![]() ![]() ![]() Customers can configure automatic updating to check online for updates from Microsoft Update by using the Microsoft Update service. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. The security update addresses the vulnerabilities by correcting how Microsoft Access parses and validates data when opening specially crafted Access files. For more information, see the subsection, Affected and Non-Affected Software, in this section. This security update is rated Important for supported editions of Microsoft Access 2007, Microsoft Access 2010, and Microsoft Access 2013. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. The vulnerabilities could allow remote code execution if a user opens a specially crafted Access file with an affected version of Microsoft Access. This security update resolves three privately reported vulnerabilities in Microsoft Office. Version: 1.1 General Information Executive Summary Published: Septem| Updated: September 13, 2013 Security Bulletin Microsoft Security Bulletin MS13-074 - Important Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |