exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2013-134A

Technical Cyber Security Alert 2013-134A
Posted May 15, 2013
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2013-134A - Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 7714de8bb2671df1b661588d6aa17bc3ff066a21e79b5bb65dcefbf463b2b1e0

Technical Cyber Security Alert 2013-134A

Change Mirror Download
US Computer Emergency Readiness Team banner graphic

National Cyber Awareness System:

TA13-134A: Microsoft Updates for Multiple Vulnerabilities [ https://www.us-cert.gov/ncas/alerts/TA13-134A ] 05/14/2013 04:08 PM EDT
Original release date: May 14, 2013

Systems Affected

* Microsoft Windows
* Internet Explorer
* Microsoft .NET Framework
* Microsoft Lync
* Microsoft Office
* Microsoft Windows Essentials

Overview

Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.

Description

The Microsoft Security Bulletin Summary for May 2013 [ https://technet.microsoft.com/en-us/security/bulletin/ms13-may ]describes multiple vulnerabilities in Microsoft software. Microsoft has released updates to address these vulnerabilities.

Impact

A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system.

Solution

*Apply Updates*

Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for May 2013 [ https://technet.microsoft.com/en-us/security/bulletin/ms13-may ], which describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services [ https://technet.microsoft.com/en-us/wsus/default.aspx ] (WSUS). Home users are encouraged to enable automatic updates [ https://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off ].

References

* Microsoft Security Bulletin Summary for May 2013 [ https://technet.microsoft.com/en-us/security/bulletin/ms13-may ]
* Windows Server Update Services [ https://technet.microsoft.com/en-us/windowsserver/bb332157.aspx ]
* Turn automatic updating on or off [ https://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off ]

Revision History

* Initial Release 5/14/2013
________________________________________________________________________

This product is provided subject to this Notification [ https://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ https://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

OTHER RESOURCES: Contact Us [ https://www.us-cert.gov/contact-us/ ] | Security Publications [ https://www.us-cert.gov/security-publications ] | Alerts and Tips [ https://www.us-cert.gov/ncas ] | Related Resources [ https://www.us-cert.gov/related-resources ]

STAY CONNECTED: Sign up for email updates [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ]

SUBSCRIBER SERVICES:
Manage Preferences [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=true ]  |  Unsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubscribe?verification=5.a57a8ba61dff70445337816fa56f272d&destination=packet@packetstormsecurity.org ]  |  Help <support@govdelivery.com>

________________________________________________________________________

This email was sent to packet@packetstormsecurity.org using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery [ https://www.govdelivery.com/portals/powered-by ]


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close