129742938815312500_137Microsoft recently released a vulnerability patch for February, fixes multiple vulnerabilities exist, of which 4 hazard level as "serious", 5 hazard level as "important", involving products including Microsoft operating systems Windows, Office Automation, Office software, browser such as IE. National computer virus emergency responseReminded the majority of computer users to pay particular attention to the following hazard level is "critical" vulnerability patch: first, the MS12-008:Windows kernel-mode driver remote code execution vulnerability. When the user browse vulnerabilities an attacker of a carefully constructed Web page, could lead to an attacker's malicious code are implemented, install malicious waySequence or steal user privacy. Second
warhammer gold, the accumulation of MS12-010:Microsoft IE update patches.
Around the vulnerability in browser IE, when the user browse vulnerabilities an attacker of a carefully constructed Web page
guild wars 2 gold, could lead to an attacker's malicious code are implemented, or install malicious programs steal user privacy. Third
eq2 plat, the MS12-013:Microsoft Windows'Msvcrt.dll' remote buffer overflow vulnerability.
An attacker may exploit this vulnerability by persuading a user to open a specially crafted media file, leading to execution of arbitrary code. Four, MS12-016:Mircosoft NET Framework and MircOSoft Silverlight remote code execution vulnerability.
When the user browse vulnerabilities an attacker of a carefully constructed Web page, could lead to an attacker's malicious code are implemented, or install malicious programs steal user privacy. Experts say that Microsoft has released a patch for this vulnerability, it is recommended that computer users as soon as possible to the micro-Official website download the soft vulnerability patch, vulnerability of the remedy in a timely manner, preventing remote malicious attacker to use this vulnerability to invasion destroyed the operating system. Microsoft has released a security bulletin and corresponding patch at the address below: 1, http://www.Microsoft.com/technet/security/bulletin/MS12-008.asp
2、http://www.microsoft.com/technet/security/bulletin/MS12-010.asp
3、http://www.microsoft.com/technet/security/bulletin/MS12-013.asp
4、http://www.microsoft.com/technet/security/bulletin/MS12-016.asp。
No comments:
Post a Comment