Old MS Alerts

MS12-020 exploit in-the-wild ...

FYI...

Tool Exploiting MS12-020 Vulnerabilities ...
- http://atlas.arbor.net/briefs/
Severity: Elevated Severity
Published: Wednesday, March 28, 2012 19:20
An easy-to-use denial of service tool for the Microsoft Remote Desktop Protocol vulnerability has been released.
Analysis: While a metasploit module has been available for some time, a new, easy-to-use point and click tool lowers the bar. Organizations that have yet to patch should do so...
Source: http://www.f-secure.com/weblog/archives/00002338.html

MS12-020 exploit in-the-wild ...
- https://www.f-secure.com/weblog/archives/00002338.html
March 27, 2012 - "Since the public release of Microsoft's MS12-020 bulletin, there have been plenty of attempts to exploit vulnerabilities in the Remote Desktop Protocol (RDP). Last week, we received a related sample, which turned out to be a tool called "RDPKill by: Mark DePalma" that was designed to kill targeted RDP service. The tool was written with Visual Basic 6.0, and has a simple user interface. We tested it on machines running on Windows XP 32-bit and Windows 7 64-bit... Both the Windows XP 32-bit and the Windows 7 64-bit computers were affected by the Denial of Service (DoS) attack. The service crashed and triggered a "Blue Screen of Death" (BSoD) condition*...
* https://www.f-secure.com/weblog/archives/rdpkill_bsod.png
We detect this tool as Hack-Tool:W32/RDPKill.A. (SHA-1: 1d131a5f17d86c712988a2d146dc73367f5e5917). Besides RDPKill.A, other similar tools and Metasploit module can also be found online. Due to their availability, an unpatched RDP server would be an easy target of DoS attack by attackers who might be experimenting with these tools. For those who still haven't patched their system, especially those running RDP service on their machines, we strongly advise that you to do so as soon as possible..."

:fear::fear:
 
Last edited:
MS Security Bulletin Advance Notification - April 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-apr
April 05, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on April 10, 2012... (Total of -6-)

Bulletin 1 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Bulletin 2 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 3 - Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework
Bulletin 4 - Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft SQL Server, Microsoft Server Software, Microsoft Developer Tools
Bulletin 5 - Important - Information Disclosure - May require restart - Microsoft Forefront United Access Gateway
Bulletin 6 - Important - Remote Code Execution - May require restart - Microsoft Office
___

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
5 Apr 2012 - "... 6 bulletins addressing 11 vulnerabilities in Microsoft Windows, Microsoft Office, Internet Explorer, Forefront UAG, and .NET Framework..."

.
 
Last edited:
MS Security Bulletin Summary - April 2012

FYI...

- http://technet.microsoft.com/en-us/security/bulletin/ms12-apr
April 10, 2012 - "This bulletin summary lists security bulletins released for April 2012...
(Total of -6-)

Critical -4-

Microsoft Security Bulletin MS12-023 - Critical
Cumulative Security Update for Internet Explorer (2675157)
- http://technet.microsoft.com/en-us/security/bulletin/ms12-023
Critical - Remote Code Execution- Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS12-024 - Critical
Vulnerability in Windows Could Allow Remote Code Execution (2653956)
- http://technet.microsoft.com/en-us/security/bulletin/ms12-024
Critical - Remote Code Execution- Requires restart - Microsoft Windows

Microsoft Security Bulletin MS12-025 - Critical
Vulnerability in .NET Framework Could Allow Remote Code Execution (2671605)
- http://technet.microsoft.com/en-us/security/bulletin/ms12-025
Critical - Remote Code Execution- May require restart - Microsoft Windows, Microsoft .NET Framework

Microsoft Security Bulletin MS12-027 - Critical
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)
- http://technet.microsoft.com/en-us/security/bulletin/ms12-027
Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft SQL Server, Microsoft Server Software, Microsoft Developer Tools

Important -2-

Microsoft Security Bulletin MS12-026 - Important
Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Information Disclosure (2663860)
- http://technet.microsoft.com/en-us/security/bulletin/ms12-026
Important - Information Disclosure - May require restart - Microsoft Forefront United Access Gateway

Microsoft Security Bulletin MS12-028 - Important
Vulnerability in Microsoft Office Could Allow Remote Code Execution (2639185)
- http://technet.microsoft.com/en-us/security/bulletin/ms12-028
Important - Remote Code Execution - May require restart - Microsoft Office
___

- https://blogs.technet.com/b/msrc/ar...the-april-2012-bulletins.aspx?Redirected=true
10 Apr 2012 - "... These bulletins will increase protection by addressing 11 CVEs. Customers should plan to install all of these updates as soon as possible. For those who must prioritize deployment, we recommend focusing first on these Critical updates:
• MS12-027 (Windows Common Controls)...
• MS12-023 (Internet Explorer)..."

