Izdana je revizija sigurnosne preporuke oznake MS12-034, prvotno objavljene 8. svibnja 2012. godine, a u preporuci se upozoravalo na nekoliko propusta vezanih uz Microsoft Office, Windows, .NET Framework i Silverlight. Spomenute propuste zlonamjerni korisnik bi mogao iskoristiti za dobivanje većih ovlasti, pokretanje proizvoljnog programskog koda te za izvođenje napada uskraćivanjem usluge (DoS).
Paket: | Microsoft .NET Framework 3.x, Microsoft .NET Framework 4.x, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Silverlight 4.x, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows Server 2008, Microsoft Windows Vista |
Operacijski sustavi: | Microsoft Windows XP, Microsoft Windows Server 2003, Microsoft Windows Vista, Microsoft Windows Server 2008, Microsoft Windows 7 |
Kritičnost: | 8.1 |
Problem: | neodgovarajuća provjera ulaznih podataka, neodgovarajuće rukovanje datotekama, pogreška u programskoj komponenti, preljev međuspremnika |
Iskorištavanje: | udaljeno |
Posljedica: | dobivanje većih privilegija, proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-3402, CVE-2012-0159, CVE-2012-0162, CVE-2012-0164, CVE-2012-0165, CVE-2012-0167, CVE-2012-0176, CVE-2012-0180, CVE-2012-0181, CVE-2012-1848 |
Izvorni ID preporuke: | MS12-034 |
Izvor: | Microsoft |
Problem: | |
Ranjivosti se javljaju kod obrade TrueType fontova, pri alokaciji memorije u .NET framework platformi, ranjivosti u t2embed.dll modulu, itd. Revizija je objavljena zbog promjena u FAQ (Frequently Asked Questions) dijelu preporuke. |
|
Posljedica: | |
Napadač može iskoristiti navedene propuste za povećanje ovlasti, pokretanje proizvoljnog programskog koda te izvođenje DoS napada. |
|
Rješenje: | |
Svim se korisnicima savjetuje instalacija nadogradnji te pregled teksta originalne preporuke za više informacija. |
Izvorni tekst preporuke
Microsoft Security Bulletin MS12-034 - Critical
Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)
Published: Tuesday, May 08, 2012 | Updated: Wednesday, June 06, 2012
Version: 1.3
General Information
Executive Summary
This security update resolves three publicly disclosed vulnerabilities and seven privately reported vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website.
This security update is rated Critical for all supported releases of Microsoft Windows; for Microsoft .NET Framework 4, except when installed on Itanium-based editions of Microsoft Windows; and for Microsoft Silverlight 4 and Microsoft Silverlight 5. This security update is rated Important for Microsoft Office 2003, Microsoft Office 2007, and Microsoft Office 2010. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the most severe of these vulnerabilities by correcting the manner in which affected components handle specially crafted TrueType font files and by correcting the manner in which GDI+ validates specially crafted EMF record types and specially crafted EMF images embedded within Microsoft Office files. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.
For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.
See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.
Known Issues. Microsoft Knowledge Base Article 2681578 documents the currently known issues that customers may experience when installing this security update. The article also documents recommended solutions for these issues.
Top of section
Affected and Non-Affected Software
The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.
