msrclogo

Yesterday was the official Patch Tuesday for July 2011 and the details on four security bulletins were released by Microsoft.  Before we get into reading these make sure you visit Windows Update on your computer to get these updates downloaded and installed so your protected.

OK – now that you did that here are the summaries of the bulletins:

MS11-053

Vulnerability in Bluetooth Stack Could Allow Remote Code Execution (2566220)
This security update resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability could allow remote code execution if an attacker sent a series of specially crafted Bluetooth packets to an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability only affects systems with Bluetooth capability.

MS11-054

Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917)
This security update resolves 15 privately reported vulnerabilities in Microsoft Windows. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities.

MS11-056

Vulnerabilities in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2507938)
This security update resolves five privately reported vulnerabilities in the Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerabilities could allow elevation of privilege if an attacker logs on to a user’s system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerabilities.

MS11-055

Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2560847)
This security update resolves a publicly disclosed vulnerability in Microsoft Visio. The vulnerability could allow remote code execution if a user opens a legitimate Visio file that is located in the same network directory as a specially crafted library file. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Join the Forum discussion on this post