begood Posted December 17, 2012 Report Posted December 17, 2012 [h=4]Executive Summary[/h]This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that embeds TrueType or OpenType font files. An attacker would have to convince users to visit the website, typically by getting them to click a link in an email message that takes them to the attacker's website.This security update is rated Critical for all supported releases of Microsoft Windows (except Server Core installations, which are rated Important). For more information, see the subsection, Affected and Non-Affected Software, in this section.The security update addresses the vulnerabilities by correcting the way that the Windows kernel-mode drivers handle objects in memory. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.Recommendation.The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871. http://technet.microsoft.com/en-gb/security/bulletin/ms12-078wb rst. 1 Quote