Microsoft Office Xp 2002 Download 12 PORTABLE
Download File ::: https://bytlly.com/2th5gC
After the release of Office XP, Microsoft provided a repository for downloadable smart tags on its website.[42] Examples of third-party companies that produced smart tags after the release of Office XP include ESPN,[43] Expedia,[44] FedEx,[45] and MSNBC.[46] Microsoft released a Euro Currency Converter smart tag when new euro coins and notes were introduced on January 1, 2002.[47]
Are you looking for Microsoft Office XP ISO Download and not finding it anywhere Microsoft is not providing Office XP/2002 download anymore on its official site. But you can still download it unofficially for free.
Microsoft Office XP also called 2002 or Office XP (code name Office 10) was first released on March 5, 2001, for Windows OS as a complete office suite. MS Office XP was later distributed to retail on May 31, 2001. Office XP 2002 ISO is the successor to Microsoft Office 2000 and the predecessor of Microsoft Office 2003.
Microsoft integrates productivity innovations throughout its programs to transform the traditional Office suite into a smarter overall work experience. By simplifying productivity, enabling collaboration for everyone, and extending Office beyond the desktop, Office XP Professional streamlines how people work with information and one another, making it easier for everyone to create, share, and analyze important data. Visio 2002 download and Word 2002 download also included in MS Office 2002 XP with some new updates.
Finding the Microsoft Office XP Download ISO on the internet after two decades is not easy. Microsoft itself does not provide office XP iso files on its official site. The official support for Office XP is already ended. But if you are an office XP lover, you can still download Office XP for your Windows XP in 2021. You will never find Microsoft Office XP even on popular downloading sites.
Grab a clean and malware-free OfficeXP ISO file by clicking the download button. After downloading the Office XP, extract the file and find the office XP setup.exe file. Double click on setup.exe to install it on Windows XP operating system. You can activate OfficeXP using the original license key provided by Microsoft or you can also use it without activation.
If you have installed OfficeXP on your Windows PC, you can update your complete office 2002 suite for free. Download XP services pack 3 (OfficeXP SP3) to get the latest updates for your office XP/2002.
Microsoft Jscript and VBscript engines are prone to a remote code execution vulnerability that is caused by the way JScript and VBScript scripting engines process scripts in Web pages. When the scripting engines attempt to reallocate memory while decoding a script in order to run it, an integer overflow can occur.Affected Software:JScript 5.7 and VBScript 5.7JScript 5.8 and VBScript 5.8JScript 5.6 and VBScript 5.6Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2514666, 2510531, 2510581)August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2510581)ConsequenceAn attacker who successfully exploits this vulnerability could run arbitrary code in the context of the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3 (JScript 5.7 and VBScript 5.7)Windows XP Service Pack 3 (JScript 5.8 and VBScript 5.8)Windows XP Professional x64 Edition Service Pack 2 (JScript 5.6 and VBScript 5.6)Windows XP Professional x64 Edition Service Pack 2 (JScript 5.7 and VBScript 5.7)Windows XP Professional x64 Edition Service Pack 2 (JScript 5.8 and VBScript 5.8)Windows Server 2003 Service Pack 2 (JScript 5.6 and VBScript 5.6)Windows Server 2003 Service Pack 2 (JScript 5.7 and VBScript 5.7)Windows Server 2003 Service Pack 2 (JScript 5.8 and VBScript 5.8)Windows Server 2003 x64 Edition Service Pack 2 (JScript 5.6 and VBScript 5.6)Windows Server 2003 x64 Edition Service Pack 2 (JScript 5.7 and VBScript 5.7)Windows Server 2003 x64 Edition Service Pack 2 (JScript 5.8 and VBScript 5.8)Windows Server 2003 with SP2 for Itanium-based Systems (JScript 5.6 and VBScript 5.6)For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-031.Workaround:1) Set Internet and Local intranet security zone settings to \"High\" to prompt before running ActiveX Controls and Active Scripting2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zoneImpact of workarounds #1 and #2: On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.Microsoft Internet Explorer Cumulative Security Update (MS11-018)SeverityCritical4Qualys ID100099Vendor ReferenceMS11-018CVE ReferenceCVE-2011-0094, CVE-2011-0346, CVE-2011-1244, CVE-2011-1245, CVE-2011-1345CVSS ScoresBase 9.3 / Temporal 7.7DescriptionMicrosoft Internet Explorer is a Web browser available for Microsoft Windows. Microsoft has released a security update that resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory, content during certain processes, and script during certain processes. This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and Moderate for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2497640)ConsequenceThe most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploits any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3 (Internet Explorer 6)Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6)Windows Server 2003 Service Pack 2 (Internet Explorer 6)Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6)Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6)Windows XP Service Pack 3 (Internet Explorer 7)Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 7)Windows Server 2003 Service Pack 2 (Internet Explorer 7)Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 7)Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 7)Windows Vista Service Pack 1 and Windows Vista Service Pack 2 (Internet Explorer 7)Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2 (Internet Explorer 7)Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2 (Internet Explorer 7)Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2 (Internet Explorer 7)Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2 (Internet Explorer 7)For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-018.Workaround:1) Set Internet and Local intranet security zone settings to \"High\" to prompt before running ActiveX Controls and Active Scripting2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zoneImpact of workarounds #1 and #2: On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.3) Read e-mails in plain textMicrosoft SMB Client Remote Code Execution Vulnerability (MS11-019)SeverityCritical4Qualys ID90692Vendor ReferenceMS11-019CVE ReferenceCVE-2011-0654, CVE-2011-0660CVSS ScoresBase 10 / Temporal 8.3DescriptionMicrosoft Server Message Block (SMB) Protocol is a Microsoft network file sharing protocol used in Microsoft Windows. Microsoft SMB Client is prone to a remote code execution vulnerability.Microsoft has released a security update that addresses the vulnerabilities by correcting the manner in which the CIFS Browser handles specially crafted Browser messages, and correcting the manner in which the SMB client validates specially crafted SMB responses.This security update is rated Critical for all supported releases of Microsoft Windows.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2511455)ConsequenceThe vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB response to a client-initiated SMB request. To exploit these vulnerabilities, an attacker must convince the user to initiate an SMB connection to a specially crafted SMB server.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit SystemsWindows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based SystemsWindows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based SystemsWindows Server 2008 R2 for x64-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-019 for further details.Workaround:1) Block TCP ports 138 at the firewallImpact of workaround #1: Applications that rely on the Computer Browser service will not function.2) TCP ports 139 and 445 should be blocked at the firewall to protect systems behind the firewall from attempts to exploit this vulnerability. Impact of workaround #2: Blocking the ports can cause several windows services or applications using those ports to stop functioning.Microsoft SMB Server Remote Code Execution Vulnerability (MS11-020)SeverityUrgent5Qualys ID90699Vendor ReferenceMS11-020CVE ReferenceCVE-2011-0661CVSS ScoresBase 10 / Temporal 7.4DescriptionMicrosoft Server Message Block (SMB) Protocol is a Microsoft network file sharing protocol used in Microsoft Windows. An unauthenticated remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB packets. The vulnerability is caused when the Microsoft SMB Protocol software improperly handles SMB packets, including some preauthentication scenarios. This vulnerability affects SMB version 1 and SMB version 2.Microsoft has released a security update that addresses the vulnerability by correcting the way that SMB validates fields in malformed SMB requests.This security update is rated Critical for all supported releases of Microsoft Windows. Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2508429)ConsequenceSuccessful exploitation could lead to arbitrary execution of code.SolutionPatch:Following are links for downloading patches to fix this vulnerability:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit SystemsWindows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based SystemsWindows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based SystemsWindows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based SystemsWindows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-020 for further details.Workaround:1) TCP ports 139 and 445 should be blocked at the firewall to protect systems behind the firewall from attempts to exploit this vulnerability. Impact of workaround #1: Blocking the ports can cause several windows services or applications using those ports to stop functioning.Microsoft Excel Remote Code Execution Vulnerabilities (MS11-021)SeverityCritical4Qualys ID110132Vendor ReferenceMS11-021CVE ReferenceCVE-2011-0097, CVE-2011-0098, CVE-2011-0101, CVE-2011-0103, CVE-2011-0104, CVE-2011-0105, CVE-2011-0978, CVE-2011-0979, CVE-2011-0980CVSS ScoresBase 9.3 / Temporal 7.7DescriptionMicrosoft Excel is a proprietary spreadsheet application written and distributed by Microsoft.Microsoft Excel is vulnerable to multiple remote code execution vulnerabilities. Microsoft has released an update that addresses the vulnerability by correcting the way that Microsoft Excel manages data structures, validates record information, initializes variables used in memory operations, and allocates buffer space when parsing a specially crafted file.This security update is rated Important for all supported editions of Microsoft Excel 2002, Microsoft Excel 2003, Microsoft Excel 2007, Microsoft Excel 2010, Microsoft Office 2004 for Mac, Microsoft Office 2008 for Mac, and Microsoft Office for Mac 2011; Open XML File Format Converter for Mac; and all supported versions of Microsoft Excel Viewer and Microsoft Office Compatibility Pack.ConsequenceAn attacker who successfully exploits these vulnerabilities could take complete control of an affected system.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Microsoft Office XP Service Pack 3 (Microsoft Excel 2002 Service Pack 3)Microsoft Office 2003 Service Pack 3 (Microsoft Excel 2003 Service Pack 3)Microsoft Office 2007 Service Pack 2 (Microsoft Excel 2007 Service Pack 2)Microsoft Office 2010 (32-bit editions) (Microsoft Excel 2010 (32-bit editions))Microsoft Office 2010 (64-bit editions) (Microsoft Excel 2010 (64-bit editions))Microsoft Office 2004 for MacMicrosoft Office 2008 for MacMicrosoft Office for Mac 2011Open XML File Format Converter for MacMicrosoft Excel Viewer Service Pack 2Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2Refer to Microsoft Security Bulletin MS11-021 for further details.Workaround:1) Avoid opening Office files received from un-trusted sources.2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or un-trusted sources because it protects Office 2003 installations by more securely opening Word, Excel, and PowerPoint binary format files. Information on MOICE can be found at KB935865.Impact of workaround #2:Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources. The following registry scripts can be used to set the File Block policy.Impact of workaround #3:If File Block policy is configured without special \"exempt directory\" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.Microsoft PowerPoint Remote Code Execution Vulnerability (MS11-022)SeverityCritical4Qualys ID110148Vendor ReferenceMS11-022CVE ReferenceCVE-2011-0655, CVE-2011-0656, CVE-2011-0976CVSS ScoresBase 9.3 / Temporal 7.7DescriptionMicrosoft PowerPoint is a proprietary presentation application written and distributed by Microsoft.PowerPoint is prone to multiple vulnerabilities that could lead to remote code execution (CVE-2011-0655, CVE-2011-0656, CVE-2011-0976).Microsoft has released a security update that addresses the vulnerabilities by modifying the way PowerPoint validates records when opening PowerPoint filesThis security update is rated Important for all supported releases of Microsoft PowerPoint; Microsoft Office for Mac; Open XML File Format Converter for Mac; Microsoft Office Compatibility Pack for Word, Excel and PowerPoint 2007 File Formats; Microsoft PowerPoint Viewer, and Microsoft PowerPoint Web AppConsequenceAn attacker who successfully exploits these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Microsoft Office XP Service Pack 3 (Microsoft PowerPoint 2002 Service Pack 3)Microsoft Office 2003 Service Pack 3 (Microsoft PowerPoint 2003 Service Pack 3)Microsoft Office 2007 Service Pack 2 (Microsoft PowerPoint 2007 Service Pack 2)Microsoft Office 2010 (32-bit editions) (Microsoft PowerPoint 2010 (32-bit editions))Microsoft Office 2010 (64-bit editions) (Microsoft PowerPoint 2010 (64-bit editions))Microsoft Office 2004 for MacMicrosoft Office 2008 for MacMicrosoft Office for Mac 2011Open XML File Format Converter for MacMicrosoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2Microsoft PowerPoint Viewer 2007 Service Pack 2Refer to Microsoft Security Bulletin MS11-022 for further details.Workaround:1) Avoid opening Office files received from un-trusted sources.2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or un-trusted sources because it protects Office 2003 installations by more securely opening Word, Excel, and PowerPoint binary format files. Information on MOICE can be found at KB935865.Impact of workaround #2: Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources.Impact of workaround #3: If File Block policy is configured without special \"exempt directory\" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.4) Set Office File Validation to disable editing in protected view in PowerPoint 2010.Impact of workaround #4: Office File Validation will no longer allow the editing of suspicious files in PowerPoint 2010.Microsoft Office Remote Code Execution Vulnerability (MS11-023)SeverityUrgent5Qualys ID110146Vendor ReferenceMS11-023CVE ReferenceCVE-2011-0107, CVE-2011-0977CVSS ScoresBase 9.3 / Temporal 7.7DescriptionMicrosoft Office is prone to the following vulnerabilities:- A remote code execution vulnerability exists in the way that Microsoft Office handles the loading of DLL files. (CVE-2011-0107)- A remote code execution vulnerability exists in the way that Microsoft Office handles graphic objects when parsing a specially crafted Office file. (CVE-2011-0977)Microsoft has released an update that addresses the vulnerabilities by correcting the way that Microsoft Office handles graphic objects in specially crafted Office files and by correcting the manner in which Microsoft Office loads external libraries.This security update is rated Important for all supported editions of Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2004 for Mac, and Microsoft Office 2008 for Mac; and Open XML File Format Converter for Mac.ConsequenceBy exploiting these vulnerabilities, an attacker could take complete control of an affected system.