Bulletin Deployment Priority
- https://blogs.technet.com/cfs-file....l-2012-Overview-Slides_5F00_Dep_5F00_Prio.png

Severity and Exploitability Index
- https://blogs.technet.com/cfs-file....ril-2012-Overview-Slides_5F00_Sev_5F00_XI.png
___

ISC Analysis
- https://isc.sans.edu/diary.html?storyid=12949
Last Updated: 2012-04-10 18:08:35 UTC
___

- https://secunia.com/advisories/48724/ - MS12-023
- https://secunia.com/advisories/48581/ - MS12-024
- https://secunia.com/advisories/48785/ - MS12-025
- https://secunia.com/advisories/48787/ - MS12-026
- https://secunia.com/advisories/48786/ - MS12-027
- https://secunia.com/advisories/48723/ - MS12-028

- http://www.securitytracker.com/id/1026901 - MS12-023
- http://www.securitytracker.com/id/1026906 - MS12-024
- http://www.securitytracker.com/id/1026907 - MS12-025
- http://www.securitytracker.com/id/1026909 - MS12-026
- http://www.securitytracker.com/id/1026899 - MS12-027
- http://www.securitytracker.com/id/1026900 - MS12-027
- http://www.securitytracker.com/id/1026902 - MS12-027
- http://www.securitytracker.com/id/1026903 - MS12-027
- http://www.securitytracker.com/id/1026904 - MS12-027
- http://www.securitytracker.com/id/1026905 - MS12-027
- http://www.securitytracker.com/id/1026910 - MS12-028
- http://www.securitytracker.com/id/1026911 - MS12-028
___

MSRT
- http://support.microsoft.com/?kbid=890830
April 10, 2012 - Revision: 101.0
(Recent additions)
- http://www.microsoft.com/security/pc-security/malware-families.aspx
... added this release...
• Bocinex
• Claretore
• Gamarue

- https://blogs.technet.com/b/mmpc/ar...ril-2012-win32-claretore.aspx?Redirected=true
10 Apr 2012

Download:
- http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=16
File Name: Windows-KB890830-V4.7.exe - 14.9 MB
- https://www.microsoft.com/download/en/details.aspx?id=9905
x64 version of MSRT:
File Name: Windows-KB890830-x64-V4.7.exe - 15.5 MB

.
 
Last edited:
MS12-025 .Net update affects printing ...

FYI...

MS12-025 .Net update affects printing ...
- https://isc.sans.edu/diary.html?storyid=12994
Last Updated: 2012-04-15 00:28:11 UTC - "... the most recent Microsoft .Net framework update may have affected printing from some applications. TurboTax* has released an update to address this issue in their software and Microsoft has updated the MS12-025 KB article** to indicate they are aware of the problem..."
* http://turbotax.intuit.com/support/...lling-the-Latest-Windows-Update/SLN61229.html

** http://support.microsoft.com/kb/2671605
Last Review: April 14, 2012 - Revision: 2.0
"... Known issues with this security update: • We are currently aware of an issue with printing from a Windows Forms application. After the installation of these security updates, certain Windows Forms applications may not print, or may not honor specified printer settings when they do print. There is no impact on systems that do not use printing functionality from a .NET Framework Windows Forms application. The investigation into this issue is ongoing.
Workaround: To print from an affected Windows Forms application, print the content to a file on your computer instead of directly printing to a printer device. For example, print to a PDF, XPS, or any other supported format file. You can then open the file that you created and print directly from there..."

.NET Framework Parameter Validation Vulnerability
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0163 - 9.3 (HIGH)

- https://technet.microsoft.com/en-us/security/bulletin/ms12-025
V1.1 (April 13, 2012): Added a link to Microsoft Knowledge Base Article 2671605** under Known Issues in the Executive Summary.

