Risks
Advisories
Browse
or
or
US-CERT Technical Cyber Security Alert - Microsoft Updates for Multiple Vulnerabilities (TA12-346A)
National Cyber Awareness System

US-CERT Alert TA12-346A
Microsoft Updates for Multiple Vulnerabilities

Original release date: December 11, 2012
Last revised: --

Systems Affected

     * Microsoft Windows
     * Microsoft Office
     * Microsoft Server Software
     * Internet Explorer


Overview

   Select Microsoft software products contain multiple
   vulnerabilities. Microsoft has released updates to address these
   vulnerabilities.


Description

   The Microsoft Security Bulletin Summary for December 2012 describes
   multiple vulnerabilities in Microsoft software. Microsoft has
   released updates to address the vulnerabilities.


Impact

   A remote, unauthenticated attacker could execute arbitrary code,
   cause a denial of service, or gain unauthorized access to your
   files or system.


Solution

   Apply Updates

   Microsoft has provided updates for these vulnerabilities in the
   Microsoft Security Bulletin Summary for December 2012, which
   describes any known issues related to the updates. Administrators
   are encouraged to note these issues and test for any potentially
   adverse effects. In addition, administrators should consider using
   an automated update distribution system such as Windows Server
   Update Services (WSUS). Home users are encouraged to enable
   automatic updates.


References

 * Microsoft Security Bulletin Summary for December 2012
   <http://technet.microsoft.com/en-us/security/bulletin/ms12-dec>

 * Microsoft Windows Server Update Services
   <http://technet.microsoft.com/en-us/wsus/default.aspx>

 * Microsoft Update
   <http://www.update.microsoft.com/>

 * Microsoft Update Overview
   <http://www.microsoft.com/security/updates/mu.aspx>

 * Turn Automatic Updating On or Off
  
<http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-of
f>


Revision History

  December 11, 2012: Initial release

 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA12-346A Feedback VU#298708" in
   the subject.
 ____________________________________________________________________

   Produced by US-CERT, a government organization.
 ____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA12-346A.html

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //