[Bigfix-announcements-french] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (French)'

autonotify at us.ibm.com autonotify at us.ibm.com
Tue Jan 24 04:36:45 PST 2012


Fixlet Site - 'Patches for Windows (French)'
Current Version: 417	Published: Mon, 23 Jan 2012 23:56:24  GMT

New Fixlets:
============

***************************************************************
Title: UPDATE: Compatibility Pack for Office 2007 Service Pack 3 Available (French)
Severity: <Unspecified>
Fixlet ID: 64009
Fixlet Link: http://support.microsoft.com/kb/2526297

Fixlet Description: Microsoft Office Compatibility Pack Service Pack 3 (SP3) provides the latest updates to Office Compatibility Pack. These updates include two main categories of fixes:   Previously unreleased fixes that were made specifically for this service pack. In addition to general product fixes, this includes improvements in stability, performance, and security. All the public updates, security updates, cumulative updates, and hotfixes that were released through August 2011.

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Visio Viewer 2010 (x64) (French)
Severity: Important
Fixlet ID: 1108919
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS11-089: Vulnerability in Microsoft Office Could Allow Remote Code Execution - Visio 2010 (x64) (French)
Severity: Important
Fixlet ID: 1108923
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS11-089
Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. var isEvansOrLater = '' == 'True'?true:false; document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try {if (isEvansOrLater) { dashboardLink.innerHTML = Relevance('(format "Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the {0}.?>" + link "" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string ) as string');} else { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."');} } catch (e) {if (isEvansOrLater) { dashboardLink.innerHTML ='Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.?>';} else { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.';} } }

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2003 SP2 (French)
Severity: Important
Fixlet ID: 1200103
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200104
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-001

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Vista SP2 (French)
Severity: Important
Fixlet ID: 1200107
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows Server 2008 SP2 (French)
Severity: Important
Fixlet ID: 1200111
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-001: Vulnerability in Windows Kernel Could Allow Security Feature Bypass - Windows 7 Gold/SP1 (French)
Severity: Important
Fixlet ID: 1200115
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-001

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-002: Vulnerability in Windows Object Packager Could Allow Remote Code Execution - Windows XP SP3 (French)
Severity: Important
Fixlet ID: 1200201
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-002

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-002: Vulnerability in Windows Object Packager Could Allow Remote Code Execution - Windows Server 2003 SP2 (French)
Severity: Important
Fixlet ID: 1200205
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-002

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 (French)
Severity: Important
Fixlet ID: 1200301
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200302
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-003

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 (French)
Severity: Important
Fixlet ID: 1200305
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200306
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-003

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Vista SP2 (French)
Severity: Important
Fixlet ID: 1200309
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-003: Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege - Windows Server 2008 SP2 (French)
Severity: Important
Fixlet ID: 1200313
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-003

Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP SP3 (French)
Severity: Critical
Fixlet ID: 1200401
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1200402
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP Media Center Edition 2005 SP3 (French)
Severity: Important
Fixlet ID: 1200403
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP Media Center Edition 2005 SP3 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200404
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP Media Center Edition 2005 SP3 (French)
Severity: Critical
Fixlet ID: 1200405
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows XP Media Center Edition 2005 SP3 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1200406
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2003 SP2 (French)
Severity: Critical
Fixlet ID: 1200411
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Critical
Fixlet ID: 1200412
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2003 SP2 (French)
Severity: Important
Fixlet ID: 1200413
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200414
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Vista SP2 (French)
Severity: Critical
Fixlet ID: 1200419
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Vista SP2 (French)
Severity: Important
Fixlet ID: 1200421
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Multimedia Library - Windows Server 2008 SP2 (French)
Severity: Critical
Fixlet ID: 1200427
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows Server 2008 SP2 (French)
Severity: Important
Fixlet ID: 1200429
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows 7 Gold/SP1 (French)
Severity: Important
Fixlet ID: 1200435
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - Windows Media Center TV Pack - Windows Vista SP1/SP2 (French)
Severity: Important
Fixlet ID: 1200441
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP SP3 (French)
Severity: Important
Fixlet ID: 1200445
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.

***************************************************************
Title: MS12-004: Vulnerabilities in Windows Media Could Allow Remote Code Execution - DirectShow - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200446
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-004

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP3 (French)
Severity: Important
Fixlet ID: 1200501
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200502
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 (French)
Severity: Important
Fixlet ID: 1200505
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200506
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Vista SP2 (French)
Severity: Important
Fixlet ID: 1200509
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows Server 2008 SP2 (French)
Severity: Important
Fixlet ID: 1200513
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-005: Vulnerability in Microsoft Windows Could Allow Remote Code Execution - Windows 7 Gold/SP1 (French)
Severity: Important
Fixlet ID: 1200517
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-005

Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP3 (French)
Severity: Important
Fixlet ID: 1200601
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows XP SP3 - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200602
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2585542) (French)
Severity: Important
Fixlet ID: 1200607
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2585542) - CORRUPT PATCH (French)
Severity: Important
Fixlet ID: 1200608
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2003 SP2 (KB2638806) (French)
Severity: Important
Fixlet ID: 1200609
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Vista SP2 (French)
Severity: Important
Fixlet ID: 1200615
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows Server 2008 SP2 (French)
Severity: Important
Fixlet ID: 1200619
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.

***************************************************************
Title: MS12-006: Vulnerability in SSL/TLS Could Allow Information Disclosure - Windows 7 Gold/SP1 (French)
Severity: Important
Fixlet ID: 1200623
Fixlet Link: http://technet.microsoft.com/FR-FR/security/bulletin/MS12-006

Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.



More information about the BigFix-Announcements-French mailing list