Technical Cyber Security Alert 2012-129A - Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.
75fccf2e8e012cc3a8e1b370e3245032e4047ccd7d4ba37e2af8c0c1463324cb
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA12-129A
Microsoft Updates for Multiple Vulnerabilities
Original release date: May 08, 2012
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft .NET Framework
* Microsoft Office
* Microsoft Silverlight
Overview
Select Microsoft software products contain multiple
vulnerabilities. Microsoft has released updates to address these
vulnerabilities.
Description
The Microsoft Security Bulletin Summary for May 2012 describes
multiple vulnerabilities in Microsoft software. Microsoft has
released updates to address the vulnerabilities.
Impact
A remote, unauthenticated attacker could execute arbitrary code,
cause a denial of service, or gain unauthorized access to your
files or system.
Solution
Apply updates
Microsoft has provided updates for these vulnerabilities in the
Microsoft Security Bulletin Summary for May 2012, which describes
any known issues related to the updates. Administrators are
encouraged to note these issues and test for any potentially
adverse effects. In addition, administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS). Home users are encouraged to enable
automatic updates.
References
* Microsoft Security Bulletin Summary for May 2012 -
<http://technet.microsoft.com/en-us/security/bulletin/ms12-may>
* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>
* Microsoft Update - <https://www.update.microsoft.com/>
* Microsoft Update Overview -
<http://www.microsoft.com/security/updates/mu.aspx>
* Turn Automatic Updating On or Off -
<http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off>
Revision History
May 08, 2012: Initial release
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA12-129A Feedback VU#171819" in
the subject.
____________________________________________________________________
Produced by US-CERT, a government organization.
____________________________________________________________________
This product is provided subject to the Notification as indicated here:
http://www.us-cert.gov/legal.html#notify
This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA12-129A.html
For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBT6mJfz/GkGVXE7GMAQJJhgf+MFmeEmhH/2lZoIj33E/vCY4+K5KEEx9C
gNdJA76LpQTT/G3H8kmJ5i4uCCkOZYDjvVF6MAeK2vqVwVLaLL7dR3PomDWIGGZX
hwvlrh290nuBjATPtNx1ovHxQa6V/xEkGeDGJKFXjf9CCbjDDOXfHgJJyJzAVbI7
+iMj2Q4cZjTsS80t9z4y+vg33OcblAGJv8wKuDblhu910gincsojJSUwCtAck3OS
KAatL882RcqeFs0uQdm9I+uV2/l86E9/PG1BDgaCx/cfOgVuxx7pXNdffNyP5Dh8
Bq3WKmmPNI8MDVl8kzWNbYYZ9egAWG+f2Cl0E70w9AG+1fNnzo48tQ==
=jejg
-----END PGP SIGNATURE-----