{"id":1207,"date":"2012-06-14T02:46:48","date_gmt":"2012-06-14T02:46:48","guid":{"rendered":"http:\/\/www.camcert.gov.kh\/?p=1207"},"modified":"2012-06-14T02:46:48","modified_gmt":"2012-06-14T02:46:48","slug":"camsa12-12-microsoft-update-for-multiple-vulnerabilities-for-june-2012","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/camsa12-12-microsoft-update-for-multiple-vulnerabilities-for-june-2012\/","title":{"rendered":"CamSA12-12: Microsoft Update for Multiple Vulnerabilities for June 2012"},"content":{"rendered":"<p><strong>I. Overview\u00a0<\/strong><\/p>\n<p>Microsoft has released the Microsoft Security Bulletin Summary for June 2012. The information include 3 critical and 4 importants patches.<\/p>\n<p>This vulnerability can allow\u00a0a remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.<\/p>\n<p><strong>II. Effected System<\/strong><\/p>\n<p>&#8211; Microsoft Windows<br \/>\n&#8211; Microsoft Internet Explorer<br \/>\n&#8211; Microsoft .NET Framework<br \/>\n&#8211; Microsoft Office<br \/>\n&#8211; Microsoft Visual Basic For Applications<br \/>\n&#8211; Microsoft Dynamics AX<\/p>\n<p><strong>III. Patches<\/strong><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=246927\" target=\"_blank\">&#8211; MS12-036:\u00a0Vulnerability in Remote Desktop Could Allow Remote Code Execution (2685939)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=249045\" target=\"_blank\">&#8211; MS12-037: Cumulative Security Update for Internet Explorer<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=251095\" target=\"_blank\">&#8211; MS12-038:\u00a0Vulnerability in .NET Framework Could Allow Remote Code Execution (2706726)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=252488\" target=\"_blank\">&#8211; MS12-039:\u00a0Vulnerabilities in\u00a0Lync\u00a0Could Allow Remote Code Execution (2707956)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=251612\" target=\"_blank\">&#8211; MS12-040:\u00a0Vulnerability in Microsoft Dynamics AX Enterprise Portal Could Allow Elevation of Privilege (2709100)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=251707\" target=\"_blank\">&#8211; MS12-041:\u00a0Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2709162)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=252515\" target=\"_blank\">&#8211; MS12-042:\u00a0Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2711167)<\/a><\/p>\n<p><strong>IV. Solutions<\/strong><\/p>\n<p>Microsoft has provided updates for these vulnerabilities in the\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-jun\">Microsoft Security Bulletin Summary for June 2012<\/a>, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/wsus\/default.aspx\">Windows Server Update Services<\/a>\u00a0(WSUS). Home users are encouraged to enable\u00a0<a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off\">automatic updates<\/a>.<\/p>\n<p><strong>V. Reference<\/strong><\/p>\n<p>&#8211; \u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-jun\" target=\"_blank\">http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-jun<\/a><\/p>\n<p><strong>VI. Contact Information<\/strong><\/p>\n<p>&#8211; Email: office@camcert.gov.kh<\/p>\n<p>&#8211; Tel: (855) 92 335 536 &#8211; (855) 16 888 209<\/p>\n<p>[message_box title=&#8221;Disclaimer&#8221; color=&#8221;yellow&#8221;]<\/p>\n<p>The information provided herein is on &#8220;as is&#8221; basis, without warranty of any kind.<\/p>\n<p>[\/message_box]<\/p>\n"},"excerpt":{"rendered":"<p>I. Overview\u00a0 Microsoft has released the Microsoft Security Bulletin Summary for June 2012. The information include 3 critical and 4 importants patches. This vulnerability can allow\u00a0a remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. II. Effected System &#8211; Microsoft Windows &#8211; Microsoft [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1117,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[63,84],"class_list":["post-1207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-13","category-security-alert","tag-june","tag-security-alert"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=1207"}],"version-history":[{"count":2,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1207\/revisions"}],"predecessor-version":[{"id":1210,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1207\/revisions\/1210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media\/1117"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=1207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=1207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=1207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}