Microsoft is announcing the availability of security updates for Windows Store applications running on Windows 8, Windows RT, and Windows Server 2012 (Windows Server 2012 Server Core installations are not affected). The updates address vulnerabilities that are detailed in the Knowledge Base articles associated with each update. Latest Security Updates Security Update 2832006 for Windows Modern Mail On March 26, 2013, Microsoft released a security update on the Windows Store for Windows Modern Mail. Microsoft recommends that customers running this software apply the update as soon as possible using the Windows Store Apps update feature. For more information about this update, see Microsoft Knowledge Base Article 2832006. Vulnerabilities Addressed This update addresses the following vulnerability: Windows Modern Mail Spoofing Vulnerability (CVE-2013-1299) Severity: Moderate Acknowledgement: Microsoft thanks Alex Wolff of BrownWolff for reporting this vulnerability. Additional information: To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2013-1299. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUVJU4O4yVqjM2NGpAQKVehAApB2qex8Dr3a7MylWbJIOw+j/o62azTMS fkLUfC68bPKJYaEmF3GP2utfFfuMvc0+bZF+fv3TIvdaZqqr64o4wLYYFl19oTMj 511QgIoLneQ2GLZDophkPVvu6m1KqyZh2PTr9ikk15XVLCAaN4ryWDOSPfb1koSb VyDlFneR5otvpNLeVZiPnGx9/CdeKctyCb307HEFjPgpjd87mWLgOB9sef7P1wfx Q4Ws3dRFqn6I499lZOUTjU4fKNhw9bZ0k3GMHW6M8ZsqP2EDx3aPfrEzDqWw0I95 grT9mzyo/q8VPnBqn8lv+MFUZ70YPl5ikwcdmO2bplxO9GPQTvU1lne9DIG85S7a d/4LrAVdR0oUGRRK3mmSVEi8i9Z5644XpiTnJiH5RUsWbau2U83WkADo0DoxtJxj uPo9s22w1hivYaq34niQpIdfMoslqJDEM4z9Bb1KzQTvm3n8Zcr0m1rVXKHu3lHd mNAFMw7KzVbvbPH3SY6cXpQte8LgpXfU5eKKX5JebpduLOqQA2idJPC7+qXuCqR3 KgeO/SnKEm8GH0IV90JfcqVFR3PaOpj7CrV50e2rI5z1Ypntj5DUTawEi54PxDKy xhMQe9pMP8b53qWmxniF8VhDbwTifYcpB3X0kR3Z8NcseSQajw4PMUeF59ZZRFYk NxSSE3OX/Kg= =soPs -----END PGP SIGNATURE-----