Microsoft Windows and Components
Operating System Component Maximum Security Impact Aggregate Severity Rating Updates Replaced
Microsoft Windows
Windows XP Service Pack 3
(KB2660649)
(Tablet PC Edition 2005 Service Pack 3 only) Not applicable Remote Code Execution Important None
Windows XP Service Pack 3
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows XP Service Pack 3
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows XP Service Pack 3
(KB2686509) Not applicable Elevation of Privilege Important None
Windows XP Professional x64 Edition Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows XP Professional x64 Edition Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows XP Professional x64 Edition Service Pack 2
(KB2686509) Not applicable Elevation of Privilege Important None
Windows Server 2003 Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2003 Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2003 Service Pack 2
(KB2686509) Not applicable Elevation of Privilege Important None
Windows Server 2003 x64 Edition Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2003 x64 Edition Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2003 x64 Edition Service Pack 2
(KB2686509) Not applicable Elevation of Privilege Important None
Windows Server 2003 with SP2 for Itanium-based Systems
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2003 with SP2 for Itanium-based Systems
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2003 with SP2 for Itanium-based Systems
(KB2686509) Not applicable Elevation of Privilege Important None
Windows Vista Service Pack 2
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Vista Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Vista Service Pack 2
(KB2660649) Not applicable Remote Code Execution Important None
Windows Vista Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Vista x64 Edition Service Pack 2
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Vista x64 Edition Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Vista x64 Edition Service Pack 2
(KB2660649) Not applicable Remote Code Execution Important None
Windows Vista x64 Edition Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for 32-bit Systems Service Pack 2[3]
(KB2660649) Not applicable Remote Code Execution Important None
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for x64-based Systems Service Pack 2[3]
(KB2660649) Not applicable Remote Code Execution Important None
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 for Itanium-based Systems Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for Itanium-based Systems Service Pack 2
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows 7 for 32-bit Systems
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows 7 for 32-bit Systems
(KB2659262) Not applicable Remote Code Execution Important None
Windows 7 for 32-bit Systems
(KB2660649) Not applicable Remote Code Execution Important None
Windows 7 for 32-bit Systems
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows 7 for 32-bit Systems Service Pack 1
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows 7 for 32-bit Systems Service Pack 1
(KB2659262) Not applicable Remote Code Execution Important None
Windows 7 for 32-bit Systems Service Pack 1
(KB2660649) Not applicable Remote Code Execution Important None
Windows 7 for 32-bit Systems Service Pack 1
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows 7 for x64-based Systems
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows 7 for x64-based Systems
(KB2659262) Not applicable Remote Code Execution Important None
Windows 7 for x64-based Systems
(KB2660649) Not applicable Remote Code Execution Important None
Windows 7 for x64-based Systems
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows 7 for x64-based Systems Service Pack 1
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows 7 for x64-based Systems Service Pack 1
(KB2659262) Not applicable Remote Code Execution Important None
Windows 7 for x64-based Systems Service Pack 1
(KB2660649) Not applicable Remote Code Execution Important None
Windows 7 for x64-based Systems Service Pack 1
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for x64-based Systems
(KB2659262) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for x64-based Systems[4]
(KB2660649) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for x64-based Systems
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2659262) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for x64-based Systems Service Pack 1[4]
(KB2660649) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for Itanium-based Systems
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for Itanium-based Systems
(KB2659262) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for Itanium-based Systems
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
(KB2658846) Not applicable Remote Code Execution Important KB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
(KB2659262) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
(KB2676562) Not applicable Remote Code Execution Critical KB2641653 in MS12-018 replaced by KB2676562
Microsoft .NET Framework 3.0 Service Pack 2
Windows XP Service Pack 3 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407) None No severity rating[2] None
Windows XP Professional x64 Edition Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407) None No severity rating[2] None
