Windows Sicherheitsupdates für August 2012 erschienen

Windows Sicherheitsupdates für August 2012 [MS12-052, MS12-053, MS12-054, MS12-055 und MS12-056] erschienen

Microsoft hat heute im Rahmen des heutigen Microsoft Patch Day August 2012 neben drei Sicherheitsbulletins für Microsoft Office sowie mehreren Updates, auch fünf Sicherheitsbulletins für die Systemkomponenten von Windows sowie für den Internet Explorer veröffentlicht und zum Download bereitgestellt. Betroffen sind Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2 sowie Internet Explorer 6, Internet Explorer 7, Internet Explorer 8 und Internet Explorer 9. Durch die Installation werden elf Sicherheitslücken geschlossen.

Die August 2012 Sicherheitsupdates wurden am 14. August veröffentlicht.

Windows Security Updates

Alle Benutzer werden aufgefordert die verfügbaren Updates so schnell wie möglich zu installieren, entweder über die in Windows integrierte Update-Funktion oder durch den manuellen Download über den Download Center.

Windows Sicherheitsupdates für Juni 2012 herunterladen

Die folgenden Updates stehen im Download Center zum Download bereit:

  • MS12-052 - Cumulative Security Update for Internet Explorer (2722913)
    This security update resolves four privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • MS12-053 - Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135)
    This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow remote code execution if an attacker sends a sequence of specially crafted RDP packets to an affected system. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.
  • MS12-054 - Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
    This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed.
  • MS12-055 - Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)
    This security update resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
  • MS12-056 - Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution (2706045)
    This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines on 64-bit versions of Microsoft Windows. The vulnerability could allow remote code execution if a user visited a specially crafted website. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website.

Gleichzeitig hat Microsoft eine aktualisierte Version des Windows-Tools zum Entfernen bösartiger Software in Windows Update, Microsoft Update, Windows Server Update Services und dem Download Center veröffentlicht.

Weitere Microsoft-Updates von 14. August 2012

Microsoft Patch Day für August 2012 - Weitere Infos

Microsoft fordert die Benutzer auf die verfügbaren Updates so schnell wie möglich zu installieren, entweder über die in Windows integrierte Update-Funktion oder durch den manuellen Download über das Download Center.

Diesen Artikel auf Twitter, Google+ oder Facebook weiterempfehlen

Artikel auf Twitter empfehlen Artikel auf Google+ empfehlen Artikel auf Facebook empfehlen
Kommentare sind geschlossen
Copyright © 2014 Valdet Beqiraj it-blogger.net