Home / vulnerabilitiesPDF  

Technical Cyber Security Alert 2012-073A

Posted on 14 March 2012
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA12-073A

Microsoft Updates for Multiple Vulnerabilities

Original release date: March 13, 2012
Last revised: --
Source: US-CERT

Systems Affected

* Microsoft Windows
* Microsoft Visual Studio
* Microsoft Expression Design

Overview

There are multiple vulnerabilities in Microsoft Windows, Microsoft
Visual Studio, and Microsoft Expression Design. Microsoft has
released updates to address these vulnerabilities.

I. Description

The Microsoft Security Bulletin Summary for March 2012 describes
multiple vulnerabilities in Microsoft Windows, Microsoft Visual
Studio, and Microsoft Expression Design. Microsoft has released
updates to address the vulnerabilities.

II. Impact

A remote, unauthenticated attacker could execute arbitrary code,
cause a denial of service, or gain unauthorized access to your
files or system.

III. Solution

Apply updates

Microsoft has provided updates for these vulnerabilities in the
Microsoft Security Bulletin Summary for March 2012, which describes
any known issues related to the updates. Administrators are
encouraged to note these issues and test for any potentially
adverse effects. In addition, administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS). Home users are encouraged to enable
automatic updates.

IV. References

* Microsoft Security Bulletin Summary for March 2012 -
<https://technet.microsoft.com/en-us/security/bulletin/ms12-mar>

* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>

* Microsoft Update - <https://www.update.microsoft.com/>

* Microsoft Update Overview -
<http://www.microsoft.com/security/updates/mu.aspx>

* Turn Automatic Updating On or Off -
<http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA12-073A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA12-073A Feedback " in
the subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2012 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________

Revision History

March 13, 2012: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBT1+TCj/GkGVXE7GMAQL03gf/cXzQEQ1yFSUd1fx1dsy9cbCNsV57w1RK
z/fzMX6aEXGfqJ6i7+gbgi7TICZN93IQEC45pdfrvN8J/SgJ69NgDFjfYoQgg0Qs
mWTJPzcYtC2mhosOCbIHFkN5AuWJIzwc4OHomFDe1h5P32FyzxqauGvU28IDZO8Y
Bck2fllBNMocMeh8JXwKeeKRgM8lxN3AaRNFmwVdzqvqRRQ4bbbg0UzGWzROQITB
x82n3c/7a6cso+soIxZvktHe+PzKpH00Tz1eOFFAACLSnYq+cmeW2XJoxl6VvcRi
FzypcxXZICxD9hd31bxS/Mtipzu90B816QR7BGcyhooaiuQXzB37lw==
=rHIp
-----END PGP SIGNATURE-----

 

TOP