The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin Summary for August 2011
Time: 10:25 EST/15:25 GMT | News Source: ActiveWin.com | Posted By: Robert Stein
  • Cumulative Security Update for Internet Explorer (2559049) This security update resolves five privately reported vulnerabilities and two publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485) This security update resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers that do not have the DNS role enabled are not at risk.
  • Vulnerability in Data Access Components Could Allow Remote Code Execution (2560656) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate Excel file (such as a .xlsx file) that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978) This security update resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (2560978) This security update resolves two privately reported vulnerabilities in Microsoft Visio. The vulnerabilities could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerability in Remote Access Service NDISTAPI Driver Could Allow Elevation of Privilege (2566454) This security update resolves a privately reported vulnerability in all supported editions of Windows XP and Windows Server 2003. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to exploit the vulnerability and take complete control over the affected system. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
  • Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2567680) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application designed to send a device event message to a higher-integrity process. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
  • Vulnerabilities in TCP/IP Stack Could Allow Denial of Service (2563894) This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow denial of service if an attacker sends a sequence of specially crafted Internet Control Message Protocol (ICMP) messages to a target system or sends a specially crafted URL request to a server that is serving Web content and has the URL-based Quality of Service (QoS) feature enabled.
  • Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (2570222) This security update resolves a privately reported vulnerability in the Remote Desktop Protocol. The vulnerability could allow denial of service if an affected system received a sequence of specially crafted RDP packets. Microsoft has also received reports of limited, targeted attacks attempting to exploit this vulnerability. By default, the Remote Desktop Protocol (RDP) is not enabled on any Windows operating system.
  • Vulnerability in Microsoft Chart Control Could Allow Information Disclosure (2567943) This security update resolves a privately reported vulnerability in ASP.NET Chart controls. The vulnerability could allow information disclosure if an attacker sent a specially crafted GET request to an affected server hosting the Chart controls. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to retrieve information that could be used to further compromise the affected system. Only web applications using Microsoft Chart Control are affected by this issue. Default installations of the .NET Framework are not affected.
  • Vulnerability in Microsoft Report Viewer Could Allow Information Disclosure (2578230) This security update resolves a privately reported vulnerability in Microsoft Report Viewer. The vulnerability could allow information disclosure if a user views a specially crafted Web page. In all cases, however, an attacker would have no way to force a user to visit the Web site. Instead, an attacker would have to persuade a user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the vulnerable Web site.
  • Vulnerability in Windows Kernel Could Allow Denial of Service (2556532) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user visits a network share (or visits a Web site that points to a network share) containing a specially crafted file. In all cases, however, an attacker would have no way to force a user to visit such a network share or Web site. Instead, an attacker would have to convince a user to do so, typically by getting the user to click a link in an e-mail message or Instant Messenger message.
  • Vulnerability in .NET Framework Could Allow Information Disclosure (2567951) This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow information disclosure if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.
Write Comment
Return to News

  Displaying 576 through 600 of 676
Prev | First | Last | Next
  The time now is 9:47:51 AM ET.
Any comment problems? E-mail us
#576 By 4240821 (82.115.4.230) at 7/20/2025 10:13:48 AM
https://justpaste.me/axl65
https://justpaste.me/cWmD
https://justpaste.me/Yy63
https://justpaste.me/aQN92
https://justpaste.me/bjiv
https://justpaste.me/ctQi1
https://justpaste.me/bDeq1
https://justpaste.me/Yi6f
https://justpaste.me/bahN9
https://justpaste.me/bT4J1

#577 By 4240821 (82.115.4.230) at 7/21/2025 1:03:51 PM
https://www.pillowfort.social/posts/6441055
https://www.pillowfort.social/posts/6436676
https://www.pillowfort.social/posts/6446007
https://www.pillowfort.social/posts/6450411
https://www.pillowfort.social/posts/6444508
https://www.pillowfort.social/posts/6444940
https://www.pillowfort.social/posts/6460368
https://www.pillowfort.social/posts/6438143
https://www.pillowfort.social/posts/6433166
https://www.pillowfort.social/posts/6465807

#578 By 4240821 (82.115.4.230) at 7/23/2025 9:59:09 PM
https://moanio.com/video.php?id=3252
https://moanio.com/video.php?id=1631
https://moanio.com/video.php?id=3815
https://moanio.com/video.php?id=2391
https://moanio.com/video.php?id=5152
https://moanio.com/video.php?id=3701
https://moanio.com/video.php?id=1602
https://moanio.com/video.php?id=1300
https://moanio.com/video.php?id=479
https://moanio.com/video.php?id=3401

#579 By 4240821 (82.115.4.230) at 7/24/2025 8:52:18 PM
https://moanio.com/video.php?id=3224
https://moanio.com/video.php?id=2418
https://moanio.com/video.php?id=4869
https://moanio.com/video.php?id=3364
https://moanio.com/video.php?id=1944
https://moanio.com/video.php?id=5618
https://moanio.com/video.php?id=1678
https://moanio.com/video.php?id=593
https://moanio.com/video.php?id=3845
https://moanio.com/video.php?id=4327

#580 By 4240821 (82.115.4.230) at 7/26/2025 12:26:10 PM
https://moanio.com/video.php?id=2747
https://moanio.com/video.php?id=564
https://moanio.com/video.php?id=446
https://moanio.com/video.php?id=2722
https://moanio.com/video.php?id=4647
https://moanio.com/video.php?id=2498
https://moanio.com/video.php?id=5563
https://moanio.com/video.php?id=5172
https://moanio.com/video.php?id=2617
https://moanio.com/video.php?id=4181

#581 By 4240821 (82.115.4.230) at 7/28/2025 11:09:02 AM
https://moanio.com/video.php?id=4854
https://moanio.com/video.php?id=955
https://moanio.com/video.php?id=2073
https://moanio.com/video.php?id=5508
https://moanio.com/video.php?id=2434
https://moanio.com/video.php?id=2739
https://moanio.com/video.php?id=5422
https://moanio.com/video.php?id=616
https://moanio.com/video.php?id=2819
https://moanio.com/video.php?id=1759

#582 By 4240821 (82.115.4.230) at 7/29/2025 8:26:04 AM
https://justpaste.me/dfHh5
https://justpaste.me/feQO2
https://justpaste.me/bGNb1
https://justpaste.me/dDJg3
https://justpaste.me/a8Bz4
https://justpaste.me/fbDW3
https://justpaste.me/YwPG2
https://justpaste.me/fJvB
https://justpaste.me/fGFg2
https://justpaste.me/Z57q

#583 By 4240821 (82.115.4.230) at 7/30/2025 12:17:01 AM
https://justpaste.me/Zx5n1
https://justpaste.me/bxF2
https://justpaste.me/dFfI4
https://justpaste.me/ZDAo3
https://justpaste.me/avgu4
https://justpaste.me/bLWt
https://justpaste.me/aQsK2
https://justpaste.me/fV521
https://justpaste.me/ZLDy2
https://justpaste.me/c3aU3

#584 By 4240821 (82.115.4.230) at 7/30/2025 11:24:20 PM
https://justpaste.me/ZIms2
https://justpaste.me/fIfg1
https://justpaste.me/ZWln4
https://justpaste.me/bulW7
https://justpaste.me/YsZN3
https://justpaste.me/fbhi4
https://justpaste.me/aNFP4
https://justpaste.me/ffYY5
https://justpaste.me/bMwq
https://justpaste.me/bdQj4

#585 By 4240821 (82.115.4.230) at 7/31/2025 6:31:15 PM
https://justpaste.me/aSqf7
https://justpaste.me/cvo2
https://justpaste.me/fFao2
https://justpaste.me/fJcw2
https://justpaste.me/diZo6
https://justpaste.me/fKQT
https://justpaste.me/bdQj4
https://justpaste.me/ZjC62
https://justpaste.me/eixN2
https://justpaste.me/ZTzH3

#586 By 4240821 (82.115.4.230) at 8/1/2025 6:36:19 PM
https://justpaste.me/fBll3
https://justpaste.me/fWIO5
https://justpaste.me/Zm8q
https://justpaste.me/aZEI3
https://justpaste.me/fERI3
https://justpaste.me/baUX4
https://justpaste.me/eBfP3
https://justpaste.me/boh6
https://justpaste.me/Yq8S2
https://justpaste.me/fcdb4

#587 By 4240821 (82.115.4.230) at 8/2/2025 11:30:01 AM
https://justpaste.me/bX7O2
https://justpaste.me/fKbh
https://justpaste.me/Z1ot1
https://justpaste.me/cPvM1
https://justpaste.me/fa6u1
https://justpaste.me/aq3S2
https://justpaste.me/fsk86
https://justpaste.me/f3UI2
https://justpaste.me/cH1q1
https://justpaste.me/d8Io

#588 By 4240821 (82.115.4.230) at 8/3/2025 8:37:55 AM
https://justpaste.me/eM8G4
https://justpaste.me/aS2x1
https://justpaste.me/abwZ2
https://justpaste.me/ffhs4
https://justpaste.me/eTeP3
https://justpaste.me/eNHE2
https://justpaste.me/g2qj
https://justpaste.me/cVBB1
https://justpaste.me/Ykgk3
https://justpaste.me/dloo5

#589 By 4240821 (82.115.4.230) at 8/4/2025 1:17:22 AM
https://justpaste.me/f4kh1
https://justpaste.me/aGB8
https://justpaste.me/fF711
https://justpaste.me/auzO3
https://justpaste.me/YyG12
https://justpaste.me/fUWt3
https://justpaste.me/Ymtg4
https://justpaste.me/bXMJ4
https://justpaste.me/eeNJ1
https://justpaste.me/f1UY

#590 By 4240821 (82.115.4.230) at 8/4/2025 3:42:54 PM
https://moanio.com/video.php?id=3374
https://moanio.com/video.php?id=6179
https://moanio.com/video.php?id=1008
https://moanio.com/video.php?id=359
https://moanio.com/video.php?id=4677
https://moanio.com/video.php?id=3028
https://moanio.com/video.php?id=3046
https://moanio.com/video.php?id=6519
https://moanio.com/video.php?id=1877
https://moanio.com/video.php?id=6732

#591 By 4240821 (82.115.4.230) at 8/5/2025 4:22:54 AM
https://moanio.com/video.php?id=4457
https://moanio.com/video.php?id=2911
https://moanio.com/video.php?id=1651
https://moanio.com/video.php?id=2244
https://moanio.com/video.php?id=4575
https://moanio.com/video.php?id=4500
https://moanio.com/video.php?id=5936
https://moanio.com/video.php?id=2785
https://moanio.com/video.php?id=2498
https://moanio.com/video.php?id=5855

#592 By 4240821 (82.115.4.230) at 8/5/2025 2:44:56 PM
https://moanio.com/video.php?id=6670
https://moanio.com/video.php?id=5912
https://moanio.com/video.php?id=4216
https://moanio.com/video.php?id=2668
https://moanio.com/video.php?id=6867
https://moanio.com/video.php?id=4224
https://moanio.com/video.php?id=1620
https://moanio.com/video.php?id=5954
https://moanio.com/video.php?id=6449
https://moanio.com/video.php?id=4061

#593 By 4240821 (82.115.4.230) at 8/6/2025 5:54:01 PM
https://moanio.com/video.php?id=5088
https://moanio.com/video.php?id=901
https://moanio.com/video.php?id=6234
https://moanio.com/video.php?id=233
https://moanio.com/video.php?id=534
https://moanio.com/video.php?id=1353
https://moanio.com/video.php?id=4835
https://moanio.com/video.php?id=1160
https://moanio.com/video.php?id=5667
https://moanio.com/video.php?id=2951