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Microsoft Office XP Service Pack 3Microsoft Office 2003 Service Pack 3Microsoft Office 2007 Service Pack 2Microsoft Office 2004 for MacMicrosoft Office 2008 for MacOpen XML File Format Converter for MacRefer to Microsoft Security Bulletin MS11-023 for further details.Workaround:1) Avoid opening Office files received from un-trusted sources.2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or un-trusted sources because it protects Office 2003 installations by more securely opening Word, Excel, and PowerPoint binary format files. Information on MOICE can be found at KB935865.Impact of workaround #2:Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources. The following registry scripts can be used to set the File Block policy.Impact of workaround #3:If File Block policy is configured without special \"exempt directory\" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.4) Disable loading of libraries from WebDAV and remote network shares5) Disable the WebClient serviceImpact of workaround #5:When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log. 6) Block TCP ports 139 and 445 at the firewallImpact of workaround #6: Several Windows services use the affected ports. Blocking connectivity to the ports may cause various applications or services to not function.Microsoft DNS Resolution Remote Code Execution Vulnerability (MS11-030)SeverityCritical4Qualys ID90695Vendor ReferenceMS11-030CVE ReferenceCVE-2011-0657CVSS ScoresBase 7.5 / Temporal 5.9DescriptionDNSAPI.dll component is prone to a remote code execution vulnerability.The vulnerability is caused by the way the DNS client handles specially crafted LLMNR queries.Microsoft has released a security update that addresses the vulnerability by correcting the manner in which the DNS client processes specifically crafted DNS queries. This security update is rated Critical for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. The security update is rated Important for all supported editions of Windows XP and Windows Server 2003.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2509553)ConsequenceThe vulnerability could allow remote code execution if an attacker gained access to the network and then created a custom program to send specially crafted LLMNR broadcast queries to the target systems.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-030 for further details.Workaround:1) Block TCP port 5355 and UDP port 5355 at the firewallImpact of workaround #1: Blocking connectivity to these ports will help prevent systems that are behind the firewall from attempts to exploit this vulnerability.2) Disable Link-Local Mulitcast Name Resolution using group policyImpact of workaround #2: The computer may not be visible to other computers on the network.3) Turn off Network DiscoveryImpact of workaround #3: The computer may not be visible to other computers on the network.Microsoft Windows Fax Cover Page Editor Remote Code Execution Vulnerability (MS11-024)SeverityCritical4Qualys ID90675Vendor ReferenceMS11-024CVE ReferenceCVE-2010-3974, CVE-2010-4701CVSS ScoresBase 7.6 / Temporal 6.3DescriptionThe Fax Cover Page Editor (fxscover.exe) application can be used to create and edit fax cover pages.The vulnerability exists in Windows Fax Cover Page that is caused when the Windows Fax Cover Page Editor does not properly parse a specially crafted fax cover page.Microsoft has released a security update that addresses the vulnerability by correcting the manner in which the Windows Fax Page Editor parses fax cover page files. This security update is rated Important for all supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2491683, KB2506212)ConsequenceThe vulnerability could allow remote code execution if a user opened a specially crafted fax cover page file (.cov) using the Windows Fax Cover Page Editor. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-024.Workaround:1) Remove the Fax Cover Page .COV file association on Windows XP and Windows Server 2003Impact of workaround #1: This workaround removes the .COV file association. Double-clicking a COV file will no longer launch Windows Fax Cover Page Editor.Microsoft Foundation Class Library Remote Code Execution Vulnerability (MS11-025)SeverityUrgent5Qualys ID90698Vendor ReferenceMS11-025CVE ReferenceCVE-2010-3190CVSS ScoresBase 9.3 / Temporal 7.7DescriptionThe Microsoft Foundation Class Library is an application framework for programming in Microsoft Windows.A remote code execution vulnerability exists in the way that certain applications built with Microsoft Foundation Classes handle the loading of DLL files.Affected Software: Microsoft Visual Studio .NET 2003 Service Pack 1Microsoft Visual Studio 2005 Service Pack 1Microsoft Visual Studio 2008 Service Pack 1Microsoft Visual Studio 2010Microsoft Visual C++ 2005 Service Pack 1 Redistributable PackageMicrosoft Visual C++ 2008 Service Pack 1 Redistributable PackageMicrosoft Visual C++ 2010 Redistributable PackageConsequenceAn attacker who successfully exploited this vulnerability could run arbitrary code as the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Microsoft Visual Studio .NET 2003 Service Pack 1Microsoft