![]() ![]() Recommendation. Customers can configure automatic updating to check online for updates from Microsoft Update by using the Microsoft Update service. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. The security update addresses the vulnerability by modifying the way that Microsoft Visio Viewer validates data when parsing specially crafted Visio files. For more information, see the subsection, Affected and Non-Affected Software, in this section. This security update is rated Important for all supported editions of Microsoft Visio Viewer 2010. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The vulnerability could allow remote code execution if a user opens a specially crafted Visio file. This security update resolves a privately reported vulnerability in Microsoft Office. Version: 1.0 General Information Executive Summary Security Bulletin Microsoft Security Bulletin MS12-031 - Important Vulnerability in Microsoft Visio Viewer 2010 Could Allow Remote Code Execution (2597981) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |