Today we released four security bulletins addressing six CVE’s. All four bulletins have a maximum severity rating of Important. We hope that the table below helps you prioritize the deployment of the updates appropriately for your environment.

Bulletin Most likely attack vector Max Bulletin Severity Max exploit-ability rating Likely first 30 days impact Platform mitigations and key notes
MS14-002

(NDProxy, a kernel-mode driver)

Attacker able to run code at a low privilege level inside an application sandbox exploits this vulnerability to elevate privileges to SYSTEM. Important 1 Likely to continue seeing Adobe PDF exploits leveraging this vulnerability to elevate privileges outside sandbox. All exploits we have analyzed for this vulnerability attempt to exploit an already-patched Adobe Reader vulnerability, CVE-2013-3346. This Adobe vulnerability was addressed via a September 11, 2013 Adobe security update.

Addresses vulnerability described by security advisory 2914486.

MS14-001

(Word)

Victim opens malicious Office document. Important 1 Likely to see reliable exploits developed within next 30 days.  
MS14-003

(win32k.sys, a kernel-mode driver)

Attacker running code at low privilege runs exploit binary to elevate to SYSTEM. Important 1 Likely to see reliable exploits developed within next 30 days.  
MS14-004

(Microsoft Dynamics AX)

Attacker able to authenticate to Dynamics server could cause denial-of-service condition preventing it from servicing other client requests. Important n/a Denial of service only, not usable for code execution.  

- Jonathan Ness, MSRC engineering