{"id":777,"date":"2012-05-15T19:57:36","date_gmt":"2012-05-15T19:57:36","guid":{"rendered":"http:\/\/localhost\/camcert-live\/?p=777"},"modified":"2012-05-15T19:57:36","modified_gmt":"2012-05-15T19:57:36","slug":"camsa12-01-microsoft-update-for-multiple-vulnerabilities-for-january-2012","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/camsa12-01-microsoft-update-for-multiple-vulnerabilities-for-january-2012\/","title":{"rendered":"CamSA12-01: Microsoft Update for Multiple Vulnerabilities for January 2012"},"content":{"rendered":"<p><strong>\u00a0I. Overview\u00a0<\/strong><\/p>\n<p>Microsoft has released the Microsoft Security Bulletin Summary for January 2012. The information include 1 critical and 6 importants patches.<\/p>\n<p>This vulnerability can allow a remote, unauthenticated attacker could execute\u00a0arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.<\/p>\n<p><strong>II. Effected System<\/strong><\/p>\n<p><strong><\/strong>&#8211; Windows Operating System and Components<br \/>\n&#8211; Microsoft Developer Tools and Software<\/p>\n<p><strong>III. Patches<\/strong><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=227487\" target=\"_blank\"><strong><\/strong>&#8211; MS12-004:\u00a0Vulnerabilities in Windows Media Could Allow Remote Code Execution (2636391)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=235999\" target=\"_blank\">&#8211; MS12-001:\u00a0Vulnerability in Windows Kernel Could Allow Security Feature Bypass (2644615)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=229637\" target=\"_blank\">&#8211; MS12-002:\u00a0Vulnerability in Windows Object Packager Could Allow Remote Code Execution (2603381)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=235400\" target=\"_blank\">&#8211; MS12-003:\u00a0Vulnerability in Windows Client\/Server Run-time Subsystem Could Allow Elevation of Privilege (2646524)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=230777\" target=\"_blank\">&#8211; MS12-005:\u00a0Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2584146)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkID=232510\" target=\"_blank\">&#8211; MS12-006:\u00a0Vulnerability in SSL\/TLS Could Allow Information Disclosure (2643584)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=227561\" target=\"_blank\">&#8211; MS12-007:\u00a0Vulnerability in\u00a0AntiXSS\u00a0Library Could Allow Information Disclosure (2607664<\/a><\/p>\n<p><strong>IV. Solution<\/strong><\/p>\n<p>Microsoft has provided updates for these vulnerabilities in the\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-jan\">Microsoft Security Bulletin Summary for January 2012<\/a>. That bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/wsus\/default.aspx\">Windows Server Update Services<\/a>\u00a0(WSUS).<\/p>\n<p><strong>V. Contact Information<\/strong><\/p>\n<p>&#8211; Email: office@camcert.gov.kh<\/p>\n<p>&#8211; Tel: (855) 92 335 536 &#8211; (855) 16 888 209<\/p>\n<p>[message_box title=&#8221;Disclaimer&#8221; color=&#8221;yellow&#8221;]<\/p>\n<p>The information provided herein is on &#8220;as is&#8221; basis, without warranty of any kind.<\/p>\n<p>[\/message_box]<\/p>\n<div><\/div>\n"},"excerpt":{"rendered":"<p>\u00a0I. Overview\u00a0 Microsoft has released the Microsoft Security Bulletin Summary for January 2012. The information include 1 critical and 6 importants patches. This vulnerability can allow a remote, unauthenticated attacker could execute\u00a0arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. II. Effected System &#8211; Windows Operating System and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":593,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[30,84],"class_list":["post-777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-13","category-security-alert","tag-jan-2012","tag-security-alert"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=777"}],"version-history":[{"count":0,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}