#594 By 4240821 (82.115.4.230) at 8/6/2025 8:37:41 PM
https://moanio.com/video.php?id=2768
https://moanio.com/video.php?id=4957
https://moanio.com/video.php?id=4066
https://moanio.com/video.php?id=544
https://moanio.com/video.php?id=5940
https://moanio.com/video.php?id=334
https://moanio.com/video.php?id=893
https://moanio.com/video.php?id=7073
https://moanio.com/video.php?id=6424
https://moanio.com/video.php?id=4703

#595 By 4240821 (82.115.4.230) at 8/7/2025 1:32:13 PM
https://moanio.com/video.php?id=743
https://moanio.com/video.php?id=4169
https://moanio.com/video.php?id=4531
https://moanio.com/video.php?id=7114
https://moanio.com/video.php?id=1434
https://moanio.com/video.php?id=4403
https://moanio.com/video.php?id=3476
https://moanio.com/video.php?id=4857
https://moanio.com/video.php?id=1277
https://moanio.com/video.php?id=5843

#596 By 4240821 (82.115.4.230) at 8/7/2025 11:20:28 PM
https://moanio.com/video.php?id=2599
https://moanio.com/video.php?id=6357
https://moanio.com/video.php?id=7135
https://moanio.com/video.php?id=6556
https://moanio.com/video.php?id=7138
https://moanio.com/video.php?id=1949
https://moanio.com/video.php?id=589
https://moanio.com/video.php?id=7081
https://moanio.com/video.php?id=4267
https://moanio.com/video.php?id=5788

#597 By 4240821 (82.115.4.230) at 8/8/2025 5:08:13 PM
https://moanio.com/video.php?id=2860
https://moanio.com/video.php?id=816
https://moanio.com/video.php?id=6894
https://moanio.com/video.php?id=381
https://moanio.com/video.php?id=3158
https://moanio.com/video.php?id=2539
https://moanio.com/video.php?id=5752
https://moanio.com/video.php?id=3449
https://moanio.com/video.php?id=2143
https://moanio.com/video.php?id=3340

#598 By 4240821 (82.115.4.230) at 8/9/2025 11:23:25 AM
https://moanio.com/video.php?id=6102
https://moanio.com/video.php?id=7147
https://moanio.com/video.php?id=5602
https://moanio.com/video.php?id=6191
https://moanio.com/video.php?id=7238
https://moanio.com/video.php?id=1415
https://moanio.com/video.php?id=566
https://moanio.com/video.php?id=5098
https://moanio.com/video.php?id=6353
https://moanio.com/video.php?id=4157

#599 By 4240821 (82.115.4.230) at 8/9/2025 5:02:10 PM
https://moanio.com/video.php?id=1634
https://moanio.com/video.php?id=1692
https://moanio.com/video.php?id=2999
https://moanio.com/video.php?id=3193
https://moanio.com/video.php?id=3126
https://moanio.com/video.php?id=3022
https://moanio.com/video.php?id=1392
https://moanio.com/video.php?id=3014
https://moanio.com/video.php?id=1245
https://moanio.com/video.php?id=640

#600 By 4240821 (82.115.4.230) at 8/10/2025 6:25:24 PM
https://moanio.com/video.php?id=6307
https://moanio.com/video.php?id=1644
https://moanio.com/video.php?id=3277
https://moanio.com/video.php?id=4431
https://moanio.com/video.php?id=4091
https://moanio.com/video.php?id=2956
https://moanio.com/video.php?id=1128
https://moanio.com/video.php?id=5164
https://moanio.com/video.php?id=3097
https://moanio.com/video.php?id=5883

Write Comment
Return to News
  Displaying 576 through 600 of 676
Prev | First | Last | Next
  The time now is 9:47:51 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *