The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin Summary for January 2012
Time: 07:34 EST/12:34 GMT | News Source: ActiveWin.com | Posted By: Robert Stein
  • Vulnerabilities in Windows Media Could Allow Remote Code Execution (2636391) This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerability in Windows Kernel Could Allow Security Feature Bypass (2644615) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow an attacker to bypass the SafeSEH security feature in a software application. An attacker could then use other vulnerabilities to leverage the structured exception handler to run arbitrary code. Only software applications that were compiled using Microsoft Visual C++ .NET 2003 can be used to exploit this vulnerability.
  • Vulnerability in Windows Object Packager Could Allow Remote Code Execution (2603381) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file with an embedded packaged object that is located in the same network directory as a specially crafted executable file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2646524) This security update resolves one privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. All supported editions of Windows 7 and Windows Server 2008 R2 are not affected by this vulnerability. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. The attacker could then take complete control of the affected system and install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability can only be exploited on systems configured with a Chinese, Japanese, or Korean system locale.
  • Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2584146) This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file containing a malicious embedded ClickOnce application. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • Vulnerability in SSL/TLS Could Allow Information Disclosure (2643584) This security update resolves a publicly disclosed vulnerability in SSL 3.0 and TLS 1.0. This vulnerability affects the protocol itself and is not specific to the Windows operating system. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. TLS 1.1, TLS 1.2, and all cipher suites that do not use CBC mode are not affected.
  • Vulnerability in AntiXSS Library Could Allow Information Disclosure (2607664) This security update resolves one privately reported vulnerability in the Microsoft Anti-Cross Site Scripting (AntiXSS) Library. The vulnerability could allow information disclosure if a an attacker passes a malicious script to a website using the sanitization function of the AntiXSS Library. The consequences of the disclosure of that information depend on the nature of the information itself. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to produce information that could be used to try to further compromise the affected system. Only sites that use the sanitization module of the AntiXSS Library are affected by this vulnerability.
Write Comment
Return to News

  Displaying 751 through 758 of 758
Prev | First
  The time now is 7:14:56 PM ET.
Any comment problems? E-mail us
#751 By 4240821 (82.115.4.100) at 1/6/2026 1:06:49 PM
https://www.pillowfort.social/posts/6500395
https://www.pillowfort.social/posts/6500246
https://www.pillowfort.social/posts/6500073
https://www.pillowfort.social/posts/6500034
https://www.pillowfort.social/posts/6499977
https://www.pillowfort.social/posts/6499905
https://www.pillowfort.social/posts/6499842
https://www.pillowfort.social/posts/6499800
https://www.pillowfort.social/posts/6499733
https://www.pillowfort.social/posts/6499564

#752 By 4240821 (82.115.4.100) at 1/6/2026 3:03:30 PM
https://www.pillowfort.social/posts/6625756
https://www.pillowfort.social/posts/6625555
https://www.pillowfort.social/posts/6625454
https://www.pillowfort.social/posts/6625313
https://www.pillowfort.social/posts/6625179
https://www.pillowfort.social/posts/6624997
https://www.pillowfort.social/posts/6624899
https://www.pillowfort.social/posts/6624743
https://www.pillowfort.social/posts/6624491
https://www.pillowfort.social/posts/6624208

#753 By 4240821 (82.115.4.100) at 1/6/2026 8:55:56 PM
https://www.pillowfort.social/posts/6536861
https://www.pillowfort.social/posts/6536670
https://www.pillowfort.social/posts/6536511
https://www.pillowfort.social/posts/6536373
https://www.pillowfort.social/posts/6536265
https://www.pillowfort.social/posts/6536181
https://www.pillowfort.social/posts/6536083
https://www.pillowfort.social/posts/6535998
https://www.pillowfort.social/posts/6535949
https://www.pillowfort.social/posts/6535818

#754 By 4240821 (82.115.4.100) at 1/7/2026 8:37:06 AM
https://www.pillowfort.social/posts/6495682
https://www.pillowfort.social/posts/6495548
https://www.pillowfort.social/posts/6495433
https://www.pillowfort.social/posts/6495129
https://www.pillowfort.social/posts/6494940
https://www.pillowfort.social/posts/6494724
https://www.pillowfort.social/posts/6494561
https://www.pillowfort.social/posts/6494429
https://www.pillowfort.social/posts/6494321
https://www.pillowfort.social/posts/6494170

#755 By 4240821 (82.115.4.100) at 1/8/2026 1:08:34 AM
https://www.pillowfort.social/posts/6477789
https://www.pillowfort.social/posts/6477677
https://www.pillowfort.social/posts/6477566
https://www.pillowfort.social/posts/6477406
https://www.pillowfort.social/posts/6477270
https://www.pillowfort.social/posts/6477183
https://www.pillowfort.social/posts/6477115
https://www.pillowfort.social/posts/6477054
https://www.pillowfort.social/posts/6476965
https://www.pillowfort.social/posts/6476874

#756 By 4240821 (82.115.4.100) at 1/9/2026 11:19:28 AM
https://www.pillowfort.social/posts/6943672
https://www.pillowfort.social/posts/6943536
https://www.pillowfort.social/posts/6943486
https://www.pillowfort.social/posts/6943420
https://www.pillowfort.social/posts/6943333
https://www.pillowfort.social/posts/6943241
https://www.pillowfort.social/posts/6943178
https://www.pillowfort.social/posts/6943125
https://www.pillowfort.social/posts/6943004
https://www.pillowfort.social/posts/6942879

#757 By 4240821 (82.115.4.100) at 1/10/2026 1:48:27 PM
https://www.pillowfort.social/posts/6956710
https://www.pillowfort.social/posts/6956642
https://www.pillowfort.social/posts/6956515
https://www.pillowfort.social/posts/6956392
https://www.pillowfort.social/posts/6956289
https://www.pillowfort.social/posts/6956197
https://www.pillowfort.social/posts/6956120
https://www.pillowfort.social/posts/6955984
https://www.pillowfort.social/posts/6955855
https://www.pillowfort.social/posts/6955754

#758 By 4240821 (82.115.4.230) at 1/12/2026 6:37:48 AM
https://myvidplay.com/d/tnbec7qdalfu
https://myvidplay.com/d/ccqmg38vilwa
https://myvidplay.com/d/ez50jhu8e02j
https://myvidplay.com/d/jvdwubw37ph8
https://myvidplay.com/d/134djokteu9v
https://myvidplay.com/d/0hg4fublfyw1
https://myvidplay.com/d/zw1nvcuoyue7
https://myvidplay.com/d/b7a5uf6xwvex
https://myvidplay.com/d/i2aixoij396z
https://myvidplay.com/d/gt4xbkuq2tej

Write Comment
Return to News
  Displaying 751 through 758 of 758
Prev | First
  The time now is 7:14:56 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *