Patch Repository

Windows Server 2008 R2 Standard Edition (x64) Patch Details
Patch Name Windows6.1-2008-R2-KB982132-x64.msu
Patch Description Security Update for Windows Server 2008 R2 x64 Edition (KB982132)
Bulletin Id MS10-076
Bulletin Title Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132)
Severity Critical
Location Path Windows6.1-2008-R2-KB982132-x64.msu
Bulletin Summary This security update resolves a privately reported vulnerability in a Microsoft Windows component, the Embedded OpenType (EOT) Font Engine. The vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Superceding Bulletin Id None
Patch Release Date Oct 12, 2010

Affected Product Information

Product Name Service Pack Name
Windows Server 2008 R2 Standard Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Enterprise Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Datacenter Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Web Server Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Foundation Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Enterprise Edition (core installation) (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Standard Edition (core installation) (x64)Windows Server 2008 R2 Gold (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.