:confused:
 
Last edited:
MS12-027 - FixIt solution Mscomctl.ocx

FYI...

Fix for an error in custom Office solutions that occurs after you install MS12-027
- http://support.microsoft.com/kb/2703186/en-us
Last Review: April 19, 2012 - Revision: 2.0 - "After you install the update solution in Office applications that use controls from Mscomctl.ocx, you may receive one or more of the following error messages:
> Object library invalid or contains references to object definitions that could not be found
> Element not found
> Cannot insert object ...
To enable or disable this fixit solution*, click the Fix it button or link under the Enable heading. Click Run in the File Download dialog box, and then follow the steps in the Fix it wizard...
* http://go.microsoft.com/?linkid=9806938
APPLIES TO:
Microsoft Office Excel 2003
Microsoft Office PowerPoint 2003
Microsoft Office Word 2003
Microsoft Office Excel 2007
Microsoft Office PowerPoint 2007
Microsoft Office Word 2007
Microsoft Excel 2010
Microsoft PowerPoint 2010
Microsoft Word 2010 ..."
___

- https://isc.sans.edu/diary.html?storyid=13063
Apr 26, 2012 - "Packetstorm Security and Metasploit have Exploit code for MS12-027"

- http://www.symantec.com/security_response/threatconlearn.jsp
Apr 20, 2012 - "... MS12-027... Microsoft reports that this vulnerability is being exploited in the wild in specially crafted Office documents in limited, targeted attacks. Customers are advised to install all applicable updates as soon as possible..."

:fear:
 
Last edited:
MS SIRv12: Conficker...

FYI...

MS SIRv12: Conficker
- http://www.theinquirer.net/inquirer/news/2170432/conficker-worm-troubling-microsoft
Apr 26 2012 - "... Microsoft has warned that the Conficker virus is still residing on millions of Windows machines. In its latest Security Intelligence Report, volume 12 (PDF*), the firm said that the worm had raised its head 220 million times in the last two and a half years. It said that it is one of the biggest threats to businesses and continues to be a problem because people insist on using crappy passwords..."

SIRv12: Conficker
- https://blogs.technet.com/b/mmpc/archive/2012/04/25/the-tenacity-of-conficker.aspx?Redirected=true
25 Apr 2012 - "... The nature of how later Conficker variants spread is the key to understanding what makes the worm so much more of an issue for businesses than for consumer users. Initially the worm spread through the Internet solely by exploiting a software vulnerability in the Windows Server service that had been addressed months earlier in Microsoft Security Bulletin MS08-067. About one month later, Conficker was updated to spread using the Autorun feature and weak passwords or stolen login tokens. The use of weak passwords and stolen login tokens was the change that gave it a foothold in the business sector environment...."
> http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

Microsoft Security Intelligence Report volume 12
* http://go.microsoft.com/?linkid=9807245
PDF

:fear::fear:
 
MS12-027 - Exploit in the Wild...

FYI...

Microsoft Security Bulletin MS12-027 - Critical
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)
- https://technet.microsoft.com/en-us/security/bulletin/ms12-027
• V2.0 (April 26, 2012): Added SP1 versions of SQL Server 2008 R2 to the Affected Software and added an entry to the update FAQ to explain which SQL Server 2000 update to use based on version ranges. These are informational changes only. There were no changes to the security update files or detection logic. For a complete list of changes, see the entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update.

MS12-027
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0158 - 9.3 (HIGH)
Last revised: 04/12/2012

CVE-2012-0158 Exploit in the Wild
- https://blogs.mcafee.com/mcafee-labs/cve-2012-0158-exploit-in-the-wild
April 23, 2012 - "... many specially crafted files exploiting CVE-2012-0158, a vulnerability in MSCOMCTL.OCX in Microsoft Office and some other Microsoft products. This exploit can be implemented in a variety of file formats, including RTF, Word, and Excel files. We have already found crafted RTF and Word files in the wild. In the malicious RTF, a vulnerable OLE file is embedded with \object and \objocx tags... always exercise caution when opening unsolicited emails..."

:fear::fear:
 
Last edited:
MS Security Bulletin Advance Notification - May 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-may
May 03, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on May 8, 2012... (Total of -7-)

Bulletin 1 - Critical - Remote Code Execution - May require restart - Microsoft Office
Bulletin 2 - Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework, Microsoft Silverlight, Microsoft Office
Bulletin 3 - Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework
Bulletin 4 - Important - Remote Code Execution - May require restart - Microsoft Office
Bulletin 5 - Important - Remote Code Execution - May require restart - Microsoft Office
Bulletin 6 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
Bulletin 7 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
___

- https://www.computerworld.com/s/article/9226846/Microsoft_plans_big_May_patch_slate_for_next_week
May 03, 2012 - "... to patch 23 bugs in Windows, Office and its Silverlight and .Net development platforms..."

- http://h-online.com/-1568457
4 May 2012

.
 
Last edited:
MS Security Bulletin Summary - May 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-may
May 08, 2012 - "This bulletin summary lists security bulletins released for May 2012...
(Total of -7-)

Critical -3-

Microsoft Security Bulletin MS12-029 - Critical
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352)
- https://technet.microsoft.com/en-us/security/bulletin/MS12-029
Critical - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS12-034 - Critical
Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)
- https://technet.microsoft.com/en-us/security/bulletin/ms12-034
Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework, Microsoft Silverlight, Microsoft Office

Microsoft Security Bulletin MS12-035 - Critical
Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2693777)
- https://technet.microsoft.com/en-us/security/bulletin/ms12-035
Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework

Important -4-

Microsoft Security Bulletin MS12-030 - Important
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2663830)
- https://technet.microsoft.com/en-us/security/bulletin/ms12-030
Important - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS12-031 - Important
Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2597981)
- https://technet.microsoft.com/en-us/security/bulletin/MS12-031
Important - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS12-032 - Important
Vulnerability in TCP/IP Could Allow Elevation of Privilege (2688338)
- https://technet.microsoft.com/en-us/security/bulletin/ms12-032
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS12-033 - Important
Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege (2690533)
- https://technet.microsoft.com/en-us/security/bulletin/ms12-033
Important - Elevation of Privilege - Requires restart - Microsoft Windows
___

- https://blogs.technet.com/b/msrc/ar...d-the-may-2012-bulletins.aspx?Redirected=true

Bulletin Deployment Priority
- https://blogs.technet.com/cfs-files..._5F00_Deployment_5F00_Priority_5F00_Slide.PNG

Severity and Exploitability Index
- https://blogs.technet.com/cfs-files...5F00_Exploitability_5F00_Index_5F00_Slide.PNG
___

ISC Analysis
- https://isc.sans.edu/diary.html?storyid=13159
Last Updated: 2012-05-08 18:06:14 UTC

- http://blogs.iss.net/archive/2012_05_MSFT_Super_T.html
• MS12-034: Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight...
-Ten- vulnerabilities are addressed in this update, three of which are listed as publicly disclosed. The updates touch many parts of the operating system...
• MS12-035: Vulnerabilities in .NET Framework Could Allow Remote Code Execution
Two more vulnerabilities in .NET are addressed... These are separate vulnerabilities, but each involve problems in code responsible for serializing/deserializing data from/into an object. Exploitation via specially crafted .NET code can result in arbitrary code execution...
• MS12-029: Vulnerability in Microsoft Word Could Allow Remote Code Execution
A single vulnerability in Microsoft Office's RTF parser is addressed... This vulnerability can be exploited for remote code execution... The RTF parser is shared among Office components so vulnerabilities in the parser can be exploited via an email in Outlook rendered as RTF as well as document attachments.
___

- https://secunia.com/advisories/49111/ - MS12-029
- https://secunia.com/advisories/49112/ - MS12-030
- https://secunia.com/advisories/49113/ - MS12-031
- https://secunia.com/advisories/49114/ - MS12-032
- https://secunia.com/advisories/49115/ - MS12-033
- https://secunia.com/advisories/49119/ - MS12-034
- https://secunia.com/advisories/49120/ - MS12-034
- https://secunia.com/advisories/49121/ - MS12-034
- https://secunia.com/advisories/49122/ - MS12-034
- https://secunia.com/advisories/49117/ - MS12-035

