exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2013-168A

Technical Cyber Security Alert 2013-168A
Posted Jun 18, 2013
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2013-168A - Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
SHA-256 | cf7f30c9457212d92f6b62a38f0d54e3832e152a6b96e1732817a0a55735ef2c

Technical Cyber Security Alert 2013-168A

Change Mirror Download
US Computer Emergency Readiness Team banner graphic

National Cyber Awareness System:

TA13-168A: Microsoft Updates for Multiple Vulnerabilities [ https://www.us-cert.gov/ncas/alerts/TA13-168A ] 06/17/2013 11:00 AM EDT
Original release date: June 17, 2013 | Last revised: June 18, 2013

Systems Affected

* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Office

Overview

Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.

Description

The Microsoft Security Bulletin Summary for June 2013 [ https://technet.microsoft.com/en-us/security/bulletin/ms13-jun ] describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities.

Impact

These vulnerabilities could allow remote code execution, information disclosure, denial of service, or elevation of privilege.

Solution

*Apply Updates*

Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for June 2013 [ https://technet.microsoft.com/en-us/security/bulletin/ms13-jun ], which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services [ https://www.us-cert.gov/redirect?url=http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fwsus%2Fdefault.aspx ] (WSUS). Home users are encouraged to enable automatic updates [ https://www.us-cert.gov/redirect?url=http%3A%2F%2Fwindows.microsoft.com%2Fen-us%2Fwindows-vista%2FTurn-automatic-updating-on-or-off ].

References

* Microsoft Security Bulletin Summary for June 2013 [ https://www.us-cert.gov/redirect?url=http%3A//technet.microsoft.com/en-us/security/bulletin/ms13-jun ]
* Microsoft Windows Server Update Services [ https://www.us-cert.gov/redirect?url=http%3A//technet.microsoft.com/en-us/windowsserver/bb332157.aspx ]
* Turn Automatic Updating On or Off [ https://www.us-cert.gov/redirect?url=http%3A//windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off ]

Revision History

* Initial Release
________________________________________________________________________

This product is provided subject to this Notification [ https://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ https://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

OTHER RESOURCES: Contact Us [ https://www.us-cert.gov/contact-us/ ] | Security Publications [ https://www.us-cert.gov/security-publications ] | Alerts and Tips [ https://www.us-cert.gov/ncas ] | Related Resources [ https://www.us-cert.gov/related-resources ]

STAY CONNECTED: Sign up for email updates [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ]

SUBSCRIBER SERVICES:
Manage Preferences [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.5add7ee42d1876fd53e511a80c26ea4a&destination=submissions@packetstormsecurity.com ]  |  Help <support@govdelivery.com>

________________________________________________________________________

This email was sent to submissions@packetstormsecurity.com using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ https://www.govdelivery.com/portals/powered-by ]


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close