Windows Server 2003 Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407) None No severity rating[2] None
Windows Server 2003 x64 Edition Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407) None No severity rating[2] None
Windows Vista Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409) None No severity rating[2] None
Windows Vista x64 Edition Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409) None No severity rating[2] None
Windows Server 2008 for 32-bit Systems Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409) None No severity rating[2] None
Windows Server 2008 for x64-based Systems Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409) None No severity rating[2] None
Microsoft .NET Framework 3.5.1
Windows 7 for 32-bit Systems Microsoft .NET Framework 3.5.1
(KB2656410) None No severity rating[2] None
Windows 7 for 32-bit Systems Service Pack 1 Microsoft .NET Framework 3.5.1
(KB2656411) None No severity rating[2] None
Windows 7 for x64-based Systems Microsoft .NET Framework 3.5.1
(KB2656410) None No severity rating[2] None
Windows 7 for x64-based Systems Service Pack 1 Microsoft .NET Framework 3.5.1
(KB2656411) None No severity rating[2] None
Windows Server 2008 R2 for x64-based Systems Microsoft .NET Framework 3.5.1
(KB2656410) None No severity rating[2] None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Microsoft .NET Framework 3.5.1
(KB2656411) None No severity rating[2] None
Microsoft .NET Framework 4
Windows XP Service Pack 3 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows XP Professional x64 Edition Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Server 2003 Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Server 2003 x64 Edition Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Vista Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Vista x64 Edition Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Server 2008 for 32-bit Systems Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Server 2008 for x64-based Systems Service Pack 2 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows 7 for 32-bit Systems Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows 7 for 32-bit Systems Service Pack 1 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows 7 for x64-based Systems Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows 7 for x64-based Systems Service Pack 1 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Server 2008 R2 for x64-based Systems Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Microsoft .NET Framework 4[1]
(KB2656405) Remote Code Execution Critical None
Server Core installation option
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2676562) Not applicable Elevation of Privilege Important KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2659262) Not applicable Remote Code Execution Important KB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2676562) Not applicable Elevation of Privilege Important KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems
(KB2659262) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for x64-based Systems
(KB2676562) Not applicable Elevation of Privilege Important KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2659262) Not applicable Remote Code Execution Important None
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2676562) Not applicable Elevation of Privilege Important KB2641653 in MS12-018 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems Microsoft .NET Framework 3.5.1
(KB2656410) None No severity rating[2] None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Microsoft .NET Framework 3.5.1
(KB2656411) None No severity rating[2] None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Microsoft .NET Framework 4
(KB2656405) Remote Code Execution Critical None
[1].NET Framework 4 and .NET Framework 4 Client Profile affected. The .NET Framework version 4 redistributable packages are available in two profiles: .NET Framework 4 and .NET Framework 4 Client Profile. .NET Framework 4 Client Profile is a subset of .NET Framework 4. The vulnerability addressed in this update affects both .NET Framework 4 and .NET Framework 4 Client Profile. For more information, see the MSDN article, Installing the .NET Framework.
[2]Severity ratings do not apply to this update for the specified software because there are no known attack vectors for the vulnerability discussed in this bulletin. However, as a defense-in-depth measure, Microsoft recommends that customers of this software apply this security update.
[3]This update is only applicable for Windows Server 2008 systems when the optional Desktop Experience feature has been installed and enabled. See the update FAQ for details.
[4]This update is only applicable for Windows Server 2008 R2 systems when the Ink Support component of the optional Ink and Handwriting Services feature has been installed and enabled. See the update FAQ for details.
Microsoft Office
Office Software Maximum Security Impact Aggregate Severity Rating Updates Replaced
Microsoft Office 2003 Service Pack 3
(KB2598253) Remote Code Execution Important KB972580 in MS09-062 replaced by KB2598253
Microsoft Office 2007 Service Pack 2
(KB2596672) Remote Code Execution Important KB972581 in MS09-062 replaced by KB2596672
Microsoft Office 2007 Service Pack 2