Visual Studio 2005 Service Pack 1Microsoft Visual Studio 2008 Service Pack 1Microsoft Visual Studio 2010Microsoft Visual Studio 2010 Service Pack 1Microsoft Visual C++ 2005 Service Pack 1 Redistributable PackageMicrosoft Visual C++ 2008 Service Pack 1 Redistributable PackageMicrosoft Visual C++ 2010 Redistributable PackageMicrosoft Visual C++ 2010 Redistributable Package Service Pack 1For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-025.Workaround:1)Disable loading of libraries from WebDAV and remote network shares2) Disable the WebClient serviceImpact of workaround #2: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log. 3) Block TCP ports 139 and 445 at the firewallImpact of workaround #3: Several Windows services use the affected ports. Blocking connectivity to the ports may cause various applications or services to not function.Microsoft MHTML Information Disclosure Vulnerability (KB2501696, MS11-026)SeveritySerious3Qualys ID90679Vendor ReferenceKB2501696, MS11-026CVE ReferenceCVE-2011-0096CVSS ScoresBase 4.3 / Temporal 3.6DescriptionMHTML (MIME Encapsulation of Aggregate HTML) is an Internet standard that defines the MIME structure that is used to wrap HTML content.An information disclosure vulnerability exists in the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible under certain conditions for this vulnerability to allow an attacker to run a client-side script in the wrong security context.Affected Software:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2503658)ConsequenceAn attacker who successfully exploited this vulnerability could inject a client-side script into the user's instance of Internet Explorer. The script could spoof content, disclose information, or take any action that the user could take on the affected Web site on behalf of the targeted user.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-026 for further details.Workaround:1) Disable the MHTML protocol handlerImpact of workaround #1: The MHTML protocol will cease to function. Any application that uses MHTML will be affected by this workaround.2) Enable the MHTML protocol lockdownImpact of workaround #2: The MHTML protocol will be restricted to prevent the launch of script in all zones within an MHTML document. Any application that uses MHTML will be affected by this workaround. Script in standard HTML files is not affected by this workaround.3) Set Internet and Local intranet security zone settings to \"High\" to prompt before running ActiveX Controls and Active Scripting4) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zoneImpact of workaround #3 and #4: On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.Microsoft Windows Cumulative Security Update of ActiveX Kill Bits (MS11-027)SeverityUrgent5Qualys ID90694Vendor ReferenceMS11-027CVE ReferenceCVE-2010-0811, CVE-2010-3973, CVE-2011-1243CVSS ScoresBase 9.3 / Temporal 7.7DescriptionThe Microsoft Data Analyzer ActiveX control allows programmatic control of the Data Analyzer from COM-based development applications such as Microsoft Visual Basic. The Microsoft Internet Explorer 8 Developer Tools enables Web site developers to quickly debug Microsoft Jscript, investigate behavior specific to Internet Explorer, and prototype new designs or solutions on-the-fly.A remote code execution vulnerability exists in the Microsoft Data Analyzer ActiveX Control, WMITools ActiveX Control and Windows Messenger ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. (CVE-2010-0811,CVE-2010-3973, CVE-2011-1243).Microsoft has released an update that also sets kill bits for the some ActiveX Controls from Oracle, CA and IBM.This security update is rated Critical for all supported editions of Windows XP, Windows Vista, and Windows 7, and Moderate for all supported editions of Windows Server 2003 (except Itanium-based editions), Windows Server2008 (except Itanium-based editions), and Windows Server 2008 R2. Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2508272)August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2508272)ConsequenceSuccessfully exploiting this vulnerability could allow a remote attacker to execute arbitrary code.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit SystemsWindows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based SystemsWindows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based SystemsWindows Server 2008 R2 for x64-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-027 for further details.Workaround:1) Set Internet and Local intranet security zone settings to \"High\" to prompt before running ActiveX Controls and Active Scripting2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zoneImpact of workarounds #1 and #2: On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.3) Prevent COM objects from running in Internet ExplorerMicrosoft .NET Framework Remote Code Execution Vulnerability (MS11-028)SeverityUrgent5Qualys ID90696Vendor ReferenceMS11-028CVE ReferenceCVE-2010-3958CVSS ScoresBase 9.3 / Temporal 7.3DescriptionThe Microsoft .NET Framework is a software framework for computers running Microsoft Windows operating systems. A remote code execution vulnerability exists in the way that Microsoft .NET Framework handles certain function calls. (CVE-2010-3958).Microsoft has released a security update that addresses the vulnerability by correcting