Patch Repository

MS10-074 Bulletin Details
Bulletin ID MS10-074
Title Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution (2387149)
Summary This security update resolves a publicly disclosed vulnerability in the Microsoft Foundation Class (MFC) Library. The vulnerability could allow remote code execution if a user is logged on with administrative user rights and opens an application built with the MFC Library. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user. If a user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Knowledgebase 2387149

List of Patches

S.No Patch Description Severity
1Security Update for Windows Server 2003 (KB2387149)Moderate
2Security Update for Windows Vista (KB2387149)Moderate
3Security Update for Windows Vista (KB2387149)Moderate
4Security Update for Windows Server 2008 (KB2387149)Moderate
5Security Update for Windows Server 2008 (KB2387149)Moderate
6Security Update for Windows 7 (KB2387149)Moderate
7Security Update for Windows XP x64 Edition (KB2387149)Moderate
8Security Update for Windows Server 2003 x64 Edition (KB2387149)Moderate
9Security Update for Windows Vista for x64-based Systems (KB2387149)Moderate
10Security Update for Windows Server 2008 x64 Edition (KB2387149)Moderate
11Security Update for Windows Server 2008 x64 Edition (KB2387149)Moderate
12Security Update for Windows 7 for x64-based Systems (KB2387149)Moderate
13Security Update for Windows Server 2008 R2 x64 Edition (KB2387149)Moderate

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.