- http://www.securitytracker.com/id/1027035 - MS12-029
- http://www.securitytracker.com/id/1027041 - MS12-030
- http://www.securitytracker.com/id/1027042 - MS12-031
- http://www.securitytracker.com/id/1027044 - MS12-032
- http://www.securitytracker.com/id/1027043 - MS12-033
- http://www.securitytracker.com/id/1027038 - MS12-034
- http://www.securitytracker.com/id/1027039 - MS12-034
- http://www.securitytracker.com/id/1027040 - MS12-034
- http://www.securitytracker.com/id/1027048 - MS12-034
- http://www.securitytracker.com/id/1027035 - MS12-035
___

MSRT
- http://support.microsoft.com/?kbid=890830
May 8, 2012 - Revision: 102.0
(Recent additions)
- http://www.microsoft.com/security/pc-security/malware-families.aspx
... added this release...
• Dishigy
• Unruy

Download:
- http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=16
File Name: Windows-KB890830-V4.8.exe - 15.4 MB
- https://www.microsoft.com/download/en/details.aspx?id=9905
x64 version of MSRT:
File Name: Windows-KB890830-x64-V4.8.exe - 16.0 MB

.
 
Last edited:
MS12-034 buggy, maybe ...

FYI...

MS12-034 buggy...

- http://support.microsoft.com/kb/2686509
Article ID: 2686509 - Last Review: May 16, 2012 - Revision: 3.0

Maurice N - MS MVP 2002-2010 - AumHa moderator & VSOP - DTS-L - malwarebytes.org forum moderator
- http://answers.microsoft.com/en-us/...b2676562/a44d3cf4-ffb4-4d78-9aa4-793d01b483db
May 9, 2012 - "... Open Internet Explorer (only!) to
- http://support.microsoft.com/kb/923737 [ignore any DOES NOT APPLY warnings as well as the APPLIES TO section] & run the Fix It.
Note=> For optimal results, check the Delete personal settings option.
1a. Open Internet Explorer (only!) to
- http://support.microsoft.com/kb/910336 [ignore the title & Symptoms].
1b. Dismiss/close the "automated troubleshooter" pop-up! - then...
1c. Ignoring any "Not recommended" or similar warnings, run Fix It 50202 in DEFAULT mode (if on a later run you still have the same failure, then repeat the above steps & then select the Agressive mode).
2. Reboot & then run a manual check for updates at Windows Update, etc., etc...
When you reach Windows Update, do a Custom scan for updates. Take (accept) the ones marked Critical or Important.
Decline any that are marked as "optional".
Have infinite patience while it scans and does it's work.
When it prompts you to Restart Windows, please do that. Allow it to restart.
Visit Windows Update via Start >> All Programs >> Windows Update
or Internet Explorer >> Tools >> Windows Update "

-or-

MS12-034: KB2686509 - Failure - due to remapping of a key
- https://social.technet.microsoft.co...686509-failure-due-to-remapping-of-a-key.aspx

-or-

Problem with MS12-034 / KB 2676562 patch
- http://www.askwoody.com/2012/problem-with-ms12-034-kb-2676562-patch/
May 9, 2012

:rolleyes: :confused:
 
Last edited:
Windows XP in update loop

FYI...

Windows XP in update loop
- http://h-online.com/-1582649
23 May 2012 - "Users of Windows XP are reporting more problems with recent automatic updates. Three security updates for .NET Framework 2.0 and 3.5 are at the centre of the problem, labelled as patches KB2518664, KB2572073 and KB2633880 in Windows XP's automatic update feature.
On affected systems, the installation of these patches proceeds without error but after a short time, the update service says it would like to install them again and will keep reinstalling the patches if allowed. Microsoft's general advice in this situation is to reset Windows Update components*, though it has yet to offer any specific advice. It is interesting to note that the three patches in question were -not- released on Microsoft's official patch day."
* http://support.microsoft.com/kb/910339
Last Review: May 18, 2012 - Revision: 14.1

MS11-044: http://support.microsoft.com/kb/2518864
Last Review: May 15, 2012 - Revision: 3.1
MS11-078: http://support.microsoft.com/kb/2572073
Last Review: October 11, 2011 - Revision: 1.1
MS12-016: http://support.microsoft.com/kb/2633880
Last Review: February 14, 2012 - Revision: 1.0
___

- http://msmvps.com/blogs/bradley/arc...mond-wakes-up-and-fixes-microsoft-update.aspx
"... Now fixed, and the Microsoft securty bulletin alert indicates that some of these updates got a detection change..."

