Time for the May 2010 summary of the upcoming Microsoft Security Updates…. 

2 Advisories, with 2 Vulnerabilities covered. Both are rated as Critical. 

The first one covering Outlook Express, Microsoft Mail, and Microsoft Live Mail on all Windows Operating Systems (sans Server Core and Server Core for Windows Server 2008 R2) and the second covering Microsoft Visual Basic for Applications. 

Both Vulnerabilities allow for Remote Code Execution. 

Heres a breakdown: 

MS10-030 – Mail Server Integer Overflow Vulnerability: The Outlook Express, Microsoft Mail, and Microsoft Live Mail on all Windows Operating System vulnerability, is ranked Critical for ALL Windows Operating Systems except Windows 7 and Windows Server 2008 R2 which are both ranked as Important. This covers vulnerability CVE-2010-0816. While rated Critical, many customers may not be affected by this vulnerability. There are currently 2 attack vectors/scenarios: the first and most likely vector involves a Man in the Middle (MITM) attack and the second, a less likely attack vector involves a Malicious Mail server. 

MS10-030 has a Microsoft Exploitability Index Assessment of 2 (Inconsistent exploit code likely). 

MS10-031 – VBE6 Single-Byte Stack Overflow: The MS Visual Basic for Applications vulnerability is ranked as Critical for Microsoft Office and  Visual Basic for Applications. This covers vulnerability CVE-2010-0815. There are several of ways that this vulnerability could be remotely exploited, however, they require specific properties of the program to be true. Microsoft has determined that while such properties may be possible, they are unlikely to be found in practice. Microsoft has further determined in their analysis that “consistent exploit code resulting in arbitrary code execution is not likely to be released within the next 30 days.” 

MS10-031 has a Microsoft Exploitability Index Assessment of 2 (Inconsistent exploit code likely).
Interesting to note however, is the missing patch for a serious cross-site scripting flaw in SharePoint that could allow privilege escalation. See Microsoft Security Advisory (983438). 

NeXpose Community Edition, the free version of NeXpose, has coverage within 24 hours of the release. NeXpose Community Edition will enable you to detect these and every other Microsoft vulnerability and, if you wish, launch Metasploit Security Testing to confirm the presence and exploitability of the exposure(s) with publicly available exploits on up to 32 hosts in your environment. For small environments with 32 nodes or less, you can use NeXpose to provide free detection within 24 hours of Microsoft's update release. 

For larger environments, we invite you to download NeXpose Enterprise.
Get it here.