{"id":6791,"date":"2012-04-12T15:22:29","date_gmt":"2012-04-12T22:22:29","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=6791"},"modified":"2018-01-30T12:30:01","modified_gmt":"2018-01-30T19:30:01","slug":"microsoft-issues-6-security-bulletins-on-patch-tuesday","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/04\/12\/microsoft-issues-6-security-bulletins-on-patch-tuesday\/","title":{"rendered":"Microsoft issues 6 security bulletins on &#8216;Patch Tuesday&#8217;"},"content":{"rendered":"<p>On Tuesday, <a href=\"http:\/\/blogs.technet.com\/b\/msrc\/archive\/2012\/04\/10\/windows-xp-and-office-2003-countdown-to-end-of-support-and-the-april-2012-bulletins.aspx\"><strong>Microsoft issued 6 security bulletins<\/strong><\/a>, 4 of them critical, and 2 important updates. <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-apr\"><strong>The bulletins<\/strong><\/a> fix a total of 11 vulnerabilities in Windows, Microsoft Office, and Internet Explorer.<\/p>\n<p>According to Microsoft, the company has already observed <a href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2012\/04\/10\/ms12-027-enhanced-protections-regarding-activex-controls-in-microsoft-office-documents.aspx\"><strong>targeted malware attacks taking advantage of the\u00a0MS12-027<\/strong><\/a> vulnerability. In order to mitigate the risks posed by these currently circulating targeted attacks, the company is advising users to disable the ActiveX controls via the\u00a0<em>Trust Center Settings &gt; ActiveX Settings<\/em>, option.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p>The patched vulnerabilities are as follows:<\/p>\n<ul>\n<li>MS12-023 &#8211;\u00a0Cumulative Security Update for Internet Explorer (2675157)<\/li>\n<li>MS12-024 &#8211;\u00a0Vulnerability in Windows Could Allow Remote Code Execution (2653956)<\/li>\n<li>MS12-025 &#8211;\u00a0Vulnerability in .NET Framework Could Allow Remote Code Execution (2671605)<\/li>\n<li>MS12-027 &#8211;\u00a0Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258)<\/li>\n<li>MS12-026 &#8211;\u00a0Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Information Disclosure (2663860)<\/li>\n<li>MS12-028 &#8211;\u00a0Vulnerability in Microsoft Office Could Allow Remote Code Execution (2639185)<\/li>\n<\/ul>\n<p>The severity and exploitability of these flaws is as follows:<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/04\/microsoft_patch_tuesday_exploitability1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-6801\" title=\"Microsoft_Patch_Tuesday_Exploitability\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/04\/microsoft_patch_tuesday_exploitability1.png\" alt=\"\" width=\"614\" height=\"346\" \/><\/a><\/p>\n<p>End and corporate users are advised to update \u00a0their PCs as soon as possible to prevent the\u00a0likelihood of a successful remote exploitation thanks to these vulnerabilities.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<strong><a href=\"http:\/\/www.twitter.com\/danchodanchev\">follow him on \u00a0Twitter<\/a><\/strong>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Tuesday, Microsoft issued 6 security bulletins, 4 of them critical, and 2 important updates. The bulletins fix a total of 11 vulnerabilities in Windows, Microsoft Office, and Internet Explorer. According to Microsoft, the company has already observed targeted malware attacks taking advantage of the\u00a0MS12-027 vulnerability. In order to mitigate the risks posed by these [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4037,10555,10549,10559,10551,10547,10545,5137,9227,5641,6825,5097,6163,9225,9213,10557,3471,9065,8925,10553],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6791"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=6791"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6791\/revisions"}],"predecessor-version":[{"id":19183,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6791\/revisions\/19183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=6791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=6791"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=6791"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=6791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}