- https://technet.microsoft.com/en-us/security/bulletin/ms12-035
• V2.1 (May 22, 2012): Added entry to the update FAQ to announce a detection change for KB2604092 for Microsoft .NET Framework 2.0 Service Pack 2 and KB2604110 for Microsoft .NET Framework 3.0 Service Pack 2 to correct an installation issue...

:sad:
 
Last edited:
MS Security Bulletin Advance Notification - June 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-jun
June 07, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on June 12, 2012...
(Total of -7-)

Bulletin 1 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 2 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Bulletin 3 - Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework
Bulletin 4 - Important - Remote Code Execution - May require restart - Microsoft Office, Microsoft Visual Basic for Applications
Bulletin 5 - Important - Elevation of Privilege - May require restart - Microsoft Dynamics AX
Bulletin 6 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
Bulletin 7 - Important - Elevation of Privilege - Requires restart - Microsoft Windows

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
7 Jun 2012 - "... This month’s release includes 7 bulletins addressing 25 vulnerabilities..."

.
 
Last edited:
MS Security Bulletin Advance Notification - July 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-jul
July 05, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on July 10, 2012...
(Total of -9-)

Bulletin 1 - Critical - Remote Code Execution - May require restart - Microsoft Windows
Bulletin 2 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Bulletin 3 - Critical - Remote Code Execution - May require restart - Microsoft Windows
Bulletin 4 - Important - Remote Code Execution - May require restart - Microsoft Office, Microsoft Developer Tools
Bulletin 5 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
Bulletin 6 - Important - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 7 - Important - Information Disclosure - Requires restart - Microsoft Windows
Bulletin 8 - Important - Elevation of Privilege - May require restart - Microsoft Office, Microsoft Server Software
Bulletin 9 - Important - Elevation of Privilege - Does not require restart - Microsoft Office

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
5 Jul 2012 -"... includes nine bulletins addressing 16 vulnerabilities in Microsoft Windows, Microsoft Office, Internet Explorer, and Visual Basic for Applications..."

.
 
MS Bulletin Advance Notification - August 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-aug
August 09, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on August 14, 2012...
(Total of -9-)

Bulletin 1 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Bulletin 2 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 3 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 4 - Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft SQL Server, Microsoft Server Software, Microsoft Developer Tools
Bulletin 5 - Critical - Remote Code Execution - Does not require restart - Microsoft Exchange

Bulletin 6 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
Bulletin 7 - Important - Remote Code Execution - May require restart - Microsoft Windows
Bulletin 8 - Important - Remote Code Execution - May require restart - Microsoft Office
Bulletin 9 - Important - Remote Code Execution - May require restart - Microsoft Office
___

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
9 Aug 2012 - "... The five Critical security bulletins are addressing ten vulnerabilities in Microsoft Windows, Internet Explorer, Exchange, SQL Server, Server Software, and Developer Tools. The bulletin for Exchange will address the issue first described in Security Advisory 2737111*. The four bulletins that have been rated as Important will address vulnerabilities in Windows and Microsoft Office..."
* http://technet.microsoft.com/en-us/security/advisory/2737111

.
 
Last edited:
RE: MS Bulletin Advance Notification - August 2012

FYI...

Critical non-security update to be released :confused:
- https://blogs.technet.com/b/gladiat...oming-certificate-update.aspx?Redirected=true
9 Aug 2012 - "... Next week a security fix will be widely distributed which will prevent use of certificates which use weak (less than 1024 bit) RSA keys. Microsoft will issue a critical non-security update (KB 2661254) for Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. The update will block the use of cryptographic keys that are less than 1024 bits. You could potentially run into issues as it may cause outages for those who have services that leverage IIS or any other application or service (client side or server side) if those services rely on those weak certificates..."

