Home / vulnerabilitiesPDF  

Technical Cyber Security Alert 2012-129A

Posted on 09 May 2012
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA12-129A

Microsoft Updates for Multiple Vulnerabilities

Original release date: May 08, 2012
Last revised: --
Source: US-CERT

Systems Affected

* Microsoft Windows
* Microsoft .NET Framework
* Microsoft Office
* Microsoft Silverlight

Overview

Select Microsoft software products contain multiple
vulnerabilities. Microsoft has released updates to address these
vulnerabilities.

Description

The Microsoft Security Bulletin Summary for May 2012 describes
multiple vulnerabilities in Microsoft software. Microsoft has
released updates to address the vulnerabilities.

Impact

A remote, unauthenticated attacker could execute arbitrary code,
cause a denial of service, or gain unauthorized access to your
files or system.

Solution

Apply updates

Microsoft has provided updates for these vulnerabilities in the
Microsoft Security Bulletin Summary for May 2012, which describes
any known issues related to the updates. Administrators are
encouraged to note these issues and test for any potentially
adverse effects. In addition, administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS). Home users are encouraged to enable
automatic updates.

References

* Microsoft Security Bulletin Summary for May 2012 -
<http://technet.microsoft.com/en-us/security/bulletin/ms12-may>

* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>

* Microsoft Update - <https://www.update.microsoft.com/>

* Microsoft Update Overview -
<http://www.microsoft.com/security/updates/mu.aspx>

* Turn Automatic Updating On or Off -
<http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off>

Revision History

May 08, 2012: Initial release

____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA12-129A Feedback VU#171819" in
the subject.
____________________________________________________________________

Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to the Notification as indicated here:
http://www.us-cert.gov/legal.html#notify

This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA12-129A.html

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBT6mJfz/GkGVXE7GMAQJJhgf+MFmeEmhH/2lZoIj33E/vCY4+K5KEEx9C
gNdJA76LpQTT/G3H8kmJ5i4uCCkOZYDjvVF6MAeK2vqVwVLaLL7dR3PomDWIGGZX
hwvlrh290nuBjATPtNx1ovHxQa6V/xEkGeDGJKFXjf9CCbjDDOXfHgJJyJzAVbI7
+iMj2Q4cZjTsS80t9z4y+vg33OcblAGJv8wKuDblhu910gincsojJSUwCtAck3OS
KAatL882RcqeFs0uQdm9I+uV2/l86E9/PG1BDgaCx/cfOgVuxx7pXNdffNyP5Dh8
Bq3WKmmPNI8MDVl8kzWNbYYZ9egAWG+f2Cl0E70w9AG+1fNnzo48tQ==
=jejg
-----END PGP SIGNATURE-----

 

TOP