Patch Repository

MS12-082 Bulletin Details
Bulletin ID MS12-082
Title Vulnerability in DirectPlay Could Allow Remote Code Execution (2770660)
Summary This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker convinces a user to view a specially crafted Office document with embedded content. An attacker who successfully exploits this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Knowledgebase 2770660

List of Patches

S.No Patch Description Severity
1Security Update for Windows Server 2003 (KB2770660)Important
2Security Update for Windows Vista (KB2770660)Important
3Security Update for Windows Server 2008 (KB2770660)Important
4Security Update for Windows 7 (KB2770660)Important
5Security Update for Windows 7 (KB2770660)Important
6Security Update for Windows XP x64 Edition (KB2770660)Important
7Security Update for Windows Server 2003 x64 Edition (KB2770660)Important
8Security Update for Windows Vista for x64-based Systems (KB2770660)Important
9Security Update for Windows Server 2008 x64 Edition (KB2770660)Important
10Security Update for Windows 7 for x64-based Systems (KB2770660)Important
11Security Update for Windows 7 for x64-based Systems (KB2770660)Important
12Security Update for Windows Server 2008 R2 x64 Edition (KB2770660)Important
13Security Update for Windows Server 2008 R2 x64 Edition (KB2770660)Important
14Security Update for Windows 8 (KB2770660)Important
15Security Update for Windows 8 for x64-based Systems (KB2770660)Important
16Security Update for Windows Server 2012 (KB2770660)Important

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.