{"id":72807,"date":"2010-08-11T07:00:23","date_gmt":"2010-08-11T07:00:23","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72807"},"modified":"2010-08-11T07:00:23","modified_gmt":"2010-08-11T07:00:23","slug":"microsoft-security-bulletin-released-for-the-month-of-august","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/microsoft-security-bulletin-released-for-the-month-of-august\/","title":{"rendered":"Microsoft Security Bulletin released for the month of August"},"content":{"rendered":"<p>Microsoft has released its security bulletin for August 2010. This month Microsoft has released 15 bulletins, addressing total 32 vulnerabilities.<\/p>\n<p>Out of the 15 bulletins, nine bulletins have been rated &#8220;Critical&#8221; and six bulletins have been rated &#8220;Important&#8221;. 11 bulletins are related to &#8220;Remote Code Execution&#8221; vulnerability and four bulletins are related to &#8220;Elevation of Privilege&#8221; vulnerability.<\/p>\n<p>The following vulnerabilities have been rated \u201cCritical\u201d:<\/p>\n<p>&#8211; Bulletin MS10-046 resolves vulnerability in Windows Shell that could allow remote code execution if the icon of a specially crafted shortcut is displayed in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-049 resolves two vulnerabilities in Secure Channel (SChannel) security package in Windows that could allow remote code execution if a user visits a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser, in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-051 resolves vulnerability in Microsoft XML Core Services that could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer, in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-052 resolves vulnerability in Microsoft MPEG Layer-3 audio codecs that could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content, in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-053 resolves six vulnerabilities in Internet Explorer that could allow remote code execution if a user views a specially crafted Web page using Microsoft Internet Explorer.<br \/>\n&#8211; Bulletin MS10-054 resolves three vulnerabilities in Microsoft Windows that could allow remote code execution if an attacker created a specially crafted SMB packet and sent the packet to an affected system, in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-055 resolves vulnerability in Cinepak Codec that could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content, in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-056 resolves four vulnerabilities that could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message, in Microsoft Office.<br \/>\n&#8211; Bulletin MS10-060 resolves two vulnerabilities that could allow remote code execution on a client system, if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application.<\/p>\n<p>The following vulnerabilities have been rated \u201cImportant\u201d:<\/p>\n<p>&#8211; Bulletin MS10-047 resolves two vulnerabilities that could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application, in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-048 resolves four vulnerabilities in Windows kernel-mode drivers that could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-050 resolves vulnerability in Windows Movie Maker that could allow remote code execution if an attacker sent a specially crafted Movie Maker project file and convinced the user to open the specially crafted file in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-057 resolves vulnerability in Microsoft Office that could allow remote code execution if a user opens a specially crafted Excel file.<br \/>\n&#8211; Bulletin MS10-058 resolves two vulnerabilities that could allow elevation of privilege due to an error in the processing of a specific input buffer in Microsoft Windows operating system.<br \/>\n&#8211; Bulletin MS10-059 resolves vulnerability in Tracing Feature for Services that could allow elevation of privilege if an attacker runs a specially crafted application in Microsoft Windows operating system.<\/p>\n<p>The above bulletins released this month provides security updates for Microsoft Windows operating system, Microsoft Office, Microsoft Internet Explorer, Microsoft .NET Framework and Microsoft Silverlight.<\/p>\n<p>For detailed information of all the bulletins and the corresponding vulnerabilities addressed, please visit <a title=\"Microsoft Security Bulletin Summary - August 2010 page\" href=\"https:\/\/www.microsoft.com\/technet\/security\/bulletin\/ms10-aug.mspx\">Microsoft Security Bulletin Summary &#8211; August 2010 page<\/a>.<\/p>\n<p>I will recommend users to set <strong>Windows Update<\/strong> in <strong>Install updates automatically mode<\/strong>. So the important patches get applied automatically.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released its security bulletin for August 2010. This month Microsoft has released 15 bulletins, addressing total 32 vulnerabilities. Out of the 15 bulletins, nine bulletins have been rated &#8220;Critical&#8221; and six bulletins have been rated &#8220;Important&#8221;. 11 bulletins are related to &#8220;Remote Code Execution&#8221; vulnerability and four bulletins are related to &#8220;Elevation of [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72807","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72807"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72807"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72807\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}