Patch Repository

MS12-072 Bulletin Details
Bulletin ID MS12-072
Title Vulnerabilities in Windows Shell Could Allow Remote Code Execution (2727528)
Summary This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially crafted briefcase in Windows Explorer. An attacker who successfully exploited the vulnerabilities could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Knowledgebase 2727528

List of Patches

S.No Patch Description Severity
.Security Update for Windows Server 2003 (KB2727528)Critical
.Security Update for Windows Vista (KB2727528)Critical
.Security Update for Windows Server 2008 (KB2727528)Critical
.Security Update for Windows 7 (KB2727528)Critical
.Security Update for Windows 7 (KB2727528)Critical
.Security Update for Windows XP x64 Edition (KB2727528)Critical
.Security Update for Windows Server 2003 x64 Edition (KB2727528)Critical
.Security Update for Windows Vista for x64-based Systems (KB2727528)Critical
.Security Update for Windows Server 2008 x64 Edition (KB2727528)Critical
.Security Update for Windows 7 for x64-based Systems (KB2727528)Critical
.Security Update for Windows 7 for x64-based Systems (KB2727528)Critical
.Security Update for Windows Server 2008 R2 x64 Edition (KB2727528)Critical
.Security Update for Windows Server 2008 R2 x64 Edition (KB2727528)Critical
.Security Update for Windows 8 (KB2727528)Critical
.Security Update for Windows 8 for x64-based Systems (KB2727528)Critical
.Security Update for Windows Server 2012 (KB2727528)Critical

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.