Patch Name | Windows6.1-SP1-KB2654428-x86.msu | ||||||||||||
Patch Description | Security Update for Windows 7 (KB2654428) | ||||||||||||
Bulletin Id | MS12-013 | ||||||||||||
Bulletin Title | Vulnerability in C Run-Time Library Could Allow Remote Code Execution (2654428) | ||||||||||||
Severity | Critical | ||||||||||||
Location Path | Windows6.1-SP1-KB2654428-x86.msu | ||||||||||||
Bulletin Summary | This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file that is hosted on a website or sent as an email attachment. An attacker who successfully exploited the vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. | ||||||||||||
Superceding Bulletin Id | None | ||||||||||||
Patch Release Date | Feb 14, 2012 | ||||||||||||
Affected Product Information
|
Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.