(KB2596792) Remote Code Execution Important None
Microsoft Office 2007 Service Pack 3
(KB2596672) Remote Code Execution Important None
Microsoft Office 2007 Service Pack 3
(KB2596792) Remote Code Execution Important None
Microsoft Office 2010 (32-bit editions)
(KB2589337) Remote Code Execution Important None
Microsoft Office 2010 Service Pack 1 (32-bit editions)
(KB2589337) Remote Code Execution Important None
Microsoft Office 2010 (64-bit editions)
(KB2589337) Remote Code Execution Important None
Microsoft Office 2010 Service Pack 1 (64-bit editions)
(KB2589337) Remote Code Execution Important None
Microsoft Developer Tools and Software
Operating System Maximum Security Impact Aggregate Severity Rating Updates Replaced
Microsoft Silverlight 4
Microsoft Silverlight 4 when installed on Mac
(KB2690729) Remote Code Execution Critical KB2668562 in MS12-016 replaced by KB2690729
Microsoft Silverlight 4 when installed on all supported releases of Microsoft Windows clients
(KB2690729) Remote Code Execution Critical KB2668562 in MS12-016 replaced by KB2690729
Microsoft Silverlight 4 when installed on all supported releases of Microsoft Windows servers
(KB2690729) Remote Code Execution Critical KB2668562 in MS12-016 replaced by KB2690729
Microsoft Silverlight 5
Microsoft Silverlight 5 when installed on Mac
(KB2636927) Remote Code Execution Critical None
Microsoft Silverlight 5 when installed on all supported releases of Microsoft Windows clients
(KB2636927) Remote Code Execution Critical None
Microsoft Silverlight 5 when installed on all supported releases of Microsoft Windows servers
(KB2636927) Remote Code Execution Critical None
Non-Affected Software
Software
Microsoft .NET Framework 1.1 Service Pack 1
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.5 Service Pack 1
Microsoft Office 2008 for Mac
Microsoft Office for Mac 2011
Microsoft Office Compatibility Pack Service Pack 2
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Works 9
Top of section
Frequently Asked Questions (FAQ) Related to This Security Update
Vulnerability Information
Severity Ratings and Vulnerability Identifiers
TrueType Font Parsing Vulnerability - CVE-2011-3402
TrueType Font Parsing Vulnerability - CVE-2012-0159
.NET Framework Buffer Allocation Vulnerability - CVE-2012-0162
.NET Framework Index Comparison Vulnerability - CVE-2012-0164
GDI+ Record Type Vulnerability - CVE-2012-0165
GDI+ Heap Overflow Vulnerability - CVE-2012-0167
Silverlight Double-Free Vulnerability - CVE-2012-0176
Windows and Messages Vulnerability - CVE-2012-0180
Keyboard Layout File Vulnerability - CVE-2012-0181
Scrollbar Calculation Vulnerability - CVE-2012-1848
Update Information
Detection and Deployment Tools and Guidance
Security Update Deployment
Other Information
Acknowledgments
Microsoft thanks the following for working with us to help protect customers:
Alin Rad Pop, working with Tipping Point's Zero Day Initiative, for reporting the TrueType Font Parsing Vulnerability (CVE-2012-0159)
Vitaliy Toropov, working with Tipping Point's Zero Day Initiative, for reporting the .NET Framework Buffer Allocation Vulnerability (CVE-2012-0162)
Omair for reporting the GDI+ Record Type Vulnerability (CVE-2012-0165)
An anonymous researcher, working with Verisign iDefense Labs, for reporting the GDI+ Record Type Vulnerability (CVE-2012-0165)
An anonymous researcher, working with Verisign iDefense Labs, for reporting the GDI+ Heap Overflow Vulnerability (CVE-2012-0167)
Alex Plaskett of MWR InfoSecurity for reporting the Silverlight Double-Free Vulnerability (CVE-2012-0176)
Tarjei Mandt of Azimuth Security for reporting the Keyboard Layout File Vulnerability (CVE-2012-0181)
Nicolas Economou of Core Security Technologies for reporting the Keyboard Layout File Vulnerability (CVE-2012-0181)
Geoff McDonald of Symantec for reporting the Keyboard Layout File Vulnerability (CVE-2012-0181)
h4ckmp for reporting the Scrollbar Calculation Vulnerability (CVE-2012-1848)
Top of section
Microsoft Active Protections Program (MAPP)
To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.
Top of section
Support
How to obtain help and support for this security update
Help installing updates: Support for Microsoft Update
Security solutions for IT professionals: TechNet Security Troubleshooting and Support
Help protect your computer that is running Windows from viruses and malware: Virus Solution and Security Center
Local support according to your country: International Support
Top of section
Disclaimer
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Top of section
Revisions
V1.0 (May 8, 2012): Bulletin published.
V1.1 (May 16, 2012): Added a link to Microsoft Knowledge Base Article 2681578 under Known Issues in the Executive Summary. Also added Microsoft .NET Framework 1.1 Service Pack 1 to the Non-Affected Software table and corrected the update replacement information for Microsoft Office. These were informational changes only. There were no changes to the security update files or detection logic.
V1.2 (May 22, 2012): Added an entry to the Frequently Asked Questions (FAQ) Related to This Security Update section to explain this revision.
V1.3 (June 6, 2012): Added an entry to the update FAQ to explain why systems with non-affected versions of Microsoft Visio Viewer 2010 will be offered security update KB2589337.
Posljednje sigurnosne preporuke