Sales
0161 215 3814
0800 953 0642
Support
0800 230 0032
0161 215 3711

August 2012 Microsoft Security Bulletin Release

As mentioned in the advanced notification, this month there are nine security bulletins:

  • 5 bulletins are rated as Critical
  • 4 bulletins are rated as Important
  • 8 bulletins addressing vulnerabilities that could lead to Remote Code Execution
  • 1 bulletin addressing a vulnerability that could lead to Elevation of Privilege
Bulletin ID Maximum Severity Rating and Vulnerability Impact Restart Requirement Affected Software
MS12-052 Critical
Remote Code Execution
Requires restart Microsoft Windows,Internet Explorer
Cumulative Security Update for Internet Explorer (2722913)
This security update resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
MS12-053 Critical
Remote Code Execution
Requires restart Microsoft Windows
Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135)
This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.
MS12-054 Critical
Remote Code Execution
Requires restart Microsoft Windows
Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed.
MS12-060 Critical
Remote Code Execution
May require restart Microsoft Office,
Microsoft SQL Server,
Microsoft Server Software,
Microsoft Developer Tools
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)
This security update resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker’s website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability.
MS12-058 Critical
Remote Code Execution
Does not require restart Microsoft Exchange Server
Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)
This security update resolves publicly disclosed vulnerabilities in Microsoft Exchange Server WebReady Document Viewing. The vulnerabilities could allow remote code execution in the security context of the transcoding service on the Exchange server if a user previews a specially crafted file using Outlook Web App (OWA). The transcoding service in Exchange that is used for WebReady Document Viewing is running in the LocalService account. The LocalService account has minimum privileges on the local computer and presents anonymous credentials on the network.
MS12-055 Important
Elevation of Privilege
Requires restart Microsoft Windows
Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)
This security update resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
MS12-056 Important
Remote Code Execution
May require restart Microsoft Windows
Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution (2706045)
This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker’s website.
MS12-057 Important
Remote Code Execution
May require restart Microsoft Office
Vulnerability in Microsoft Office Could Allow Remote Code Execution (2731879)
This security update resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted file or embeds a specially crafted Computer Graphics Metafile (CGM) graphics file into an Office file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
MS12-059 Important
Remote Code Execution
May require restart Microsoft Office
Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2733918)
This security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Share with:

Enjoy this article?