[BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows (English)'
autonotify at us.ibm.com
autonotify at us.ibm.com
Wed Oct 15 02:04:37 PDT 2014
Fixlet Site - 'Patches for Windows (English)'
Current Version: 2098 Published: Wed, 15 Oct 2014 01:28:54 GMT
New Fixlets:
============
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB2987107
Severity: Critical
Fixlet ID: 1405601
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405603
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB2987107
Severity: Moderate
Fixlet ID: 1405605
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8 Gold - IE 10 - KB2987107
Severity: Critical
Fixlet ID: 1405607
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405609
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 10 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405611
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405613
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 8 - KB2987107
Severity: Critical
Fixlet ID: 1405615
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405617
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 10 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405619
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405621
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB2987107
Severity: Critical
Fixlet ID: 1405623
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 9 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405625
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 9 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405627
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 7 - KB2987107
Severity: Critical
Fixlet ID: 1405629
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405631
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2012 Gold - IE 10 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405633
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB2987107
Severity: Critical
Fixlet ID: 1405635
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107
Severity: Moderate
Fixlet ID: 1405637
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 7 - KB2987107
Severity: Moderate
Fixlet ID: 1405639
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405641
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB2987107
Severity: Moderate
Fixlet ID: 1405643
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB2987107
Severity: Critical
Fixlet ID: 1405645
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405647
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 8.1 Gold - IE 11 - KB2987107
Severity: Critical
Fixlet ID: 1405649
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2012 R2 Gold - IE 11 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405651
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 8 - KB2987107
Severity: Moderate
Fixlet ID: 1405653
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 7 - KB2987107
Severity: Moderate
Fixlet ID: 1405655
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 8 - KB2987107
Severity: Critical
Fixlet ID: 1405657
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows 7 SP1 - IE 11 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405659
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Vista SP2 - IE 9 - KB2987107 (x64)
Severity: Critical
Fixlet ID: 1405661
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405663
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 SP2 - IE 8 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405665
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2003 SP2 - IE 6 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405667
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-056: Cumulative Security Update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 8 - KB2987107 (x64)
Severity: Moderate
Fixlet ID: 1405669
Fixlet Link: http://technet.microsoft.com/library/security/MS14-056
Fixlet Description: Microsoft has released a security update that resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2972103 (x64)
Severity: Critical
Fixlet ID: 1405701
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2972098 (x64)
Severity: Critical
Fixlet ID: 1405703
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2979573 (x64)
Severity: Important
Fixlet ID: 1405705
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2979570 (x64)
Severity: Important
Fixlet ID: 1405707
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2979574
Severity: Important
Fixlet ID: 1405709
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2972106
Severity: Critical
Fixlet ID: 1405711
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 3.5 - KB2968296 (x64)
Severity: Important
Fixlet ID: 1405713
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978042 (x64)
Severity: Critical
Fixlet ID: 1405715
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2972105
Severity: Critical
Fixlet ID: 1405717
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2979578 (x64)
Severity: Important
Fixlet ID: 1405719
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2979576
Severity: Important
Fixlet ID: 1405721
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2968296
Severity: Important
Fixlet ID: 1405723
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2979570
Severity: Important
Fixlet ID: 1405725
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978041
Severity: Critical
Fixlet ID: 1405727
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2979568
Severity: Important
Fixlet ID: 1405729
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2979577 (x64)
Severity: Important
Fixlet ID: 1405731
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2978042
Severity: Critical
Fixlet ID: 1405733
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2968294
Severity: Important
Fixlet ID: 1405735
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2968292 (x64)
Severity: Important
Fixlet ID: 1405737
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2968294 (x64)
Severity: Important
Fixlet ID: 1405739
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2978041 (x64)
Severity: Critical
Fixlet ID: 1405741
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2979573
Severity: Important
Fixlet ID: 1405743
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2979568 (x64)
Severity: Important
Fixlet ID: 1405745
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2972101
Severity: Critical
Fixlet ID: 1405747
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2972098
Severity: Critical
Fixlet ID: 1405749
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2979
Severity: Important
Fixlet ID: 1405751
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2972101 (x64)
Severity: Critical
Fixlet ID: 1405753
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2972107
Severity: Critical
Fixlet ID: 1405755
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8.1 Gold - .NET Framework 3.5 - KB2972103
Severity: Critical
Fixlet ID: 1405757
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 2.0 SP2 - KB2968292
Severity: Important
Fixlet ID: 1405759
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2979578
Severity: Important
Fixlet ID: 1405761
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2979574 (x64)
Severity: Important
Fixlet ID: 1405763
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2979571 (x64)
Severity: Important
Fixlet ID: 1405765
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2972
Severity: Critical
Fixlet ID: 1405767
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 - .NET Framework 3.5.1 - KB2972100 (x64)
Severity: Critical
Fixlet ID: 1405769
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 4.5/4.5.1/4.5.2 - KB2979577
Severity: Important
Fixlet ID: 1405771
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 / Windows Server 2003 SP2 - .NET Framework 4 - KB2979575
Severity: Important
Fixlet ID: 1405773
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 7 SP1 - .NET Framework 3.5.1 - KB2972100
Severity: Critical
Fixlet ID: 1405775
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 / Windows 7 SP1 / Windows Server 2008 SP2 / Windows Vista SP2 - .NET Framework 4.5/4.5.1/4.5.2 - KB2972107 (x64)
Severity: Critical
Fixlet ID: 1405777
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 R2 Gold / Windows 8.1 Gold - .NET Framework 4.5.1/4.5.2 - KB2979576 (x64)
Severity: Important
Fixlet ID: 1405779
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2979571
Severity: Important
Fixlet ID: 1405781
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2012 Gold / Windows 8 Gold - .NET Framework 3.5 - KB2968295 (x64)
Severity: Important
Fixlet ID: 1405783
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows 8 Gold - .NET Framework 3.5 - KB2968295
Severity: Important
Fixlet ID: 1405785
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution - Windows Server 2003 SP2 - .NET Framework 2.0 SP2 - KB2972105 (x64)
Severity: Critical
Fixlet ID: 1405787
Fixlet Link: http://technet.microsoft.com/library/security/MS14-057
Fixlet Description: Microsoft has released a security update that resolves three privately reported vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application. In .NET 4.0 applications, the vulnerable functionality (iriParsing) is disabled by default; for the vulnerability to be exploitable an application has to explicitly enable this functionality. In .NET 4.5 applications, iriParsing is enabled by default and cannot be disabled. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405801
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405803
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000061
Severity: Critical
Fixlet ID: 1405805
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405807
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405809
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Vista SP2 - KB3000061
Severity: Critical
Fixlet ID: 1405811
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405813
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 8 Gold - KB3000061
Severity: Critical
Fixlet ID: 1405815
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405817
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows 7 SP1 - KB3000061
Severity: Critical
Fixlet ID: 1405819
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405821
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405823
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000061
Severity: Critical
Fixlet ID: 1405825
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2003 SP2 - KB3000061
Severity: Critical
Fixlet ID: 1405827
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3000061 (x64)
Severity: Critical
Fixlet ID: 1405829
Fixlet Link: http://technet.microsoft.com/library/security/MS14-058
Fixlet Description: Microsoft has released a security update that resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. In all cases, however, an attacker would have no way to force users to perform these actions. Instead, an attacker would have to persuade users to do so, typically by getting them to click a link in an email message or Instant Messenger message. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities.
