{"id":1710,"date":"2016-01-06T04:25:06","date_gmt":"2016-01-06T04:25:06","guid":{"rendered":"http:\/\/www.camcert.gov.kh\/?p=1710"},"modified":"2016-01-20T04:03:52","modified_gmt":"2016-01-20T04:03:52","slug":"camsa16-01-%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bb%e1%9e%98%e1%9e%a0%e1%9f%8a%e1%9e%bb%e1%9e%93%e1%9e%98%e1%9f%89%e1%9f%83%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bc%e1%9e%9f%e1%9e%bc%e1%9e%a0%e1%9f%92","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/camsa16-01-%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bb%e1%9e%98%e1%9e%a0%e1%9f%8a%e1%9e%bb%e1%9e%93%e1%9e%98%e1%9f%89%e1%9f%83%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bc%e1%9e%9f%e1%9e%bc%e1%9e%a0%e1%9f%92\/","title":{"rendered":"CamSA16-01: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege"},"content":{"rendered":"<p>1.General Information<\/p>\n<p>This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application.<\/p>\n<p>This security update is rated Important for supported releases of Microsoft Windows. For more information, see the <strong>Affected Software<\/strong>section.<\/p>\n<p>The update addresses the vulnerability by correcting how the Windows kernel and Windows font drivers handle objects in memory. For more information about the vulnerability, see the <strong>Vulnerability Information<\/strong> section.<\/p>\n<p>For more information about this update, see <a href=\"https:\/\/support.microsoft.com\/kb\/3119075\">Microsoft Knowledge Base Article 3119075<\/a>.<\/p>\n<p>2. The affected systems<\/p>\n<p>&#8211; Windows 10<\/p>\n<p>&#8211; Windows Server 2012 R2 Datacenter<\/p>\n<p>&#8211; Windows Server 2012 R2 Standard<\/p>\n<p>&#8211; Windows Server 2012 R2 Essentials<\/p>\n<p>&#8211; Windows Server 2012 R2 Foundation<\/p>\n<p>&#8211; Windows 8.1 Enterprise<\/p>\n<p>&#8211; Windows 8.1 Pro<\/p>\n<p>&#8211; Windows 8.1<\/p>\n<p>&#8211; Windows RT 8.1<\/p>\n<p>&#8211; Windows Server 2012 Datacenter<\/p>\n<p>&#8211; Windows Server 2012 Standard<\/p>\n<p>&#8211; Windows Server 2012 Essentials<\/p>\n<p>&#8211; Windows Server 2012 Foundation<\/p>\n<p>&#8211; Windows 8 Enterprise<\/p>\n<p>&#8211; Windows 8 Pro<\/p>\n<p>&#8211; Windows 8<\/p>\n<p>&#8211; Windows RT<\/p>\n<p>&#8211; Windows Server 2008 R2 Service Pack 1<\/p>\n<p>&#8211; Windows 7 Service Pack 1<\/p>\n<p>&#8211; Windows Server 2008 Service Pack 2<\/p>\n<p>&#8211; Windows Vista Service Pack 2<\/p>\n<p><strong>3. <\/strong><strong>Solutions<\/strong><\/p>\n<p>Go to the following address and follow the instructions:<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3119075\">https:\/\/support.microsoft.com\/en-us\/kb\/3119075<\/a><\/p>\n<p><strong>4.<\/strong><strong>Reference<\/strong><\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms15-135.aspx\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms15-135.aspx<\/a><\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3119075\">https:\/\/support.microsoft.com\/en-us\/kb\/3119075<\/a><\/p>\n<p><strong>5.<\/strong><strong>Contact Information<\/strong><\/p>\n<p>&#8211; Electronic message (Email): office@camcert.gov.kh<\/p>\n<p>&#8211; Phone: (855) 23 722 391 \u2013 (855) 10 736 688<\/p>"},"excerpt":{"rendered":"<p>1.General Information This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. This security update is rated Important for supported releases of Microsoft Windows. For more information, see the Affected Softwaresection. The update addresses the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[89],"class_list":["post-1710","post","type-post","status-publish","format-standard","hentry","category-81","tag-89"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=1710"}],"version-history":[{"count":2,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1710\/revisions"}],"predecessor-version":[{"id":1728,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1710\/revisions\/1728"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=1710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=1710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=1710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}