top of page

Group

Public·41 members

Adobe Reader For Windows Xp Service Pack 2 Download !!BETTER!!


A remote code execution vulnerability exists in OLE Automation. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged on user. (CVE-2011-0658)Affected Software:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):June Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2476490)ConsequenceAn attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-038 for further details.Workaround:1) Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zoneImpact of workaround #1 and #2: On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently.3) Restrict access to VBScript.dllImpact of workaround #3: Web pages and other applications that require VBScript may not display properly.Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (MS11-039)SeverityUrgent5Qualys ID90712Vendor ReferenceMS11-039CVE ReferenceCVE-2011-0664CVSS ScoresBase 9.3 / Temporal 6.9DescriptionMicrosoft Silverlight is a cross-browser, cross-platform implementation of the Microsoft .NET Framework for building media experiences and rich interactive applications for the Web.A remote code execution vulnerability exists in the Microsoft .NET Framework that can allow a specially crafted Microsoft .NET application to access memory in an unsafe manner. The vulnerability is caused when the .NET Framework and Microsoft Silverlight improperly validate arguments passed to built-in networking functions.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):June Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2478658, 2478656, 2478663)August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2478656)ConsequenceAn attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3 (Microsoft .NET Framework 3.5)Windows XP Service Pack 3 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows XP Service Pack 3 (Microsoft .NET Framework 4.0)Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 3.5)Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4.0)Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 3.5)Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 4.0)Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 3.5)Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-039.Workaround:1) Disable partially trusted Microsoft .NET applications.Impact of workaround #1: Microsoft .NET applications may not run.2) Disable XAML browser applications in Internet Explorer.Impact of workaround #2: Microsoft .NET code will not run in Internet Explorer or will not run without prompting. Disabling Microsoft .NET applications and components in the Internet and Local intranet security zones may cause some Web sites to work incorrectly.3) Temporarily prevent the Microsoft Silverlight ActiveX control from running in the browser.Microsoft Threat Management Gateway Firewall Client Remote Code Execution Vulnerability (MS11-040)SeverityCritical4Qualys ID90705Vendor ReferenceMS11-040CVE ReferenceCVE-2011-1889CVSS ScoresBase 10 / Temporal 7.8DescriptionThis security update resolves a privately reported vulnerability in the Microsoft Forefront Threat Management Gateway (TMG) 2010 Client, formerly named the Microsoft Forefront Threat Management Gateway Firewall Client. This security update is rated Critical for Microsoft Forefront Threat Management Gateway 2010 Client.ConsequenceThe vulnerability could allow remote code execution if an attacker leveraged a client computer to make specific requests on a system where the TMG firewall client is used.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Microsoft Forefront Threat Management Gateway 2010 ClientRefer to Microsoft Security Bulletin MS11-040 for further details.Workaround:Disable the TMG Client.Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerability (MS11-041)SeverityCritical4Qualys ID90708Vendor ReferenceMS11-041CVE ReferenceCVE-2011-1873CVSS ScoresBase 9.3 / Temporal 7.3DescriptionThe Windows kernel is the core of the operating system. It provides system level services such as device management and memory management, allocates processor time to processes, and manages error handling. A remote code execution vulnerability exists because the Windows kernel-mode driver improperly parses specially crafted OpenType fonts on x64-based systems.This security update is rated Critical.ConsequenceAn attacker could run arbitrary code in kernel mode and take complete control of an affected system.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-041 for further details.Workaround:1) Disable the WebClient serviceImpact of workaround #1: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log.Microsoft Distributed File System Remote Code Execution Vulnerability (MS11-042)SeverityUrgent5Qualys ID90706Vendor ReferenceMS11-042CVE ReferenceCVE-2011-1868, CVE-2011-1869CVSS ScoresBase 10 / Temporal 7.8DescriptionThis security update resolves two privately reported vulnerabilities in the Microsoft Distributed File System (DFS). This security update is rated Critical for


About

Welcome to the group! You can connect with other members, ge...

bottom of page