***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 2.0 - KB2993939
Severity: Important
Fixlet ID: 1405901
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 3.0 - KB2993937
Severity: Important
Fixlet ID: 1405903
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 4.0 - KB2993928
Severity: Important
Fixlet ID: 1405905
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 5.0 - KB2992080
Severity: Important
Fixlet ID: 1405907
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass - ASP.NET MVC 5.1 - KB2994397
Severity: Important
Fixlet ID: 1405909
Fixlet Link: http://technet.microsoft.com/library/security/MS14-059
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in ASP.NET MVC. The vulnerability could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to visit a webpage that contains specially crafted content designed to exploit the vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through a web browser, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes them to the attacker's website, or by getting them to open an attachment sent through email. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 Gold - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406001
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406003
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000869
Severity: Important
Fixlet ID: 1406005
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 7 SP1 - KB3000869
Severity: Important
Fixlet ID: 1406007
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406009
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3000869
Severity: Important
Fixlet ID: 1406011
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406013
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2012 R2 Gold - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406015
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Vista SP2 - KB3000869
Severity: Important
Fixlet ID: 1406017
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 SP2 - KB3000869
Severity: Important
Fixlet ID: 1406019
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8.1 Gold - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406021
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows Server 2008 R2 SP1 - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406023
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution - Windows 8 Gold - KB3000869 (x64)
Severity: Important
Fixlet ID: 1406025
Fixlet Link: http://technet.microsoft.com/library/security/MS14-060
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a Microsoft Office file that contains a specially crafted OLE object. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2010 SP1/SP2 - KB2883008
Severity: Important
Fixlet ID: 1406103
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2010 SP1/SP2 - KB2883013
Severity: Important
Fixlet ID: 1406105
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2010 SP1/SP2 - KB2883008 (x64)
Severity: Important
Fixlet ID: 1406107
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2007 SP3 - KB2883032
Severity: Important
Fixlet ID: 1406109
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office 2007 SP3 / Office Compatibility Pack SP 3 - KB2883031
Severity: Important
Fixlet ID: 1406111
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Office Web Apps Server 2010 Gold/SP1/SP2 - KB2889827 (x64)
Severity: Important
Fixlet ID: 1406113
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - SharePoint Server 2010 SP1/SP2 - Word Automation Services - KB2883098 (x64)
Severity: Important
Fixlet ID: 1406115
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution - Word 2010 SP1/SP2 - KB2883013 (x64)
Severity: Important
Fixlet ID: 1406117
Fixlet Link: http://technet.microsoft.com/library/security/MS14-061
Fixlet Description: Microsoft has released a security update that resolves one privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if an attacker convinces a user to open a specially crafted Microsoft Word file. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254
Severity: Important
Fixlet ID: 1406201
Fixlet Link: http://technet.microsoft.com/library/security/MS14-062
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2993254 (x64)
Severity: Important
Fixlet ID: 1406203
Fixlet Link: http://technet.microsoft.com/library/security/MS14-062
Fixlet Description: Microsoft has released a security update that resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker sends a specially crafted input/output control (IOCTL) request to the Message Queuing service. Successful exploitation of this vulnerability could lead to full access to the affected system. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually enable the Message Queuing component are likely to be vulnerable to this issue. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2998579 (x64)
Severity: Important
Fixlet ID: 1406301
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB2998579
Severity: Important
Fixlet ID: 1406303
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2008 SP2 - KB2998579
Severity: Important
Fixlet ID: 1406305
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Vista SP2 - KB2998579 (x64)
Severity: Important
Fixlet ID: 1406307
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2998579 (x64)
Severity: Important
Fixlet ID: 1406309
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
***************************************************************
Title: MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege - Windows Server 2003 SP2 - KB2998579
Severity: Important
Fixlet ID: 1406311
Fixlet Link: http://technet.microsoft.com/library/security/MS14-063
Fixlet Description: Microsoft has released a security update that resolves a privately reported vulnerability in Microsoft Windows. An elevation of privilege vulnerability exists in the way the Windows FASTFAT system driver interacts with FAT32 disk partitions. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. After downloading and installing this update, affected computers will no longer be susceptible to this vulnerability.
More information about the BigFix-Announcements
mailing list