Technical Cyber Security Alert 2013-43B - Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.
1d8d26ac8d61f11bc3673cf39db2aed67e6818fc5aec2e445bbfe01467cbb13b
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Awareness System
US-CERT Alert TA13-043B
Microsoft Updates for Multiple Vulnerabilities
Original release date: February 12, 2013
Last revised: --
Systems Affected
* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Office
* Microsoft Server Software
* Microsoft .NET Framework
Overview
Select Microsoft software products contain multiple
vulnerabilities. Microsoft has released updates to address these
vulnerabilities.
Description
The Microsoft Security Bulletin Summary for February 2013 describes
multiple vulnerabilities in Microsoft software. Microsoft has
released updates to address the vulnerabilities.
Impact
A remote, unauthenticated attacker could execute arbitrary code,
cause a denial of service, or gain unauthorized access to your
files or system.
Solution
Apply Updates
Microsoft has provided updates for these vulnerabilities in the
Microsoft Security Bulletin Summary for February 2013, which
describes any known issues related to the updates. Administrators
are encouraged to note these issues and test for any potentially
adverse effects. In addition, administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS). Home users are encouraged to enable
automatic updates.
References
* Microsoft Security Bulletin Summary for February 2013
<http://technet.microsoft.com/en-us/security/bulletin/ms13-feb>
* Microsoft Windows Server Update Services
<http://technet.microsoft.com/en-us/wsus/default.aspx>
* Microsoft Update
<http://www.update.microsoft.com/>
* Microsoft Update Overview
<http://www.microsoft.com/security/updates/mu.aspx>
* Turn Automatic Updating On or Off
<http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off>
Revision History
February 12, 2013: Initial release
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA13-043B Feedback VU#882412" in
the subject.
____________________________________________________________________
Produced by US-CERT, a government organization.
____________________________________________________________________
This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html
Privacy & Use policy:
http://www.us-cert.gov/privacy/
This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA13-043B.html
For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBURqnKndnhE8Qi3ZhAQJ36Qf/XVI8apHzEm0znqJxXEIsYfJDoT3LdLlK
5Y1V3gqagp8RwOy5FtnVtqBM0xsUdZLcUryMDTwFb8f7HbylAjLMJHXkXACF3X1B
Qo9Asc/xBxK7zKntbCR1wyg//BdypZlJJmEdkHwzYiXyFczAv2zYwWWCRhE7IM0q
ya8LcWOkcQicxgmUEudACXn9FzYIavK+vVTZ83FxtE+jY9CYHRgVyEG2ZvHiJXNO
djDBc5J85N99JZfoLqpA7UrOhhmFXBnvhPnZcklTsinkUXcISxcTqCyXhRM/xbn/
zIfCyu+DEaGben1HBTk22ls6NgZHo5Uhe3NUAkK2c91pPf57ojAEDw==
=dvhx
-----END PGP SIGNATURE-----