:oops:
 
MS Security Bulletin Advance Notification - October 2012

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms12-oct
October 04, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on October 9, 2012...
(Total of -7-)

Bulletin 1 - Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Server Software
Bulletin 2 - Important - Remote Code Execution - May require restart - Microsoft Office
Bulletin 3 - Important - Elevation of Privilege - May require restart - Microsoft Office, Microsoft Server Software, Microsoft Lync
Bulletin 4 - Important - Remote Code Execution - May require restart - Microsoft Office, Microsoft Server Software
Bulletin 5 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
Bulletin 6 - Important - Denial of Service - Requires restart - Microsoft Windows
Bulletin 7 - Important - Elevation of Privilege - May require restart - Microsoft SQL Server
___

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
4 Oct 2012 - "... advance notification of the release of seven bulletins, one Critical and six Important, which address 20 vulnerabilities for October 2012. The Critical bulletin addresses vulnerabilities in Microsoft Word. The six Important-rated bulletins will address issues in Windows, Microsoft Office, and SQL Server. This release will also address the issue in FAST Search Server first described in Security Advisory 2737111*... we’ll provide the update we described in Security Advisory 2661254** through Windows Update next Tuesday. We previously made this release available through the download center for manual deployment and testing. Releasing KB2661254 to Automatic Updates and requiring that RSA key lengths be a minimum of 1024 bits will be our final step in this effort to help customers strengthen their certificates..."

* https://technet.microsoft.com/en-us/security/advisory/2737111
Updated: Aug 14, 2012 - Version: 2.0

** https://technet.microsoft.com/en-us/security/advisory/2661254
Updated: Sep 11, 2012 - Version: 1.2

.
 
Last edited:
MS Security Bulletin Advance Notification - November 2012

FYI...

- http://technet.microsoft.com/en-us/security/bulletin/ms12-nov
November 08, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on November 13, 2012...
(Total of -6-)

Bulletin 1 - Critical - Remote Code Execution - Restart required - Microsoft Windows, Internet Explorer
Bulletin 2 - Critical - Remote Code Execution - Restart required - Microsoft Windows
Bulletin 4 - Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework
Bulletin 5 - Critical - Remote Code Execution - Restart required - Microsoft Windows
Bulletin 6 - Important - Remote Code Execution - May require restart - Microsoft Office
Bulletin 3 - Moderate - Information Disclosure - May require restart - Microsoft Windows

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
8 Nov 2012 - "... advance notification for six bulletins to help protect customers against 19 CVEs. The four Critical-rated updates will address 13 vulnerabilities in Microsoft Windows, Internet Explorer and the .NET Framework. One bulletin rated Important will address four vulnerabilities in Microsoft Office and finally, one Moderate update will address two issues in Microsoft Windows..."

.
 
MS Security Bulletin Advance Notification - December 2012

FYI...

- http://technet.microsoft.com/en-us/security/bulletin/ms12-dec
Dec 06, 2012 - "This is an advance notification of security bulletins that Microsoft is intending to release on December 11, 2012...
(Total of -7-)

Bulletin 1 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Bulletin 2 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 3 - Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Server Software
Bulletin 4 - Critical - Remote Code Execution - May require restart - Microsoft Server Software
Bulletin 5 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 6 - Important - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 7 - Important - Security Feature Bypass - Requires restart - Microsoft Windows
___

- https://blogs.technet.com/b/msrc/ar...ecurity-bulletin-release.aspx?Redirected=true
6 Dec 2012 - "... five Critical and two Important, which address 11 vulnerabilities. The Critical bulletins address vulnerabilities in Microsoft Windows, Word, Windows Server and Internet Explorer. The two Important-rated bulletins will address issues in Microsoft Windows..."

.
 
Last edited:
MS Security Bulletin Advance Notification - Jan 2013

FYI...

MS Security Bulletin Advance Notification - Jan 2013
- http://technet.microsoft.com/en-us/security/bulletin/ms13-jan
Jan 03, 2013 - "This is an advance notification of security bulletins that Microsoft is intending to release on January 8, 2013...
(Total of -7-)

Bulletin 1 - Critical - Remote Code Execution - Requires restart - Microsoft Windows
Bulletin 2 - Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft Office, Microsoft Developer Tools, Microsoft Server Software
Bulletin 3 - Important - Elevation of Privilege - Does not require restart - Microsoft Server Software
Bulletin 4 - Important - Elevation of Privilege - May require restart - Microsoft Windows, Microsoft .NET Framework
Bulletin 5 - Important - Elevation of Privilege - Requires restart - Microsoft Windows
Bulletin 6 - Important - Security Feature Bypass - Requires restart - Microsoft Windows
Bulletin 7 - Important - Denial of Service - May require restart - Microsoft Windows, Microsoft .NET Framework

.
 
Back
Top