Patch Repository

MS10-083 Bulletin Details
Bulletin ID MS10-083
Title Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution (2405882)
Summary This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted file using WordPad or selects or opens a shortcut file that is on a network or WebDAV share. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Knowledgebase 2405882

List of Patches

S.No Patch Description Severity
.Security Update for Windows Vista (KB979687)Important
.Security Update for Windows Server 2008 (KB979687)Important
.Security Update for Windows Server 2008 (KB979687)Important
.Security Update for Windows 7 (KB979687)Important
.Security Update for Windows Vista for x64-based Systems (KB979687)Important
.Security Update for Windows Server 2008 x64 Edition (KB979687)Important
.Security Update for Windows Server 2008 x64 Edition (KB979687)Important
.Security Update for Windows 7 for x64-based Systems (KB979687)Important
.Security Update for Windows Server 2008 R2 x64 Edition (KB979687)Important
.Security Update for Windows Server 2008 (KB979688)Important
.Security Update for Windows Server 2008 (KB979688)Important
.Security Update for Windows 7 (KB979688)Important
.Security Update for Windows Server 2008 x64 Edition (KB979688)Important
.Security Update for Windows Server 2008 x64 Edition (KB979688)Important
.Security Update for Windows 7 for x64-based Systems (KB979688)Important
.Security Update for Windows Server 2008 R2 x64 Edition (KB979688)Important

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.