Microsoft fixed three vulnerabilities in Windows system

  


According to foreign media reports, on Tuesday, Microsoft released two security patches to fix three vulnerabilities in the Windows operating system, including the impact of Windows XP, Vista "critical" level patches and affect Windows 7 "Important" level patch.
Microsoft pointed out in its Security Response Center blog that at present, we have not been informed that the outside world exploits these vulnerabilities to launch effective attacks.
In the security patch released this time, Microsoft did not fix the IE browser 0day vulnerability and the vulnerability in the Windows graphics rendering engine that were exposed recently.
It is understood that Microsoft's release of the "critical" level patch number is MS11-002, used to fix a "critical" vulnerability and an "important" vulnerability, both of which exist in Microsoft data. In the access component, these two vulnerabilities could allow an attacker to take complete control of a computer while the user is browsing a malicious web page. Operating systems affected by MS11-002 include Windows XP, Windows Server 2003, Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Microsoft's second announcement, numbered MS11-001, fixes a "important" vulnerability that could lead to remote code execution. This vulnerability could lead to remote code execution when a user opens a legitimate Windows Backup Manager file in the same network directory as the fake library file. In order to be free from attacks, users have to access an untrusted remote file system or WebDAV (Web-based distributed authoring and versioning) sharing. Operating systems affected by MS11-002 include 32-bit and 64-bit Vista SP1/SP2.
At the same time, Microsoft also revised the security bulletin 2488013 related to Cascading Style Sheets (CSS), adding an additional solution.

Copyright © Windows knowledge All Rights Reserved