Patch Repository

MS12-054 Bulletin Details
Bulletin ID MS12-054
Title Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
Summary This security update resolves four privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow remote code execution if an attacker sends a specially crafted response to a Windows print spooler request. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems connected directly to the Internet have a minimal number of ports exposed.
Knowledgebase 2733594

List of Patches

S.No Patch Description Severity
1Security Update for Windows Server 2003 (KB2705219)Important
2Security Update for Windows Vista (KB2705219)Moderate
3Security Update for Windows 7 (KB2705219)Moderate
4Security Update for Windows 7 (KB2705219)Moderate
5Security Update for Windows XP x64 Edition (KB2705219)Critical
6Security Update for Windows Server 2003 x64 Edition (KB2705219)Important
7Security Update for Windows Vista for x64-based Systems (KB2705219)Moderate
8Security Update for Windows Server 2008 x64 Edition (KB2705219)Moderate
9Security Update for Windows 7 for x64-based Systems (KB2705219)Moderate
10Security Update for Windows 7 for x64-based Systems (KB2705219)Moderate
11Security Update for Windows Server 2008 R2 x64 Edition (KB2705219)Moderate
12Security Update for Windows Server 2008 R2 x64 Edition (KB2705219)Moderate
13Security Update for Windows Server 2003 (KB2712808)Critical
14Security Update for Windows 7 (KB2712808)Moderate
15Security Update for Windows XP x64 Edition (KB2712808)Critical
16Security Update for Windows Server 2003 x64 Edition (KB2712808)Critical
17Security Update for Windows 7 for x64-based Systems (KB2712808)Moderate
18Security Update for Windows Server 2008 R2 x64 Edition (KB2712808)Moderate

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.