![]() ![]() For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. The update addresses the vulnerabilities by modifying the way that PowerPoint validates records when opening PowerPoint files. For more information, see the subsection, Affected and Non-Affected Software, in this section. ![]() This security update is rated Important for all supported releases of Microsoft PowerPoint Microsoft Office for Mac Open XML File Format Converter for Mac Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Microsoft PowerPoint Viewer, and Microsoft PowerPoint Web App. The automated Microsoft Fix it solution for PowerPoint 2010, "Disable Edit in Protected View for PowerPoint 2010," available in Microsoft Knowledge Base Article 2501584, blocks the attack vectors for exploiting the vulnerabilities described in CVE-2011-0655 and CVE-2011-0656. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. The vulnerabilities could allow remote code execution if a user opens a specially crafted PowerPoint file. This security update resolves three privately reported vulnerabilities in Microsoft PowerPoint. Version: 1.1 General Information Executive Summary Security Bulletin Microsoft Security Bulletin MS11-022 - Important Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2489283) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |