Sales
0161 215 3814
0800 953 0642
Support
0800 230 0032
0161 215 3711

May 2012 Microsoft Security Bulletin Release

As mentioned in the advanced notification, this month there are seven security bulletins addressing twenty three vulnerabilities:

  • 3 Critical
  • 4 Important

This bulletin covers:

72 Microsoft operating systems / service pack combinations
31 Microsoft .NET installation versions and types
9 Microsoft Office installation versions and types
6 Microsoft Silverlight installation versions and types

This month’s security bulletins are one of the largest ever released by Microsoft. Out of the seven vulnerabilities addressed three of the vulnerabilities are already publically disclosed. The most likely scenario in which an attacker could exploit the vulnerabilities would be from a user browsing to a malicious website triggering remote code execution on an unpatched system.

Due to the .NET patches this month we are expecting a longer than usual patch cycle

Bulletin ID

Bulletin Title and Executive Summary

Maximum Severity Rating and Vulnerability Impact

Restart Requirement

Affected Software

MS12-029

Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352)

This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical
Remote Code Execution

May require restart

Microsoft Office

MS12-034

Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)

This security update resolves three publicly disclosed vulnerabilities and seven privately reported vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker’s website.

Critical
Remote Code Execution

May require restart

Microsoft Windows, Microsoft .NET Framework, Microsoft Silverlight,
Microsoft Office

MS12-035

Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2693777)

This security update resolves two privately reported vulnerabilities in the .NET Framework. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Critical
Remote Code Execution

May require restart

Microsoft Windows, Microsoft .NET Framework

MS12-030

Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2663830)

This security update resolves one publicly disclosed and five privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Office file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important
Remote Code Execution

May require restart

Microsoft Office

MS12-031

Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2597981)

This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Important
Remote Code Execution

May require restart

Microsoft Office

MS12-032

Vulnerability in TCP/IP Could Allow Elevation of Privilege (2688338)

This security update resolves one privately reported and one publicly disclosed vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application.

Important
Elevation of Privilege

Requires restart

Microsoft Windows

MS12-033

Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege (2690533)

This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

Important
Elevation of Privilege

Requires restart

Microsoft Windows

The following link shows the Microsoft recommended Bulletin Deployment Priority and Severity and Exploitability Index

In summary, we are likely to see updates requiring reboots of servers this month. As usual, as a UKFast customer, you will benefit from these updates being applied automaticallyunless you have opted out of this service.

Share with:

Enjoy this article?