Members
  • Total Members: 12818
  • Latest: martin
Stats
  • Total Posts: 28534
  • Total Topics: 8240
  • Online Today: 1024
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)












Author Topic: Microsoft Security Bulletins  (Read 2330 times)

0 Members and 1 Guest are viewing this topic.

Pez

  • SCF VIP Member
  • *****
  • Posts: 723
  • KARMA: 116
  • Gender: Male
  • Pez
Microsoft Security Bulletins
« on: 07. June 2012., 09:11:18 »
Microsoft Security Bulletins

Keep updated with all then new Microsoft securety updates.
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Samker's Computer Forum - SCforum.info

Microsoft Security Bulletins
« on: 07. June 2012., 09:11:18 »




Pez

  • SCF VIP Member
  • *****
  • Posts: 723
  • KARMA: 116
  • Gender: Male
  • Pez
Re: Microsoft Security Bulletins
« Reply #1 on: 07. June 2012., 09:14:45 »
Next upcomming release "June 12, 2012"
Register for the June 2012 security bulletin webcast

TechNet Webcast: Information about Microsoft Security Bulletins for June (Level 200)
 Event ID: 1032499671
Language(s):  English.
Product(s):  computer security and information security.
Audience(s):  IT Decision Maker and IT Generalist.

Starts: Wednesday, June 13, 2012 11:00 AM
 Time zone: (GMT-08:00) Pacific Time (US & Canada)
Duration: 1 hour(s)
 
Join us for a brief overview of the technical details of this month's Microsoft security bulletins. We intend to address your concerns in this webcast. Therefore, Microsoft security experts devote most of this webcast to answering the questions that you ask.

Presented By:  
Jonathan Ness, Security Development Manager, Microsoft Corporation
Dustin Childs, Group Manager, Microsoft Security Response Center, Microsoft Corporation
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Pez

  • SCF VIP Member
  • *****
  • Posts: 723
  • KARMA: 116
  • Gender: Male
  • Pez
Microsoft Security Bulletin Summary for June 2012
« Reply #2 on: 15. June 2012., 08:50:12 »
Microsoft Security Bulletin Summary for June 2012


MS12-036

Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939)

This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.

Critical
Remote Code Execution

Requires restart

Microsoft Windows



MS12-037

Cumulative Security Update for Internet Explorer (2699988)

This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical
Remote Code Execution

Requires restart

Microsoft Windows,
Internet Explorer



MS12-038

Vulnerability in .NET Framework Could Allow Remote Code Execution (2706726)

This security update resolves one privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. In a web browsing attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website.

Critical
Remote Code Execution

May require restart

Microsoft Windows, Microsoft .NET Framework



MS12-039

Vulnerabilities in Lync Could Allow Remote Code Execution (2707956)

This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft Lync. The most severe vulnerabilities could allow remote code execution if a user views shared content that contains specially crafted TrueType fonts.

Important
Remote Code Execution

May require restart

Microsoft Lync



MS12-040

Vulnerability in Microsoft Dynamics AX Enterprise Portal Could Allow Elevation of Privilege (2709100)

This security update resolves one privately reported vulnerability in Microsoft Dynamics AX Enterprise Portal. The vulnerability could allow elevation of privilege if a user clicks a specially crafted URL or visits a specially crafted website. In an email attack scenario, an attacker could exploit the vulnerability by sending an email message that contains the specially crafted URL to the user of the targeted Microsoft Dynamics AX Enterprise Portal site and by convincing the user to click the specially crafted URL. Internet Explorer 8 and Internet Explorer 9 users browsing to a Microsoft Dynamics AX Enterprise Portal site in the Internet Zone are at a reduced risk. By default, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 prevents this attack in the Internet Zone. However, the XSS Filter in Internet Explorer 8 and Internet Explorer 9 is not enabled by default in the Intranet Zone.

Important
Elevation of Privilege

May require restart

Microsoft Dynamics AX



MS12-041

Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2709162)

This security update resolves five privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities.

Important
Elevation of Privilege

Requires restart

Microsoft Windows



MS12-042

Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2711167)

This security update resolves one privately reported vulnerability and one publicly disclosed vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that exploits the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.

Important
Elevation of Privilege

Requires restart

Microsoft Windows
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Pez

  • SCF VIP Member
  • *****
  • Posts: 723
  • KARMA: 116
  • Gender: Male
  • Pez
Register for the July 2012 security bulletin webcast
« Reply #3 on: 10. July 2012., 09:14:19 »
Register for the July 2012 security bulletin webcast

TechNet Webcast: Information about Microsoft Security Bulletins for July

 Event ID: 1032518600

Starts: Wednesday, July 11, 2012 11:00 AM
 Time zone: (GMT-08:00) Pacific Time (US & Canada)
Duration: 1 hour(s)

Language(s):  English.

Product(s):  computer security and information security.

Audience(s):  IT Decision Maker, IT Generalist and IT Manager.


Join us for a brief overview of the technical details of this month's Microsoft security bulletins. We intend to address your concerns in this webcast. Therefore, Microsoft security experts devote most of this webcast to answering the questions that you ask.
 
Presented by:

Dustin Childs, Senior Security Program Manager, Microsoft Security Response Center, Microsoft Corporation
 
and
 
Jonathan Ness, Principal Security Development Lead, Microsoft Corporation
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Pez

  • SCF VIP Member
  • *****
  • Posts: 723
  • KARMA: 116
  • Gender: Male
  • Pez
Microsoft Security Bulletin Summary for July 2012
« Reply #4 on: 11. July 2012., 09:50:14 »
Microsoft Security Bulletin Summary for July 2012

MS12-043

Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479)

This security update resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes the user to the attacker's website.

Critical
Remote Code Execution

May require restart

Microsoft Windows,
Microsoft Office,
Microsoft Developer Tools,
Microsoft Server Software

MS12-044

Cumulative Security Update for Internet Explorer (2719177)

This security update resolves two privately reported vulnerabilities in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical
Remote Code Execution

Requires restart

Microsoft Windows,
Internet Explorer

MS12-045

Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (2698365)

This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views a specially crafted webpage. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical
Remote Code Execution

May require restart

Microsoft Windows

MS12-046

Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution (2707960)

This security update resolves one publicly disclosed vulnerability in Microsoft Visual Basic for Applications. The vulnerability could allow remote code execution if a user opens a legitimate Microsoft Office file (such as a .docx file) that is located in the same directory as a specially crafted dynamic link library (DLL) file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important
Remote Code Execution

May require restart

Microsoft Office,
Microsoft Developer Tools

MS12-047

Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2718523)

This security update resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Important
Elevation of Privilege

Requires restart

Microsoft Windows

MS12-048

Vulnerability in Windows Shell Could Allow Remote Code Execution (2691442)

This security update resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a file or directory with a specially crafted name. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important
Remote Code Execution

Requires restart

Microsoft Windows

MS12-049

Vulnerability in TLS Could Allow Information Disclosure (2655992)

This security update resolves a publicly disclosed vulnerability in TLS. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. All cipher suites that do not use CBC mode are not affected.

Important
Information Disclosure

Requires restart

Microsoft Windows

MS12-050

Vulnerabilities in SharePoint Could Allow Elevation of Privilege (2695502)

This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft SharePoint and Windows SharePoint Services. The most severe vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes the user to a targeted SharePoint site.

Important
Elevation of Privilege

May require restart

Microsoft Office,
Microsoft Server Software

MS12-051

Vulnerability in Microsoft Office for Mac Could Allow Elevation of Privilege (2721015)

This security update resolves one publicly disclosed vulnerability in Microsoft Office for Mac. The vulnerability could allow elevation of privilege if a malicious executable is placed on an affected system by an attacker, and then another user logs on later and runs the malicious executable. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Important
Elevation of Privilege

Does not require restart

Microsoft Office
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising