Alert (TA12-101A)
Microsoft Updates for Multiple Vulnerabilities
Systems Affected
- Microsoft Windows
- Microsoft Internet Explorer
- Microsoft .NET Framework
- Microsoft Office
- Microsoft Server Software
- Microsoft SQL Server
- Microsoft Developer Tools
- Microsoft Forefront United Access Gateway
Overview
There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Microsoft Office, Microsoft Server Software, Microsoft SQL Server, Microsoft Developer Tools, and Microsoft Forefront United Access Gateway. Microsoft has released updates to address these vulnerabilities.
Description
The Microsoft Security Bulletin Summary for April 2012 describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address the vulnerabilities.
Impact
A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.
Solution
Apply updates
Microsoft has provided updates for
these vulnerabilities in the Microsoft
Security Bulletin Summary for April 2012, which describes any known issues
related to the updates. Administrators are encouraged to note these issues and
test for any potentially adverse effects. In addition, administrators should
consider using an automated update distribution system such as Windows Server
Update Services (WSUS). Home users are encouraged to enable automatic
updates.
References
- Microsoft Security Bulletin Summary for April 2012 - http://technet.microsoft.com/en-us/security/bulletin/ms12-apr
- Microsoft Windows Server Update Services - http://technet.microsoft.com/en-us/wsus/default.aspx
- Microsoft Update - https://www.update.microsoft.com/
- Microsoft Update Overview - http://www.microsoft.com/security/updates/mu.aspx
- Turn Automatic Updating On or Off - http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off
Revision History
- April 10, 2012: Initial release
This product is provided subject to this Notification and this Privacy & Use policy.