Presentation is loading. Please wait.

Presentation is loading. Please wait.

Severity and Exploitability Index

Similar presentations


Presentation on theme: "Severity and Exploitability Index"— Presentation transcript:

1 Severity and Exploitability Index
1 RISK 2 3 DP Severity CRITICAL IMPACT IMPORTANT MODERATE LOW MS10-032 MS10-033 MS10-034 MS10-035 MS10-036 MS10-037 MS10-038 MS10-039 MS10-040 MS10-041 ActiveX Kill Bit Windows Windows Office Windows Internet Explorer Windows Office Office Windows Windows The chart represents the aggregate severity and aggregate exploitability index rating for each bulletin. Note that each affected product may have a lower individual rating. Please consult the security bulletins directly for details. * DP = Deployment Priority

2 Deployment Priority Bulletin KB Public Aggregate Severity
Based on a combination of severity rating, exploitability index rating, available mitigations and workarounds and range of affected products. All customers should perform their own prioritization assessment as each environment is different and other factors may apply. Microsoft recommends that all security updates be deployed as soon as possible. This priority slide is provided "AS IS" with no warranties, and confers no rights. Deployment Priority Bulletin KB Public Aggregate Severity Exploit Index Max Impact Deployment Priority Note DirectShow MS10-033 979902 No Critical 1 RcE Critical on all supported versions of Windows. Can be exploited by opening a specially crafted file or visiting a malicious web page. KillBits MS10-034 980195 N/A Impacts users on all versions of Windows. IE MS10-035 982381 Yes Critical for all client operating systems. Can be exploited by opening a specially crafted file or visiting a malicious web page. Windows Kernel MS10-032 979559 Important 2 No Microsoft applications expose a remote vector. However, some 3rd party apps may parse fonts from untrusted sources and expose this vulnerability remotely and anonymously. Office COM MS10-036 983235 User interaction required. Office Excel MS10-038 SharePoint MS10-039 EoP Proof of concept code available in the wild. No known exploits. Should be given higher priority for SharePoint servers. IIS MS10-040 982666 Must install and enable extended protection for authentication. OpenType MS10-037 980218 3 The attacker must be able to log on locally. Lower exploitability index. .NET MS10-041 981343 Tampering Affects systems and applications that rely on Hash-Based Message Authentication Code (HMAC). Microsoft applications not affected.


Download ppt "Severity and Exploitability Index"

Similar presentations


Ads by Google