23 Patched vulnerabilities in Microsoft Software

Microsoft has found and patched 23 vulnerabilities in software products hers. Some of it is classified as a critical gap.

This was conveyed by Microsoft in its monthly report for May 2012. List of vulnerabilities includes products Office, Windows, Net Framework and Silverlight.

The worst scenario of all is to make this vulnerability an attacker can control the system, including the execution of malicious code.

One of the weaknesses that exist in Microsoft Office. An attacker could execute code on the system. Attacks carried out through a document file Rich Text Format (RTF).

This issue is critical to Microsoft Word 2007. As for the Word 2003, Office 2008 for Mac and Office for Mac 2011, this issue is labeled "Important".

Next, there were 10 vulnerabilities in Office programs, Windows,. NET Framework and Silverlight. The most dangerous vulnerability when a user is tricked to open an infected document or visit the website font was embedded TruType malware ridden.

In the third bulletin, addressed two vulnerabilities in the. NET that could pave the way for an attacker to execute code remotely.

To perform a successful exploitation, the user will be brought to visit an infected web page using a browser that can run XAML Browser Application (XBAPs).

Four other bulletin includes six vulnerabilities in Office. Products that are shown to be susceptible to attack by Excel 2003, Excel 2007, Office 2007, Excel 2010, Office 2010, Office 2008 for Mac, and Office for Mac 2011, including Excel Viewer and Office Compatibility Pack.

Users who have automatic settings to accept patches from Microsoft do not need to do anything because Microsoft had to install it automatically.

For users who want to install it manually, can do that as follows:

Click on the Start button
Click on All Programs
Select Windows Update.
Click Check for Updates to PC / Laptop can download the latest upadate from Microsoft.
Windows Press || 23 Patched vulnerabilities in Microsoft Software

0 comments:

Post a Comment