CERT mailing list archives

Current Activity - Microsoft Releases December 2012 Security Bulletin


From: Current Activity <us-cert () us-cert gov>
Date: Tue, 11 Dec 2012 16:30:15 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System

US-CERT Current Activity
Microsoft Releases December 2012 Security Bulletin

Original release date: December 7, 2012
Last revised: December 11, 2012

Microsoft has released updates to address vulnerabilities in Microsoft
Windows, Internet Explorer, Microsoft Office, and Microsoft Server
Software as part of the Microsoft Security Bulletin summary for December
2012. These vulnerabilities could allow an attacker to bypass security
features or remotely execute arbitrary code.

US-CERT encourages users and administrators to review the bulletin and
follow best-practice security policies to determine which updates should
be applied.

Relevant URL(s):
<http://technet.microsoft.com/en-us/security/bulletin/ms12-dec>


____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/current/#microsoft_releases_advanced_notification_for10

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUMel3XdnhE8Qi3ZhAQLhRwf9H6NFp9P1hW+5IyT58YbeCI3ZRLL4fUDu
fp4Qr5xwwv9H++/Hp0UPTcutAGrstCP0+JurqzzC6SZV8OXhzkQHnWMDv82Wg7+3
rZfY04u59sfiYeN9QfudBqaFDsyaA41JggiYVP/JYnhNo2pUbt/zkna8RllaRwjj
78bbzvvSooh+pNGR7i8aasSfl0X4jLK/85PWV2d5+YouN4dUzHyOrrERRVtUIU49
KV9L13ZsE4Zslf//kRGh08gyx+4H/mc1t0RmQHArLI9meKaeeLMRnavkv/ErUU2H
iHZbb0PqXoD/Hvus4KkAzS9ic+NJ5+/TT6/J7UR/f5ReGt0P3RKJsg==
=Awta
-----END PGP SIGNATURE-----


Current thread: