{"id":859,"date":"2012-05-16T01:57:22","date_gmt":"2012-05-16T01:57:22","guid":{"rendered":"http:\/\/localhost\/camcert-live\/?p=859"},"modified":"2012-06-05T08:52:42","modified_gmt":"2012-06-05T08:52:42","slug":"camsa12-06-microsoft-update-for-multiple-vulnerabilities-for-may-2012","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/camsa12-06-microsoft-update-for-multiple-vulnerabilities-for-may-2012\/","title":{"rendered":"CamSA12-06: Microsoft Update for Multiple Vulnerabilities for May 2012"},"content":{"rendered":"<p><strong>I. Overview\u00a0<\/strong><\/p>\n<p>Microsoft has released the Microsoft Security Bulletin Summary for May 2012. The information include 3 critical and 4 importants patches.<\/p>\n<p>This vulnerability can allow\u00a0a remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.<\/p>\n<p><strong>II. Effected System<\/strong><\/p>\n<p>&#8211; Microsoft Windows<br \/>\n&#8211; Microsoft .NET Framework<br \/>\n&#8211; Microsoft Office<br \/>\n&#8211; Microsoft Silverlight<\/p>\n<p><strong>III. Patches<\/strong><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=248419\" target=\"_blank\">&#8211; MS12-029:\u00a0Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=251038\" target=\"_blank\">&#8211; MS12-034:\u00a0Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=246970\" target=\"_blank\">&#8211; MS12-035:\u00a0Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2693777)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=238499\" target=\"_blank\">&#8211; MS12-030:Vulnerabilities in Microsoft\u00a0Office\u00a0Could Allow Remote Code Execution (2663830)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=248385\" target=\"_blank\">&#8211; MS12- 031:\u00a0Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2597981)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=246964\" target=\"_blank\">&#8211; MS12-032:\u00a0Vulnerability in TCP\/IP Could Allow Elevation of Privilege (2688338)<\/a><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=247902\" target=\"_blank\">&#8211; MS12-033:\u00a0Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege (2690533)<\/a><\/p>\n<p><strong>IV. Solutions<\/strong><\/p>\n<p>Microsoft has provided updates for these vulnerabilities in the\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms12-may\">Microsoft Security Bulletin Summary for May 2012<\/a>, which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/wsus\/default.aspx\">Windows Server Update Services<\/a>\u00a0(WSUS). Home users are encouraged to enable\u00a0<a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off\">automatic updates<\/a>.<\/p>\n<p><strong>V. Contact Information<\/strong><\/p>\n<p>&#8211; Email: office@camcert.gov.kh<\/p>\n<p>&#8211; Tel: (855) 92 335 536 &#8211; (855) 16 888 209<\/p>\n<p>[message_box title=&#8221;Disclaimer&#8221; color=&#8221;yellow&#8221;]<\/p>\n<p>The information provided herein is on &#8220;as is&#8221; basis, without warranty of any kind.<\/p>\n<p>[\/message_box]<\/p>\n"},"excerpt":{"rendered":"<p>I. Overview\u00a0 Microsoft has released the Microsoft Security Bulletin Summary for May 2012. The information include 3 critical and 4 importants patches. This vulnerability can allow\u00a0a remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. II. Effected System &#8211; Microsoft Windows &#8211; Microsoft [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1117,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[85,56,57,84],"class_list":["post-859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-13","category-security-alert","tag-85","tag-ca","tag-digital-certificate","tag-security-alert"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":3,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/859\/revisions"}],"predecessor-version":[{"id":1118,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/859\/revisions\/1118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media\/1117"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}