[BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Enterprise Security'
autonotify at us.ibm.com
autonotify at us.ibm.com
Wed Oct 12 02:02:53 PDT 2011
Fixlet Site - 'Enterprise Security'
Current Version: 1530 Published: Wed, 12 Oct 2011 05:11:01 GMT
New Fixlets:
============
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows XP SP3
Severity: Important
Fixlet ID: 1107501
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107502
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows XP SP2 (x64)
Severity: Important
Fixlet ID: 1107503
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107504
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2003 SP2
Severity: Important
Fixlet ID: 1107505
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107506
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64)
Severity: Important
Fixlet ID: 1107507
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107508
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Vista SP2
Severity: Important
Fixlet ID: 1107509
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Vista SP2 (x64)
Severity: Important
Fixlet ID: 1107511
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2008 SP2
Severity: Important
Fixlet ID: 1107513
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64)
Severity: Important
Fixlet ID: 1107515
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows 7 Gold/SP1
Severity: Important
Fixlet ID: 1107517
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
Severity: Important
Fixlet ID: 1107519
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)
Severity: Important
Fixlet ID: 1107521
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-075
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Active Accessibility component. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, the Microsoft Active Accessibility component could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows Vista SP2
Severity: Important
Fixlet ID: 1107601
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-076
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows Vista SP2 (x64)
Severity: Important
Fixlet ID: 1107603
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-076
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows 7 Gold/SP1
Severity: Important
Fixlet ID: 1107605
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-076
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
Severity: Important
Fixlet ID: 1107607
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-076
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows Media Center TV Pack - Windows Vista SP2
Severity: Important
Fixlet ID: 1107609
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-076
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution - Windows Media Center TV Pack - Windows Vista SP2 (x64)
Severity: Important
Fixlet ID: 1107611
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-076
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Windows Media Center. The vulnerability could allow remote code execution if an attacker convinces a user to open a legitimate file that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Media Center could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3
Severity: Important
Fixlet ID: 1107701
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107702
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP2 (x64)
Severity: Important
Fixlet ID: 1107703
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows XP SP2 (x64) - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107704
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2
Severity: Important
Fixlet ID: 1107705
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107706
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64)
Severity: Important
Fixlet ID: 1107707
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
Severity: Important
Fixlet ID: 1107708
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2
Severity: Important
Fixlet ID: 1107709
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Vista SP2 (x64)
Severity: Important
Fixlet ID: 1107711
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2
Severity: Important
Fixlet ID: 1107713
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 SP2 (x64)
Severity: Important
Fixlet ID: 1107715
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1
Severity: Important
Fixlet ID: 1107717
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows 7 Gold/SP1 (x64)
Severity: Important
Fixlet ID: 1107719
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution - Windows Server 2008 R2 Gold/SP1 (x64)
Severity: Important
Fixlet ID: 1107721
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-077
Fixlet Description: Microsoft has released a security update that resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted font file (such as a .fon file) in a network share, a UNC or WebDAV location, or an e-mail attachment. For a remote attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open the specially crafted font file, or open the file as an e-mail attachment After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 1.0 SP3 - Tablet PC/Media Center Edition
Severity: Critical
Fixlet ID: 1107801
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 1.0 SP3 - Tablet PC/Media Center Edition - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1107802
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows XP / Vista / 2008
Severity: Critical
Fixlet ID: 1107803
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP3 / Windows Server 2003 SP2
Severity: Critical
Fixlet ID: 1107805
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP3 / Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1107806
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 4 - Windows XP / 2003 / Vista / 2008 / 7
Severity: Critical
Fixlet ID: 1107807
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows XP SP2 / Windows Server 2003 SP2 (x64)
Severity: Critical
Fixlet ID: 1107809
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows XP / 2003 / Vista / 2008 (x64)
Severity: Critical
Fixlet ID: 1107811
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows Server 2003 SP2
Severity: Critical
Fixlet ID: 1107813
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 1.1 SP1 - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1107814
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 4 - Windows XP / 2003 / Vista / 2008 / 7 /2008 R2 (x64)
Severity: Critical
Fixlet ID: 1107815
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2
Severity: Critical
Fixlet ID: 1107817
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 2.0 SP2 - Windows Vista SP2 / Windows Server 2008 SP2 (x64)
Severity: Critical
Fixlet ID: 1107819
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 Gold
Severity: Critical
Fixlet ID: 1107821
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 SP1
Severity: Critical
Fixlet ID: 1107823
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 / Windows Server 2008 R2 Gold (x64)
Severity: Critical
Fixlet ID: 1107825
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft .NET Framework 3.5.1 - Windows 7 SP1 / Windows Server 2008 R2 SP1 (x64)
Severity: Critical
Fixlet ID: 1107827
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft Silverlight 4
Severity: Critical
Fixlet ID: 1107829
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution - Microsoft Silverlight 4 for Developers
Severity: Critical
Fixlet ID: 1107831
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-078
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-079: Vulnerabilities in Microsoft Forefront Unified Access Gateway Could Cause Remote Code Execution - Microsoft Forefront Unified Access Gateway 2010
Severity: Important
Fixlet ID: 1107901
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-079
Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Important Note: IBM testing has confirmed this security patch applies correctly to systems only when manually run.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-079: Vulnerabilities in Microsoft Forefront Unified Access Gateway Could Cause Remote Code Execution - Microsoft Forefront Unified Access Gateway 2010 Update 1
Severity: Important
Fixlet ID: 1107903
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-079
Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Important Note: IBM testing has confirmed this security patch applies correctly to systems only when manually run.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-079: Vulnerabilities in Microsoft Forefront Unified Access Gateway Could Cause Remote Code Execution - Microsoft Forefront Unified Access Gateway 2010 Update 2
Severity: Important
Fixlet ID: 1107905
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-079
Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Important Note: IBM testing has confirmed this security patch applies correctly to systems only when manually run.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-079: Vulnerabilities in Microsoft Forefront Unified Access Gateway Could Cause Remote Code Execution - Microsoft Forefront Unified Access Gateway 2010 SP1
Severity: Important
Fixlet ID: 1107907
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-079
Fixlet Description: Microsoft has released a security update that resolves five privately reported vulnerabilities in Microsoft Forefront Unified Access Gateway (UAG). The most severe of these vulnerabilities could allow remote code execution if a user visits an affected Web site using a specially crafted URL. However, an attacker would have no way to force users to visit such a Web site. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information.
