{"id":72668,"date":"2011-03-09T05:50:41","date_gmt":"2011-03-09T05:50:41","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72668"},"modified":"2011-03-09T05:50:41","modified_gmt":"2011-03-09T05:50:41","slug":"microsoft-march-patch-tuesday-released","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-march-patch-tuesday-released\/","title":{"rendered":"Microsoft March Patch Tuesday Released"},"content":{"rendered":"<p>Microsoft has released March\u2019s Patch Tuesday updates which comprise of 3 patches, one critical and two important, that fix four vulnerabilities.<\/p>\n<p><strong>MS11-015 &#8211; Vulnerabilities in Windows Media Could Allow Remote Code Execution (2510030)<\/strong><br \/>\nThe only critical vulnerability belongs to Windows Media, specifically DirectShow, Windows Media Player and Windows Media Center which could allow remote code execution if a specific malicious Microsoft Digital Video Recording (.dvr-ms) file is opened. Microsoft warns that in all cases, the file will not open automatically and users cannot be forced to open it, for an attack to be successful, a user must be convinced to do so.<\/p>\n<p><strong>MS11-017 &#8211; Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2508062)<\/strong><br \/>\nThe second patch, labelled important, resolves a publicly disclosed vulnerability in Windows Remote Desktop Client which could again allow remote code execution if a particular file is opened. The file, a legitimate Remote Desktop configuration (.rdp) file, is found located in the same network folder as a specially crafted library file. Microsoft say that \u201cfor an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a document from this location that is then loaded by a vulnerable application.\u201d<\/p>\n<p><strong>MS11-016 &#8211; Vulnerability in Microsoft Groove Could Allow Remote Code Execution (2494047)<\/strong><br \/>\nThe final important patch addresses a vulnerability in Microsoft Groove that could allow for remote code execution if a legitimate Groove-related file that is located in the same network directory as a specially crafted library file is opened. Microsoft add that \u201cusers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\u201d<\/p>\n<p>For detailed information of all the bulletins and the corresponding vulnerabilities addressed, please visit,<\/p>\n<p>https:\/\/www.microsoft.com\/technet\/security\/bulletin\/ms11-mar.mspx<\/p>\n<p>We will recommend users to set Windows Update in Install updates automatically mode. So the important patches get applied automatically.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released March\u2019s Patch Tuesday updates which comprise of 3 patches, one critical and two important, that fix four vulnerabilities. MS11-015 &#8211; Vulnerabilities in Windows Media Could Allow Remote Code Execution (2510030) The only critical vulnerability belongs to Windows Media, specifically DirectShow, Windows Media Player and Windows Media Center which could allow remote code [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72668","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72668"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72668"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72668\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}