Patch Repository

Windows Vista Enterprise Edition Patch Details
Patch Name Windows6.0-WindowsMedia-KB2845142-x86-ENU.exe
Patch Description Security Update for Windows Vista and Windows Server 2008 (KB2845142)
Bulletin Id MS13-057
Bulletin Title Vulnerability in Windows Media Format Runtime Could Allow Remote Code Execution (2847883)
Severity Critical
Location Path Windows6.0-WindowsMedia-KB2845142-x86-ENU.exe
Bulletin Summary This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted media file. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Superceding Bulletin Id None
Patch Release Date Jul 9, 2013

Affected Product Information

Product Name Service Pack Name
Windows Vista Business EditionWindows Vista SP2
Windows Vista Ultimate EditionWindows Vista SP2
Windows Server 2008 Standard EditionWindows Server 2008 SP2
Windows Server 2008 Enterprise EditionWindows Server 2008 SP2
Windows Server 2008 Datacenter EditionWindows Server 2008 SP2
Windows Vista Enterprise EditionWindows Vista SP2
Windows Server 2008 Foundation EditionWindows Server 2008 SP2
Windows Server 2008 Web Server EditionWindows Server 2008 SP2
Windows Server 2008 HPC EditionWindows Server 2008 SP2
Windows Server 2008 Datacenter Edition without Hyper-VWindows Server 2008 SP2
Windows Server 2008 Enterprise Edition without Hyper-VWindows Server 2008 SP2
Windows Server 2008 Standard Edition without Hyper-VWindows Server 2008 SP2

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.