the manner in which the .NET Framework handles certain types of function calls.This security update is rated Critical for all affected releases of Microsoft .NET Framework for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2484015, KB2446704, KB2446708)ConsequenceSuccessfully exploiting this vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs).SolutionPatch:Following are links for downloading patches to fix this vulnerability:Windows XP Service Pack 3 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows XP Service Pack 3 (Microsoft .NET Framework 4.0[1])Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4.0[1])Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 4.0[1])Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 4.0[1])Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 4.0[1])Windows Vista Service Pack 1 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)Windows Vista Service Pack 1 (Microsoft .NET Framework 4.0[1])Windows Vista Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1)For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-028.Workaround:1) Disable partially trusted Microsoft .NET applicationsImpact of workaround #1: Microsoft .NET applications may not run.2) Disable XAML browser applications in Internet ExplorerImpact of workaround #2: Microsoft .NET code will not run in Internet Explorer or will not run without prompting. Disabling Microsoft .NET applications and components in the Internet and Local intranet security zones may cause some Web sites to work incorrectly.Microsoft Windows GDI+ Remote Code Execution Vulnerability (MS11-029)SeverityUrgent5Qualys ID90702Vendor ReferenceMS11-029CVE ReferenceCVE-2011-0041CVSS ScoresBase 9.3 / Temporal 7.7DescriptionGDI+ is a graphics device interface that provides two-dimensional vector graphics, imaging, and typography to applications and programmers.A remote code execution vulnerability exists in the way that GDI+ handles integer calculations when a user opens a specially crafted Enhanced Metafile (EMF) image format file. Microsoft has released a security update that addresses the vulnerability by modifying the way that GDI+ handles integer calculations when processing EMF files. The security update for Microsoft Office XP is under MS11-023.This security update is rated Critical for all supported versions of Microsoft Windows.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2412687)ConsequenceAn attacker who successfully exploits this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.SolutionPatch:Following are links for downloading patches to fix this vulnerability:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Workaround:1) Disable metafile processingImpact of workaround #1: Turning off processing of metafiles may cause the performance of software or system components to decrease in functionality. Turning off processing of metafiles may also cause the software or system components to fail completely. 2) Restrict access to gdiplus.dllImpact of workaround #2: Windows Picture and Fax Viewer (on editions prior to Windows Vista) and other applications that rely on GDI+ will not be able to view images. Also, thumbnails in Windows Explorer (on versions prior to Vista) will not display.Microsoft OpenType Compact Font Format (CFF) Driver Remote Code Execution Vulnerability (MS11-032)SeverityUrgent5Qualys ID90697Vendor ReferenceMS11-032CVE ReferenceCVE-2011-0034CVSS ScoresBase 9.3 / Temporal 7.3DescriptionMicrosoft OpenType is a font format developed jointly by Microsoft and Adobe as an extension of Apple's TrueType font format. An OpenType CFF font is an OpenType font that contains PostScript Type 1 outlines. OpenType fonts can contain either PostScript Type 1 or TrueType outlines.A remote code execution vulnerability exists in the way that the OpenType Font (OTF) driver improperly parses specially crafted OpenType fonts. (CVE-2011-0034)Microsoft has released an update that addresses the vulnerabilitiy by correcting the manner in which the OpenType Font (OTF) driver parses a specially crafted OpenType font.This security update is rated Critical for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. This security update is also rated Important for all supported editions of Windows XP and Windows Server 2003.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2507618)ConsequenceBy exploiting this vulnerability, an attacker could run arbitrary code in kernel mode.SolutionPatch:Following are links for downloading patches to fix this vulnerability:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-032 for further details.Workaround:1) Disable the Preview Pane and Details Pane in Windows ExplorerImpact of workaround #1: Windows Explorer will not automatically display OTF fonts.2) Disable the WebClient serviceImpact of workaround #2: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the WebClient service will not start, and an error message will be logged in the System log.Microsoft WordPad Text Converters Remote Code Execution Vulnerability (MS11-033)SeverityCritical4Qualys ID90693Vendor ReferenceMS11-033CVE ReferenceCVE-2011-0028CVSS ScoresBase 9.3 / Temporal 7.7DescriptionWordPad is a basic word processor that is included in Windows. A remote code execution vulnerability exists in the way that Microsoft WordPad parses specially crafted Word documents. The