Launch Printer Friendly Page Security TechCenter > > Microsoft Security Bulletin MS12-034

Microsoft Security Bulletin MS12-034 - Critical

Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578)

Published: | Updated:

Version: 1.6

General Information

Executive Summary

This security update resolves three publicly disclosed vulnerabilities and seven privately reported vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType font files. An attacker would have no way to force users to visit a malicious website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website.

This security update is rated Critical for all supported releases of Microsoft Windows; for Microsoft .NET Framework 4, except when installed on Itanium-based editions of Microsoft Windows; and for Microsoft Silverlight 4 and Microsoft Silverlight 5. This security update is rated Important for Microsoft Office 2003, Microsoft Office 2007, and Microsoft Office 2010. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses the most severe of these vulnerabilities by correcting the manner in which affected components handle specially crafted TrueType font files and by correcting the manner in which GDI+ validates specially crafted EMF record types and specially crafted EMF images embedded within Microsoft Office files. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.

For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.

See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.

Known Issues. Microsoft Knowledge Base Article 2681578 documents the currently known issues that customers may experience when installing this security update. The article also documents recommended solutions for these issues.

Affected and Non-Affected Software

The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.

Microsoft Windows and Components

Operating SystemComponentMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Microsoft Windows
Windows XP Service Pack 3
(KB2660649)
(Tablet PC Edition 2005 Service Pack 3 only)
Not applicableRemote Code ExecutionImportantNone
Windows XP Service Pack 3
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows XP Service Pack 3
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows XP Service Pack 3
(KB2686509)
Not applicableElevation of PrivilegeImportantNone
Windows XP Professional x64 Edition Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows XP Professional x64 Edition Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB979683 in MS10-021 replaced by KB2676562
Windows XP Professional x64 Edition Service Pack 2
(KB2686509)
Not applicableElevation of PrivilegeImportantNone
Windows Server 2003 Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2003 Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows Server 2003 Service Pack 2
(KB2686509)
Not applicableElevation of PrivilegeImportantNone
Windows Server 2003 x64 Edition Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2003 x64 Edition Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB979683 in MS10-021 replaced by KB2676562
Windows Server 2003 x64 Edition Service Pack 2
(KB2686509)
Not applicableElevation of PrivilegeImportantNone
Windows Server 2003 with SP2 for Itanium-based Systems
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2003 with SP2 for Itanium-based Systems
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB979683 in MS10-021 replaced by KB2676562
Windows Server 2003 with SP2 for Itanium-based Systems
(KB2686509)
Not applicableElevation of PrivilegeImportantNone
Windows Vista Service Pack 2
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Vista Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Vista Service Pack 2
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows Vista Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows Vista x64 Edition Service Pack 2
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Vista x64 Edition Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Vista x64 Edition Service Pack 2
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows Vista x64 Edition Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for 32-bit Systems Service Pack 2[3]
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for x64-based Systems Service Pack 2[3]
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 for Itanium-based Systems Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for Itanium-based Systems Service Pack 2
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows 7 for 32-bit Systems
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows 7 for 32-bit Systems
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for 32-bit Systems
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for 32-bit Systems
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows 7 for 32-bit Systems Service Pack 1
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows 7 for 32-bit Systems Service Pack 1
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for 32-bit Systems Service Pack 1
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for 32-bit Systems Service Pack 1
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows 7 for x64-based Systems
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows 7 for x64-based Systems
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for x64-based Systems
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for x64-based Systems
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows 7 for x64-based Systems Service Pack 1
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows 7 for x64-based Systems Service Pack 1
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for x64-based Systems Service Pack 1
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows 7 for x64-based Systems Service Pack 1
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for x64-based Systems
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for x64-based Systems[4]
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for x64-based Systems
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for x64-based Systems Service Pack 1[4]
(KB2660649)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for Itanium-based Systems
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for Itanium-based Systems
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for Itanium-based Systems
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
(KB2658846)
Not applicableRemote Code ExecutionImportantKB2665364 in MS12-019 replaced by KB2658846
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
(KB2676562)
Not applicableRemote Code ExecutionCriticalKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Microsoft .NET Framework 3.0 Service Pack 2
Windows XP Service Pack 3Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407)
NoneNo severity rating[2]None
Windows XP Professional x64 Edition Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407)
NoneNo severity rating[2]None
Windows Server 2003 Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407)
NoneNo severity rating[2]None
Windows Server 2003 x64 Edition Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656407)
NoneNo severity rating[2]None
Windows Vista Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409)
NoneNo severity rating[2]None
Windows Vista x64 Edition Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409)
NoneNo severity rating[2]None
Windows Server 2008 for 32-bit Systems Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409)
NoneNo severity rating[2]None
Windows Server 2008 for x64-based Systems Service Pack 2Microsoft .NET Framework 3.0 Service Pack 2
(KB2656409)
NoneNo severity rating[2]None
Microsoft .NET Framework 3.5.1
Windows 7 for 32-bit SystemsMicrosoft .NET Framework 3.5.1
(KB2656410)
NoneNo severity rating[2]None
Windows 7 for 32-bit Systems Service Pack 1Microsoft .NET Framework 3.5.1
(KB2656411)
NoneNo severity rating[2]None
Windows 7 for x64-based SystemsMicrosoft .NET Framework 3.5.1
(KB2656410)
NoneNo severity rating[2]None
Windows 7 for x64-based Systems Service Pack 1Microsoft .NET Framework 3.5.1
(KB2656411)
NoneNo severity rating[2]None
Windows Server 2008 R2 for x64-based SystemsMicrosoft .NET Framework 3.5.1
(KB2656410)
NoneNo severity rating[2]None
Windows Server 2008 R2 for x64-based Systems Service Pack 1Microsoft .NET Framework 3.5.1
(KB2656411)
NoneNo severity rating[2]None
Microsoft .NET Framework 4
Windows XP Service Pack 3Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows XP Professional x64 Edition Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Server 2003 Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Server 2003 x64 Edition Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Vista Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Vista x64 Edition Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Server 2008 for 32-bit Systems Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Server 2008 for x64-based Systems Service Pack 2Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows 7 for 32-bit SystemsMicrosoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows 7 for 32-bit Systems Service Pack 1Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows 7 for x64-based SystemsMicrosoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows 7 for x64-based Systems Service Pack 1Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Server 2008 R2 for x64-based SystemsMicrosoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Windows Server 2008 R2 for x64-based Systems Service Pack 1Microsoft .NET Framework 4[1]
(KB2656405)
Remote Code ExecutionCriticalNone
Server Core installation option
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for 32-bit Systems Service Pack 2
(KB2676562)
Not applicableElevation of PrivilegeImportantKB2641653 in MS12-018 replaced by KB2676562

KB2633171 in MS11-098 replaced by KB2676562
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2659262)
Not applicableRemote Code ExecutionImportantKB2412687 in MS11-029 replaced by KB2659262
Windows Server 2008 for x64-based Systems Service Pack 2
(KB2676562)
Not applicableElevation of PrivilegeImportantKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for x64-based Systems
(KB2676562)
Not applicableElevation of PrivilegeImportantKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2659262)
Not applicableRemote Code ExecutionImportantNone
Windows Server 2008 R2 for x64-based Systems Service Pack 1
(KB2676562)
Not applicableElevation of PrivilegeImportantKB2641653 in MS12-018 replaced by KB2676562

KB2556532 in MS11-068 replaced by KB2676562
Windows Server 2008 R2 for x64-based SystemsMicrosoft .NET Framework 3.5.1
(KB2656410)
NoneNo severity rating[2]None
Windows Server 2008 R2 for x64-based Systems Service Pack 1Microsoft .NET Framework 3.5.1
(KB2656411)
NoneNo severity rating[2]None
Windows Server 2008 R2 for x64-based Systems Service Pack 1Microsoft .NET Framework 4
(KB2656405)
Remote Code ExecutionCriticalNone

[1].NET Framework 4 and .NET Framework 4 Client Profile affected. The .NET Framework version 4 redistributable packages are available in two profiles: .NET Framework 4 and .NET Framework 4 Client Profile. .NET Framework 4 Client Profile is a subset of .NET Framework 4. The vulnerability addressed in this update affects both .NET Framework 4 and .NET Framework 4 Client Profile. For more information, see the MSDN article, Installing the .NET Framework.

[2]Severity ratings do not apply to this update for the specified software because there are no known attack vectors for the vulnerability discussed in this bulletin. However, as a defense-in-depth measure, Microsoft recommends that customers of this software apply this security update.

[3]This update is only applicable for Windows Server 2008 systems when the optional Desktop Experience feature has been installed and enabled. See the update FAQ for details.

[4]This update is only applicable for Windows Server 2008 R2 systems when the Ink Support component of the optional Ink and Handwriting Services feature has been installed and enabled. See the update FAQ for details.

Microsoft Office

Office SoftwareMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Microsoft Office 2003 Service Pack 3
(KB2598253)
Remote Code ExecutionImportantKB972580 in MS09-062 replaced by KB2598253
Microsoft Office 2007 Service Pack 2
(KB2596672)
Remote Code ExecutionImportantKB972581 in MS09-062 replaced by KB2596672
Microsoft Office 2007 Service Pack 2
(KB2596792)
Remote Code ExecutionImportantNone
Microsoft Office 2007 Service Pack 3
(KB2596672)
Remote Code ExecutionImportantNone
Microsoft Office 2007 Service Pack 3
(KB2596792)
Remote Code ExecutionImportantNone
Microsoft Office 2010 (32-bit editions)
(KB2589337)
Remote Code ExecutionImportantNone
Microsoft Office 2010 Service Pack 1 (32-bit editions)
(KB2589337)
Remote Code ExecutionImportantNone
Microsoft Office 2010 (64-bit editions)
(KB2589337)
Remote Code ExecutionImportantNone
Microsoft Office 2010 Service Pack 1 (64-bit editions)
(KB2589337)
Remote Code ExecutionImportantNone

Microsoft Developer Tools and Software

Operating SystemMaximum Security ImpactAggregate Severity RatingUpdates Replaced
Microsoft Silverlight 4
Microsoft Silverlight 4 when installed on Mac
(KB2690729)
Remote Code ExecutionCriticalKB2668562 in MS12-016 replaced by KB2690729
Microsoft Silverlight 4 when installed on all supported releases of Microsoft Windows clients
(KB2690729)
Remote Code ExecutionCriticalKB2668562 in MS12-016 replaced by KB2690729
Microsoft Silverlight 4 when installed on all supported releases of Microsoft Windows servers
(KB2690729)
Remote Code ExecutionCriticalKB2668562 in MS12-016 replaced by KB2690729
Microsoft Silverlight 5
Microsoft Silverlight 5 when installed on Mac
(KB2636927)
Remote Code ExecutionCriticalNone
Microsoft Silverlight 5 when installed on all supported releases of Microsoft Windows clients
(KB2636927)
Remote Code ExecutionCriticalNone
Microsoft Silverlight 5 when installed on all supported releases of Microsoft Windows servers
(KB2636927)
Remote Code ExecutionCriticalNone

Non-Affected Software

Software
Microsoft .NET Framework 1.1 Service Pack 1
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.5 Service Pack 1
Microsoft Office 2008 for Mac
Microsoft Office for Mac 2011
Microsoft Office Compatibility Pack Service Pack 2
Microsoft Office Compatibility Pack Service Pack 3
Microsoft Works 9

Frequently Asked Questions (FAQ) Related to This Security Update

Vulnerability Information

Severity Ratings and Vulnerability Identifiers

TrueType Font Parsing Vulnerability - CVE-2011-3402

TrueType Font Parsing Vulnerability - CVE-2012-0159

.NET Framework Buffer Allocation Vulnerability - CVE-2012-0162

.NET Framework Index Comparison Vulnerability - CVE-2012-0164

GDI+ Record Type Vulnerability - CVE-2012-0165

GDI+ Heap Overflow Vulnerability - CVE-2012-0167

Silverlight Double-Free Vulnerability - CVE-2012-0176

Windows and Messages Vulnerability - CVE-2012-0180

Keyboard Layout File Vulnerability - CVE-2012-0181

Scrollbar Calculation Vulnerability - CVE-2012-1848

Update Information

Detection and Deployment Tools and Guidance

Security Update Deployment

Other Information

Acknowledgments

Microsoft thanks the following for working with us to help protect customers:

  • Alin Rad Pop, working with Tipping Point's Zero Day Initiative, for reporting the TrueType Font Parsing Vulnerability (CVE-2012-0159)
  • Vitaliy Toropov, working with Tipping Point's Zero Day Initiative, for reporting the .NET Framework Buffer Allocation Vulnerability (CVE-2012-0162)
  • Omair for reporting the GDI+ Record Type Vulnerability (CVE-2012-0165)
  • An anonymous researcher, working with Verisign iDefense Labs, for reporting the GDI+ Record Type Vulnerability (CVE-2012-0165)
  • An anonymous researcher, working with Verisign iDefense Labs, for reporting the GDI+ Heap Overflow Vulnerability (CVE-2012-0167)
  • Alex Plaskett of MWR InfoSecurity for reporting the Silverlight Double-Free Vulnerability (CVE-2012-0176)
  • Tarjei Mandt of Azimuth Security for reporting the Keyboard Layout File Vulnerability (CVE-2012-0181)
  • Nicolas Economou of Core Security Technologies for reporting the Keyboard Layout File Vulnerability (CVE-2012-0181)
  • Geoff McDonald of Symantec for reporting the Keyboard Layout File Vulnerability (CVE-2012-0181)
  • h4ckmp for reporting the Scrollbar Calculation Vulnerability (CVE-2012-1848)

Microsoft Active Protections Program (MAPP)

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.

Support

How to obtain help and support for this security update

Disclaimer

The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

  • V1.0 (May 8, 2012): Bulletin published.
  • V1.1 (May 16, 2012): Added a link to Microsoft Knowledge Base Article 2681578 under Known Issues in the Executive Summary. Also added Microsoft .NET Framework 1.1 Service Pack 1 to the Non-Affected Software table and corrected the update replacement information for Microsoft Office. These were informational changes only. There were no changes to the security update files or detection logic.
  • V1.2 (May 22, 2012): Added an entry to the Frequently Asked Questions (FAQ) Related to This Security Update section to explain this revision.
  • V1.3 (June 6, 2012): Added an entry to the update FAQ to explain why systems with non-affected versions of Microsoft Visio Viewer 2010 will be offered security update KB2589337.
  • V1.4 (July 31, 2012): Bulletin revised to announce a detection change in the Windows Vista packages for KB2676562 to correct a Windows Update reoffering issue. This is a detection change only. Customers who have already successfully updated their systems do not need to take any action.
  • V1.5 (October 31, 2012): Corrected update replacement information for the KB2676562 update.
  • V1.6 (March 6, 2013): Corrected update replacement information for the KB2676562 update.