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP3
Severity: Important
Fixlet ID: 1108001
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1108002
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64)
Severity: Important
Fixlet ID: 1108003
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows XP SP2 (x64) - CORRUPT PATCH
Severity: Important
Fixlet ID: 1108004
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2
Severity: Important
Fixlet ID: 1108005
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1108006
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64)
Severity: Important
Fixlet ID: 1108007
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in the Microsoft Windows Ancillary Function Driver (AFD). The vulnerability could allow elevation of privilege if an attacker logs on to a user's system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
Severity: Important
Fixlet ID: 1108008
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-080
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3
Severity: Critical
Fixlet ID: 1108101
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP3 - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1108102
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64)
Severity: Critical
Fixlet ID: 1108103
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows XP SP2 (x64) - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1108104
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2
Severity: Moderate
Fixlet ID: 1108105
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Moderate
Fixlet ID: 1108106
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64)
Severity: Moderate
Fixlet ID: 1108107
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 6 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
Severity: Moderate
Fixlet ID: 1108108
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3
Severity: Critical
Fixlet ID: 1108109
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP3 - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1108110
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64)
Severity: Critical
Fixlet ID: 1108111
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows XP SP2 (x64) - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1108112
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2
Severity: Moderate
Fixlet ID: 1108113
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Moderate
Fixlet ID: 1108114
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64)
Severity: Moderate
Fixlet ID: 1108115
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
Severity: Moderate
Fixlet ID: 1108116
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2
Severity: Critical
Fixlet ID: 1108117
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Vista SP2 (x64)
Severity: Critical
Fixlet ID: 1108119
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2
Severity: Moderate
Fixlet ID: 1108121
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 7 - Windows Server 2008 SP2 (x64)
Severity: Moderate
Fixlet ID: 1108123
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3
Severity: Critical
Fixlet ID: 1108125
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP3 - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1108126
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64)
Severity: Critical
Fixlet ID: 1108127
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows XP SP2 (x64) - CORRUPT PATCH
Severity: Critical
Fixlet ID: 1108128
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2
Severity: Moderate
Fixlet ID: 1108129
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 - CORRUPT PATCH
Severity: Moderate
Fixlet ID: 1108130
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64)
Severity: Moderate
Fixlet ID: 1108131
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2003 SP2 (x64) - CORRUPT PATCH
Severity: Moderate
Fixlet ID: 1108132
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2
Severity: Critical
Fixlet ID: 1108133
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Vista SP2 (x64)
Severity: Critical
Fixlet ID: 1108135
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2
Severity: Moderate
Fixlet ID: 1108137
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 SP2 (x64)
Severity: Moderate
Fixlet ID: 1108139
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1
Severity: Critical
Fixlet ID: 1108141
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows 7 Gold/SP1 (x64)
Severity: Critical
Fixlet ID: 1108143
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 8 - Windows Server 2008 R2 Gold/SP1 (x64)
Severity: Moderate
Fixlet ID: 1108145
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2
Severity: Critical
Fixlet ID: 1108147
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows Vista SP2 (x64)
Severity: Critical
Fixlet ID: 1108149
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2
Severity: Moderate
Fixlet ID: 1108151
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 SP2 (x64)
Severity: Moderate
Fixlet ID: 1108153
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1
Severity: Critical
Fixlet ID: 1108155
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows 7 Gold/SP1 (x64)
Severity: Critical
Fixlet ID: 1108157
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-081: Cumulative Security Update for Internet Explorer - IE 9 - Windows Server 2008 R2 Gold/SP1 (x64)
Severity: Moderate
Fixlet ID: 1108159
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-081
Fixlet Description: Microsoft has released a security update that resolves eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service - Microsoft Host Integration Server 2004 SP1
Severity: Important
Fixlet ID: 1108201
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-082
Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service - Microsoft Host Integration Server 2004 SP1 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1108202
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-082
***************************************************************
Title: MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service - Microsoft Host Integration Server 2006 SP1
Severity: Important
Fixlet ID: 1108203
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-082
Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service - Microsoft Host Integration Server 2006 SP1 - CORRUPT PATCH
Severity: Important
Fixlet ID: 1108204
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-082
***************************************************************
Title: MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service - Microsoft Host Integration Server 2009
Severity: Important
Fixlet ID: 1108205
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-082
Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service - Microsoft Host Integration Server 2010
Severity: Important
Fixlet ID: 1108207
Fixlet Link: http://technet.microsoft.com/en-us/security/bulletin/MS11-082
Fixlet Description: Microsoft has released a security update that resolves two publicly disclosed vulnerabilities in Host Integration Server. The vulnerabilities could allow denial of service if a remote attacker sends specially crafted network packets to a Host Integration Server listening on UDP port 1478 or TCP ports 1477 and 1478. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. In this case, the Host Integration Server ports should be blocked from the Internet. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
More information about the BigFix-Announcements
mailing list