{"id":841,"date":"2012-05-16T01:24:40","date_gmt":"2012-05-16T01:24:40","guid":{"rendered":"http:\/\/localhost\/camcert-live\/?p=841"},"modified":"2012-05-16T01:24:40","modified_gmt":"2012-05-16T01:24:40","slug":"camsa12-03-microsoft-update-for-multiple-vulnerabilities-for-march-2012","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/camsa12-03-microsoft-update-for-multiple-vulnerabilities-for-march-2012\/","title":{"rendered":"CamSA12-03: Microsoft Update for Multiple Vulnerabilities for March 2012"},"content":{"rendered":"<p><strong>I. Overview\u00a0<\/strong><\/p>\n<p>Microsoft has released the Microsoft Security Bulletin Summary for March 2012. The information include 4 critical and 5 importants patches.<\/p>\n<p>This vulnerability can allow\u00a0a remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.<\/p>\n<p><strong>II. Effected System<\/strong><\/p>\n<p>&#8211; Windows Operating System and Components<br \/>\n&#8211; Microsoft Developer Tools and Software<\/p>\n<p><strong>III. Patches<\/strong><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=232664\" target=\"_blank\">&#8211; MS12-020:\u00a0Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=235401\" target=\"_blank\">&#8211; MS12-017:\u00a0Vulnerability in DNS Server Could Allow Denial of Service (2647170)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=235364\" target=\"_blank\">&#8211; MS12-018:\u00a0Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2641653)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=235362\" target=\"_blank\">&#8211; MS12-021: Vulnerability in Visual Studio Could Allow Elevation of Privilege (2651019)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=235361\" target=\"_blank\">&#8211; MS12-022: Vulnerability in Expression Design Could Allow Remote Code Execution (2651018)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=239573\" target=\"_blank\">&#8211; MS12-019: Vulnerability in\u00a0DirectWrite\u00a0Could Allow Denial of Service (2665364)<\/a><\/p>\n<p><strong>IV. Solutions<\/strong><\/p>\n<p>Microsoft has provided updates for these vulnerabilities in the\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-mar\">Microsoft Security Bulletin Summary for March 2012<\/a>, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/wsus\/default.aspx\">Windows Server Update Services<\/a>\u00a0(WSUS). Home users are encouraged to enable\u00a0<a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off\">automatic updates<\/a>.<\/p>\n<p><strong>V. Contact Information<\/strong><\/p>\n<p>&#8211; Email: office@camcert.gov.kh<\/p>\n<p>&#8211; Tel: (855) 92 335 536 &#8211; (855) 16 888 209<\/p>\n<p>[message_box title=&#8221;Disclaimer&#8221; color=&#8221;yellow&#8221;]<\/p>\n<p>The information provided herein is on &#8220;as is&#8221; basis, without warranty of any kind.<\/p>\n<p>[\/message_box] <\/p>\n"},"excerpt":{"rendered":"<p>I. Overview\u00a0 Microsoft has released the Microsoft Security Bulletin Summary for March 2012. The information include 4 critical and 5 importants patches. This vulnerability can allow\u00a0a remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. II. Effected System &#8211; Windows Operating System and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[],"class_list":["post-841","post","type-post","status-publish","format-standard","hentry","category-13","category-security-alert"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=841"}],"version-history":[{"count":0,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/841\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}