{"id":72510,"date":"2011-08-11T07:11:18","date_gmt":"2011-08-11T07:11:18","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72510"},"modified":"2011-08-11T07:11:18","modified_gmt":"2011-08-11T07:11:18","slug":"microsoft-security-bulletin-ms11-057","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-security-bulletin-ms11-057\/","title":{"rendered":"Microsoft Security Bulletin MS11-057"},"content":{"rendered":"<p>Microsoft has released two Critical updates:<\/p>\n<p><strong>MS11-057 (Internet Explorer):<\/strong> This security update resolves 5 privately reported vulnerabilities and 2 publicly disclosed vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. Microsoft is not aware of any attacks leveraging the vulnerabilities addressed in this bulletin.<br \/>\n<a title=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS11-058.mspx\" href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS11-058.mspx\">https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS11-058.mspx<\/a><\/p>\n<p><strong>MS11-058 (DNS Server):<\/strong> This security update resolves 2 privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted Naming Authority Pointer (NAPTR) query to a DNS server. Servers that do not have the DNS role enabled are not at risk.<br \/>\n<a title=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS11-057.mspx\" href=\"https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS11-057.mspx\">https:\/\/www.microsoft.com\/technet\/security\/Bulletin\/MS11-057.mspx<\/a><\/p>\n<p>Users should install these updates as soon as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released two Critical updates: MS11-057 (Internet Explorer): This security update resolves 5 privately reported vulnerabilities and 2 publicly disclosed vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. Microsoft is not aware of any attacks leveraging [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75,36],"tags":[71,72,73,74,37,38],"class_list":["post-72510","post","type-post","status-publish","format-standard","hentry","category-microsoft-windows","category-security-patch","tag-internet-explorer","tag-microsoft","tag-microsoft-os","tag-microsoft-patch","tag-security-update","tag-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72510"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72510"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72510\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}