{"id":72571,"date":"2011-07-12T11:29:57","date_gmt":"2011-07-12T11:29:57","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72571"},"modified":"2011-07-12T11:29:57","modified_gmt":"2011-07-12T11:29:57","slug":"microsoft-july2011-patch-tuesday-released","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-july2011-patch-tuesday-released\/","title":{"rendered":"Microsoft July2011 Patch Tuesday Released"},"content":{"rendered":"<p>Microsoft has released 4 security bulletins covering a total of 22 vulnerabilities,one of which rated Critical and it affects the Microsoft Bluetooth Stack. An attacker in physical proximity to a vulnerable computer can exploit this issue for a complete compromise. and threee of which are rated Important, include a patch for a previously public issue in Microsoft Visio, and multiple local issues in the Client\/Server Runtime Subsystem (CSRSS) and Windows kernel-mode drivers.<\/p>\n<p>The following vulnerabilities has rated \u201cCritical\u201d:<\/p>\n<p>MS11-053 &#8211; Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (2566220)<br \/>\nThis security update resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability.<\/p>\n<p>The following vulnerabilities has rated \u201cImportant\u201d:<\/p>\n<p>MS11-054 &#8211; Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917)<br \/>\nThis security update resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.<\/p>\n<p>MS11-056 &#8211; Vulnerabilities in Windows Client\/Server Run-time Subsystem Could Allow Elevation of Privilege (2507938)<br \/>\nThis security update resolves five privately reported vulnerabilities in the Microsoft Windows Client\/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user&#8217;s system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities.<\/p>\n<p>MS11-055 &#8211; Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2560847)<br \/>\nThis security update resolves a publicly disclosed vulnerability in Microsoft Visio. The vulnerability could allow remote code execution if a user opens a legitimate Visio file that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<\/p>\n<p>For detailed information of all the bulletins and the corresponding vulnerabilities addressed, please visit,<\/p>\n<p>https:\/\/www.microsoft.com\/technet\/security\/bulletin\/ms11-jul.mspx<\/p>\n<p>We will recommend users to set Windows Update in Install updates automatically mode. So the important patches get applied automatically.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released 4 security bulletins covering a total of 22 vulnerabilities,one of which rated Critical and it affects the Microsoft Bluetooth Stack. An attacker in physical proximity to a vulnerable computer can exploit this issue for a complete compromise. and threee of which are rated Important, include a patch for a previously public issue [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72571","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72571"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72571"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72571\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}