Tue, Dec 11 2012 13:02 Don

Microsoft Security Bulletin(s) for December 11, 2012

Note: There may be latency issues due to replication, if the page does not display keep refreshing

Today Microsoft released the following Security Bulletin(s).

Note: »www.microsoft.com/technet/security and »www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:

»technet.microsoft.com/en-us/secu···ms12-dec

Critical (5)

Microsoft Security Bulletin MS12-077
Cumulative Security Update for Internet Explorer (2761465)
»technet.microsoft.com/en-us/secu···ms12-077

Microsoft Security Bulletin MS12-078
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2783534)
»technet.microsoft.com/en-us/secu···ms12-078

Microsoft Security Bulletin MS12-079
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2780642)
»technet.microsoft.com/en-us/secu···ms12-079

Microsoft Security Bulletin MS12-080
Vulnerabilities in Microsoft Exchange Server Could Allow Remote Code Execution (2784126)
»technet.microsoft.com/en-us/secu···ms12-080

Microsoft Security Bulletin MS12-081
Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2758857)
»technet.microsoft.com/en-us/secu···ms12-081

Important (2)

Microsoft Security Bulletin MS12-082
Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660)
»technet.microsoft.com/en-us/secu···ms12-082

Microsoft Security Bulletin MS12-083
Vulnerability in IP-HTTPS Component Could Allow Security Feature Bypass (2765809)
»technet.microsoft.com/en-us/secu···ms12-083

Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

Security Tool
Find out if you are missing important Microsoft product updates by using MBSA.

Filed under: