<<  MS12-030: Vulnerabilities In Microsoft Office Could Allow Remote Code MS12-032: Vulnerability In TCP/IP Could Allow Elevation of Privilege  >>
MS12-031: Vulnerability In Microsoft Visio Viewer Could Allow Remote

MS12-031: Vulnerability In Microsoft Visio Viewer Could Allow Remote Code Execution (2597981). Web-Browsing Scenario: An attacker could host a website that contains a Visio file that is used to exploit this vulnerability. Compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could be used to exploit this vulnerability. Email Attack Scenario: An attacker could exploit this vulnerability by sending the user the malicious file as an email attachment, and convince the user to open the attachment. Web-Browsing Scenario: An attacker could host a website that contains a Visio file that is used to exploit this vulnerability. Compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could be used to exploit this vulnerability. Email Attack Scenario: An attacker could exploit this vulnerability by sending the user the malicious file as an email attachment, and convince the user to open the attachment. Web-Browsing Scenario: An attacker could host a website that contains a Visio file that is used to exploit this vulnerability. Compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could be used to exploit this vulnerability. Email Attack Scenario: An attacker could exploit this vulnerability by sending the user the malicious file as an email attachment, and convince the user to open the attachment. Web-Browsing Scenario: An attacker could host a website that contains a Visio file that is used to exploit this vulnerability. Compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could be used to exploit this vulnerability. Email Attack Scenario: An attacker could exploit this vulnerability by sending the user the malicious file as an email attachment, and convince the user to open the attachment. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. An attacker would have no way to force users to visit a website or open an email attachment. By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites Zone. An attacker would have no way to force users to visit a website or open an email attachment. By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites Zone. An attacker would have no way to force users to visit a website or open an email attachment. By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites Zone. An attacker would have no way to force users to visit a website or open an email attachment. By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted Sites Zone. CVE. CVE. Severity. Severity. Exploitability. Exploitability. Comment. Comment. Note. Note. CVE-2012-0018. Important. 1. N/A. Remote Code Execution. Cooperatively Disclosed. Affected Products. Affected Products. All supported versions of Microsoft Visio Viewer 2010. All supported versions of Microsoft Visio Viewer 2010. All supported versions of Microsoft Visio Viewer 2010. All supported versions of Microsoft Visio Viewer 2010. Affected Components. Affected Components. Visio Viewer. Visio Viewer. Visio Viewer. Visio Viewer. Deployment Priority. Deployment Priority. 2. 2. 2. 2. Main Target. Main Target. Workstations. Workstations. Workstations. Workstations. Possible Attack Vectors. Possible Attack Vectors. Impact of Attack. Impact of Attack. Mitigating Factors. Mitigating Factors. Latest Software. Older Versions.

Слайд 8 из презентации «Information About Microsoft May 2012 Security Bulletins»

Размеры: 720 х 540 пикселей, формат: .jpg. Чтобы бесплатно скачать слайд для использования на уроке, щёлкните на изображении правой кнопкой мышки и нажмите «Сохранить изображение как...». Скачать всю презентацию «Information About Microsoft May 2012 Security Bulletins.pptx» можно в zip-архиве размером 473 КБ.

Похожие презентации

краткое содержание других презентаций на тему слайда

«Формулы в Microsoft Word» - Запуск редактора формул (Microsoft Equation). Редактор формул в Microsoft Word. Каково назначение редактора формул? Панель инструментов "Формула". Что такое формула? Задание. Что называется текстовым редактором? Плавающее меню редактора математических формул. Раздаточный материал. Вопросы.

«Презентация Microsoft Powerpoint» - Перейдите из области структуры во вкладку Слайды и продолжайте работу. Вырезанный файл появится в указанном месте. Создание нового слайда. На вкладке Слайды выделите нужный слайд, нажмите на клавиатуре кнопку Delete. Нажмите команду Создать слайд на панели инструментов Форматирование. Гиперссылки. Сопровождение курса лекций средствами Microsoft PowerPoint.

«Портал Microsoft» - Интуитивно понятный и настраиваемый интерфейс. Приложение. Анализирует продажи. Порталы Microsoft SharePoint. Итоги I этапа. Василий Ямалетдинов ЦМД-софт. Этап I: Обработка запроса. Этап III: Анализ продаж. Mapping. Navision + MS CRM + SharePoint. Sales Line. Формирует заказ. Формирует предложение. Запрос на предложение.

«Microsoft программы» - Microsoft word 2007 (окно программы). Microsoft power point 2003 (окно программы). Microsoft excel 2003 (окно программы). Microsoft internet explorer (программа-обозреватель web-страниц). Основное назначение табличного процессора – автоматизация расчетов. У программы-браузера одна основная функция – обеспечить отображение Web-страниц.

«Программа Microsoft Office 2007» - Структура офисного приложения. Microsoft Word. Microsoft Excel. Microsoft Access. Microsoft PowerPoint. Microsoft Word Microsoft Excel Microsoft PowerPoint Microsoft Access. Microsoft Office 2007. Microsoft Access —приложение для управления базами данных.

«Microsoft Office 2010» - Предложение действует до 31 октября 2011 года. Состав "Microsoft Office 2010 для малого бизнеса". Предложение действует до до 31 октября 2011 г. Подробности – в информационном письме №13322 от 25 марта 2011 г. Расширение для Microsoft Excel® 2010 позволяет: выгружать в таблицу данные из справочников 1С:Предприятие.

Microsoft

6 презентаций о Microsoft
Урок

Информатика

130 тем