exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Security Bulletin Re-Release For April, 2012

Microsoft Security Bulletin Re-Release For April, 2012
Posted Apr 27, 2012
Site microsoft.com

This bulletin summary lists two re-released Microsoft security bulletins for April, 2012.

tags | advisory
SHA-256 | 83497bc21efd0cef3c7040e1b998bc1a9933a4124934354fc581c55dd6122d9f

Microsoft Security Bulletin Re-Release For April, 2012

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


********************************************************************
Title: Microsoft Security Bulletin Re-Releases
Issued: April 26, 2012
********************************************************************

Summary
=======
The following bulletins have undergone a major revision increment.
Please see the appropriate bulletin for more details.

* MS12-027 - Critical
* MS12-APR

Bulletin Information:
=====================

* MS12-027 - Critical

- http://technet.microsoft.com/security/bulletin/ms12-027
- Reason for Revision: V2.0 (April 26, 2012): Added Service Pack 1
versions of SQL Server 2008 R2 to the Affected Software and
added an entry to the update FAQ to explain which SQL Server
2000 update to use based on version ranges. These are
informational changes only. There were no changes to the security
update files or detection logic. For a complete list of changes,
see the entry to the section, Frequently Asked Questions (FAQ)
Related to This Security Update.
- Originally posted: April 10, 2012
- Updated: April 26, 2012
- Bulletin Severity Rating: Critical
- Version: 2.0

* MS12-APR

- http://technet.microsoft.com/security/bulletin/ms12-APR
- Reason for Revision: V2.0 (April 26, 2012): For MS12-027, added
Service Pack 1 versions of SQL Server 2008 R2 to the Affected
Software and clarified the Affected Software to show that the
update applies to all installations of Microsoft SQL Server 2000
Analysis Services Service Pack 4, as the QFE and GDR distinction
does not apply to this product. These are informational changes
only. There were no changes to the security update files or
detection logic. Because the updates have been offered correctly
since initial release, customers who have already successfully
installed the updates do not need to take any action.
- Originally posted: April 10, 2012
- Updated: April 26, 2012
- Version: 2.0


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.

To receive automatic notifications whenever Microsoft Security
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=otL+
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    9 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close