Microsoft patches nine of August
- Cumulative Update for Microsoft Internet Explorer (MS12-052)
This update resolves a number of vulnerabilities identified in Internet Explorer 6.0, 7.0, 8.0 and 9.0.Patch referred to as “critical.”
- A vulnerability in Remote Desktop may allow execution of malicious code remotely (MS12-053)
This update is for users of all versions of Windows XP. The installation of the patch is strongly recommended as it allows them to avoid taking risks when a remote attacker to send a sequence of data packets RDP, suitably modified, the Remote Desktop server. At risk are all Windows machines on which the module is enabled “server” Remote Desktop to accept incoming connections. Patch “critical.”
- Some vulnerabilities in the network components of Windows can facilitate the execution of remote code (MS12-054)
Installing this update allows you to be safe from attack if an attacker exploited a deficiency of the network components risponendo “artfully” to a request from the printer spooler. Patches “critical” that affects all versions of Windows.
- Vulnerabilities in Windows kernel mode driver could allow elevation of privilege acquisition (MS12-055)
This is a security update as “important” that covers all versions of Windows, from oldest to most recent. The risk is that an attacker in possession of valid logon credentials, and log in – by running a special application – be able to gain administrative user privileges.
- Vulnerability in VBScript and JScript scripting engines could allow the execution the remote code (MS12-056)
This patch fixes a vulnerability that could allow execution of malicious code when you had to visit a web page off the shelf “for art.” The report is referred to as “important” and is limited to 64-bit versions of Windows.
- Vulnerability discovery in the Office package might facilitate remote code execution (MS12-057)
Installing this patch, users of Office 2007 and Office 2010 can keep on their computer to run malicious code when you attempt to open a document containing a Computer Graphics Metafile (CGM) malicious. Patch “important.”
- Vulnerabilities in the viewer WebReady Exchange Server may potentially allow execution of malicious code (MS12-058)
The update is intended for users of Exchange Server 2007 and 2010. Applying it, you conjure any risk of infection if you were to try to open a malicious file by using Outlook Web Access (OWA). Patch “critical.”
- Vulnerability discovered in Microsoft Visio may allow execution of malicious code (MS12-059)
Designed for users of Visio 2010 and Visio Viewer 2010, the patch allows you to avoid malicious code execution when opening a file malicious. Patch “important.”
- A security hole in Windows controls may facilitate the execution of malicious code remotely (MS12-060)
By installing this patch you will avoid the risk of seeing run on your system of malicious code by simply visiting a website. The update is listed as “critical” and relevant for users of Office, SQL Server and other Microsoft packages (Commerce Server, Visual FoxPro, Visual Basic Runtime 6.0). A corollary of the “patch day” today, as usual, Microsoft has also released a new update to its “ Malicious Software Removal Tool . “ The next round of the “ patch day ”Microsoft is set for Tuesday, September 11.