vulnerability could allow remote code execution if a user opens a specially crafted Word file that includes a malformed structure. Microsoft has released a security update that addresses the vulnerability by changing the way that the WordPad Text Converters handle specially crafted files.This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2485663)ConsequenceExploitation could result in arbitrary execution of code.SolutionPatch:Following are links for downloading patches to fix this vulnerability:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsRefer to Microsoft Security Bulletin MS11-033 for further details.Workaround:Disable the WordPad Word 97 text converter by restricting access to the converter file.Impact of workaround: Upon implementing the workaround, opening a Word document in WordPad results in WordPad displaying representations of binary data instead of formatted text.Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerability (MS11-034)SeverityCritical4Qualys ID90701Vendor ReferenceMS11-034CVE ReferenceCVE-2011-0662, CVE-2011-0665, CVE-2011-0666, CVE-2011-0667, CVE-2011-0670, CVE-2011-0671, CVE-2011-0672, CVE-2011-0673, CVE-2011-0674, CVE-2011-0675, CVE-2011-0676, CVE-2011-0677, CVE-2011-1225, CVE-2011-1226, CVE-2011-1227, CVE-2011-1228, CVE-2011-1229, CVE-2011-1230, CVE-2011-1231, CVE-2011-1232, CVE-2011-1233, CVE-2011-1234, CVE-2011-1235, CVE-2011-1236, CVE-2011-1237, CVE-2011-1238, CVE-2011-1239, CVE-2011-1240, CVE-2011-1241, CVE-2011-1242CVSS ScoresBase 7.2 / Temporal 6DescriptionThe Windows kernel is the core of the operating system. It provides system-level services such as device management and memory management, allocates processor time to processes, and manages error handling. The kernel is prone to the multiple vulnerabilities that could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. Microsoft has released an update that addresses the following issues:- An elevation of privilege vulnerability exists due to improper Kernel-mode driver object management. This addresses the following CVE-IDs : CVE-2011-0662, CVE-2011-0665, CVE-2011-0666, CVE-2011-0667, CVE-2011-0670, CVE-2011-0671, CVE-2011-0672, CVE-2011-0674, CVE-2011-0675, CVE-2011-1234, CVE-2011-1235, CVE-2011-1236, CVE-2011-1237, CVE-2011-1238, CVE-2011-1239, CVE-2011-1240, CVE-2011-1241 and CVE-2011-1242- An elevation of privilege vulnerability exists due to a Null pointer dereference. This is due to the way the kernel-mode drivers keep track of pointers to certain kernel-mode driver objects. This addresses the following CVE-IDs : CVE-2011-0673, CVE-2011-0676, CVE-2011-0677, CVE-2011-1225, CVE-2011-1226, CVE-2011-1227, CVE-2011-1228, CVE-2011-1229, CVE-2011-1230, CVE-2011-1231, CVE-2011-1232 and CVE-2011-1233Microsoft has released an update which addresses the vulnerabilities by correcting the way that kernel-mode drivers manage kernel-mode driver objects and keep track of pointers to kernel-mode driver objects.This security update is rated Important for all supported versions of Microsoft Windows.Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):April Security Updates for XP Embedded SP3 and Standard 2009 Are Now on ECE (KB2506223)ConsequenceAn attacker must have valid login credentials and be able to log on locally to exploit these vulnerabilities.SolutionPatch:Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3Windows XP Professional x64 Edition Service Pack 2Windows Server 2003 Service Pack 2Windows Server 2003 x64 Edition Service Pack 2Windows Server 2003 with SP2 for Itanium-based SystemsWindows Vista Service Pack 1 and Windows Vista Service Pack 2Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems and Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for Itanium-based Systems and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1Refer to Microsoft Security Bulletin MS11-034 for further details.These new vulnerability checks are included in Qualysvulnerability signature1.28.85-3.Each Qualys account is automatically updated with the latestvulnerability signatures as they become available. To view thevulnerability signature version in your account, from theQualys Help menu, select the About tab. 153554b96e
https://www.timecrunchhiking.com/forum/travel-forum/reikan-focal-download-crack-25
We offer a one-stop-shop for purchasing all the personal documents you require((https://buyrealdriverslicenseonline.com/)). In addition, we deliver these documents to the homes of all consumers who place orders directly through our website. Our specialists interact in all EU nations, including the United Kingdom, to deliver authentic documents to our clients. However, we have recently expanded our influence to the United States and Canada. https://buyrealdriverslicenseonline.com/
The necessity of documents such as a driver's license and the complexities of procuring an authentic one can at times be aggravating. Visit us at and one of our representatives will assist you. Our deadlines for producing all documents are crucial, as we cannot keep the consumer waiting for longer than necessary.https://buyrealdriverslicenseonline.com/
