Microsoft security updates february 2012




















An attacker would have no way to force users to view specially crafted content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to an attacker's website, or by getting them to open an attachment sent through email.

The vulnerability could allow remote code execution if a specially crafted email message is scanned. Vulnerabilities in. NET Framework Could Allow Elevation of Privilege This security update resolves two publicly disclosed vulnerabilities and one privately reported vulnerability in Microsoft. NET Framework. The most severe vulnerability could allow elevation of privilege if a user visits a specially crafted website or a website containing specially crafted web content. In all cases, however, an attacker would have no way to force users to visit such websites.

Instead, an attacker would have to convince users to visit the compromised website, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website.

The vulnerability could allow information disclosure if a user views a specially crafted webpage using Internet Explorer. The vulnerability could allow denial of service if an attacker sends a large number of specially crafted IPv6 packets to an affected system.

To exploit the vulnerability, an attacker's system must belong to the same subnet as the target system. This is an information disclosure vulnerability. This vulnerability has been publicly disclosed. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article The Microsoft Baseline Security Analyzer MBSA allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations.

Configuration Manager Software Update Management simplifies the complex task of delivering and managing updates to IT systems across the enterprise.

With Configuration Manager , IT administrators can deliver updates of Microsoft products to a variety of devices including desktops, laptops, servers, and mobile devices. The automated vulnerability assessment in Configuration Manager discovers needs for updates and reports on recommended actions.

For more information about how administrators can use Configuration Manager to deploy updates, see Software Update Management. By using SMS, administrators can identify Windows-based systems that require security updates and to perform controlled deployment of these updates throughout the enterprise with minimal disruption to end users. Note System Management Server is out of mainstream support as of January 12, For more information on product lifecycles, visit Microsoft Support Lifecycle. Some software updates may not be detected by these tools.

Administrators can use the inventory capabilities of SMS in these cases to target updates to specific systems. Some security updates require administrative rights following a restart of the system. Updates often write to the same files and registry settings required for your applications to run. This can trigger incompatibilities and increase the time it takes to deploy security updates. You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit.

The Application Compatibility Toolkit ACT contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment. To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release.

Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems.

To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program MAPP Partners.

Microsoft thanks the following for working with us to help protect customers:. The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages.

If so have you identified the guilty Update? Hi Chris,. Thanks for responding. Since my original post I have been able to adjust for the situation and as of Friday the 17th we have issued patches for our software. So my situation is not urgent. The temporary first document has always been replaced by the next document that is opened.

With our particular add-in the results were documents being left open or extra ones generated after the user started a new instance of Word, selected our tab, and selected our option of starting a new custom document based on a particular template. The problem did not occur if the user already had an instance of Word open or if they were connected to the Internet.

Other problems were being reported by users but in tracing them down, the root cause was determined to be this initial start-up. Important 1 Likely to see an exploit developed in next 30 days. Visio itself is not affected, only the Viewer. When the victim clicks the link, an automatic action is taken on their behalf on the SharePoint server that they otherwise might not have wanted to execute.

Important 1 Likely to see a XSS exploit developed in next 30 days no exploit here for code execution on the SharePoint server itself. Attacker logs-in locally to a machine and exploits the vulnerability to elevate to a higher privilege level. Likely to see a XSS exploit developed in next 30 days no exploit here for code execution on the SharePoint server itself.



0コメント

  • 1000 / 1000