In addition, when you contact us to purchase a driver's license, passport, ID card, boat license or resident permit we provide you with the necessary information based on the country from which you desire to purchase. We offer a one-stop-shop for purchasing all the personal documents you require((https://buyrealdriverslicenseonline.com/)). In addition, we deliver these documents to the homes of all consumers who place orders directly through our website. Our specialists interact in all EU nations, including the United Kingdom, to deliver authentic documents to our clients. However, we have recently expanded our influence to the United States and Canada. https://buyrealdriverslicenseonline.com/
The necessity of documents such as a driver's license and the complexities of procuring an authentic one can at times be aggravating. Visit us at and one of our representatives will assist you. Our deadlines for producing all documents are crucial, as we cannot keep the consumer waiting for longer than necessary.https://buyrealdriverslicenseonline.com/
In addition, when you contact us to purchase a driver's license, passport, ID card, boat license or resident permit we provide you with the necessary information based on the country from which you desire to purchase. https://buyrealdriverslicenseonline.com/
BUY CANADIAN DRIVER’S LICENSE (https://buyrealdriverslicenseonline.com/product/canadian-drivers-license/)
BUY GERMAN DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/german-drivers-license/)
BUY ITALIAN DRIVERS LICENSE ONLINE( https://buyrealdriverslicenseonline.com/product/italian-drivers-license/)
BUY A DUTCH DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/dutch-drivers-license/)
BUY A POLISH DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/polish-drivers-license/)
BUY A SPANISH DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/spanish-drivers-license/)
BUY A SWEDISH DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/swedish-drivers-license/)
BUY A PORTUGUESE DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/portuguese-drivers-license/)
BUY A UK DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/uk-drivers-license/)
BUY A ROMANIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/romanian-drivers-license/)
BUY A HUNGARIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/hungarian-drivers-license/)
BUY A BULGARIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/bulgarian-drivers-license/)
BUY A MEXICAN DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/mexico-drivers-license/)
BUY A LITHUANIAN DRIVERS ONLINE(https://buyrealdriverslicenseonline.com/product/lithuanian-drivers-license/)
BUY A LUXEMBOURG DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/luxembourgian-drivers-license/)
BUY A UKRAINIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/ukrainian-drivers-license/)
BUY A SLOVENIAN LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/slovenian-drivers-license/)
BUY A SLOVAK DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/slovak-drivers-license/)
BUY A SERBIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/serbain-drivers-license/)
BUY A LATVIAN DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/latvian-drivers-license/)
BUY A NORWEGIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/norwegian-drivers-license/)
BUY A RUSSIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/russian-drivers-license/)
BUY CANADIAN DRIVER’S LICENSE (https://buyrealdriverslicenseonline.com/product/canadian-drivers-license/)
BUY GERMAN DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/german-drivers-license/)
BUY ITALIAN DRIVERS LICENSE ONLINE( https://buyrealdriverslicenseonline.com/product/italian-drivers-license/)
BUY A DUTCH DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/dutch-drivers-license/)
BUY A POLISH DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/polish-drivers-license/)
BUY A SPANISH DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/spanish-drivers-license/)
BUY A SWEDISH DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/swedish-drivers-license/)
BUY A PORTUGUESE DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/portuguese-drivers-license/)
BUY A UK DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/uk-drivers-license/)
BUY A ROMANIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/romanian-drivers-license/)
BUY A HUNGARIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/hungarian-drivers-license/)
BUY A BULGARIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/bulgarian-drivers-license/)
BUY A MEXICAN DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/mexico-drivers-license/)
BUY A LITHUANIAN DRIVERS ONLINE(https://buyrealdriverslicenseonline.com/product/lithuanian-drivers-license/)
BUY A LUXEMBOURG DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/luxembourgian-drivers-license/)
BUY A UKRAINIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/ukrainian-drivers-license/)
BUY A SLOVENIAN LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/slovenian-drivers-license/)
BUY A SLOVAK DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/slovak-drivers-license/)
BUY A SERBIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/serbain-drivers-license/)
BUY A LATVIAN DRIVERS LICENSE ONLINE (https://buyrealdriverslicenseonline.com/product/latvian-drivers-license/)
BUY A NORWEGIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/norwegian-drivers-license/)
BUY A RUSSIAN DRIVERS LICENSE ONLINE(https://buyrealdriverslicenseonline.com/product/russian-drivers-license/)