
{"id":2277,"date":"2013-02-15T00:00:00","date_gmt":"2013-02-15T00:00:00","guid":{"rendered":"http:\/\/otava.test\/february-microsoft-security-updates\/"},"modified":"2013-02-15T00:00:00","modified_gmt":"2013-02-15T00:00:00","slug":"february-microsoft-security-updates","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/","title":{"rendered":"February Microsoft Security Updates"},"content":{"rendered":"<p>Internet Explorer takes the spotlight in this month\u2019s Microsoft Security Updates. There were 12 updates for February, 5 of which are considered critical. Here\u2019s the lowdown on the five critical vulnerabilities covered on Tuesday.<\/p>\n<p><strong>Cumulative Security Update for Internet Explorer and a Vulnerability in the Vector Markup Language<\/strong><br \/>\nBoth of these updates are relevant for IE 6-10, and both are to protect against vulnerabilities that could allow for remote code execution. If a user visits a specially crafted web page within Internet Explorer, an attacker could be given the same level of rights reserved for the user. All of these issues are related to the way IE handles objects in memory, and should be applied immediately.<\/p>\n<p><strong>Vulnerability in Media Decompression<\/strong><br \/>\nThis came from a publicly disclosed vulnerability in Microsoft Windows. This is a critical update for all editions of Windows XP, Windows Server 2003 and 2008, as well as Vista. Another remote code execution patch, this vulnerability could be exploited if a user opened a specially crafted media file, an Office document with embedded media files, or streaming content. This issues was corrected by focusing on the way DirectShow handles specially made media content. This may require a restart.<\/p>\n<p><strong>Vulnerabilities in Microsoft Exchange Server<\/strong><br \/>\nThis update affects supported editions of Microsoft Exchange Server 2007 and 2010, and is also considered critical. If a user previews a special file using Outlook Web App, it could allow a remote code execution attack. This patch may require a restart, and updates the affected Oracle Outside to a protected version.<\/p>\n<p><strong>Vulnerability In OLE Automation<\/strong><br \/>\nThe last critical vulnerability involves Windows Object Linking and Embedding Automation where a user opening a specially crafted file could be exploited, giving the attacker the same level of rights. This is relevant to Windows XP Service Pack 3, and will require a restart.<\/p>\n<p>With remote code execution exploits, one of the biggest and easiest ways to help lower the risk of unauthorized access is to make sure each user is set to have their permissions on a need-to-know basis. Regulating who gets administrative vs. restricted user access means even if there is a successful attack, there is a limited amount of data the attacker can access.<\/p>\n<p>The report, including a more detailed description of the updates, and the non-critical patches, can be found <a href=\"https:\/\/www.google.com\/url?q=http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fsecurity%2Fbulletin%2Fms13-feb&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGAyi4VbVZ8E6zJIES1Xtq7L43mvQ\">here<\/a>.<\/p>\n<p>Related Links:<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/january-microsoft-security-updates\/\">January Microsoft Security Updates<\/a><\/em><br \/>\nIn January\u2019s Microsoft security updates, there are two critical patches to speak of. The first is a vulnerability in Windows Print Spooler components, where a print server that receives a specially crafted print job could allow for remote code execution. \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/january-microsoft-security-updates\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/december-microsoft-security-update\/\">December Microsoft Security Update<\/a><\/em><br \/>\nDecember\u2019s Microsoft security updates were published Tuesday, the 11th. There were seven patches, predominantly regarding remote code execution in Office, Windows, and IE. In Internet Explorer there were critical vulnerabilities, the worst of which, caused by a user going to \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/december-microsoft-security-update\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/november-microsoft-security-update\/\">November Microsoft Security Update<\/a><\/em><br \/>\nThis Tuesday Microsoft released their November updates, with a few critical patches to take a look at. The biggest updates involved three vulnerabilities within Internet Explorer, as well as the first updates for all Windows releases, including Windows 8. The \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/november-microsoft-security-update\/\">Continue reading \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet Explorer takes the spotlight in this month\u2019s Microsoft Security Updates. There were 12 updates for February, 5 of which are considered critical. Here\u2019s the lowdown on the five critical vulnerabilities covered on Tuesday. Cumulative Security Update for Internet Explorer and a Vulnerability in the Vector Markup Language Both of these updates are relevant for IE 6-10, and both are to protect against vulnerabilities that could allow for remote code execution. If a user visits a specially crafted web page within Internet Explorer, an attacker could be given the same level of rights reserved for the user. All of these issues are related to the way IE handles objects in memory, and should be applied immediately. Vulnerability in Media Decompression This came from a publicly disclosed vulnerability in Microsoft Windows. This is a critical update for all editions of Windows XP, Windows Server 2003 and 2008, as well as Vista. Another remote code execution patch, this vulnerability could be exploited if a user opened a specially crafted media file, an Office document with embedded media files, or streaming content. This issues was corrected by focusing on the way DirectShow handles specially made media content. This may require a restart. Vulnerabilities&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2277","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>February Microsoft Security Updates | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"February Microsoft Security Updates\" \/>\n<meta property=\"og:description\" content=\"Internet Explorer takes the spotlight in this month\u2019s Microsoft Security Updates. There were 12 updates for February, 5 of which are considered critical. Here\u2019s the lowdown on the five critical vulnerabilities covered on Tuesday. Cumulative Security Update for Internet Explorer and a Vulnerability in the Vector Markup Language Both of these updates are relevant for IE 6-10, and both are to protect against vulnerabilities that could allow for remote code execution. If a user visits a specially crafted web page within Internet Explorer, an attacker could be given the same level of rights reserved for the user. All of these issues are related to the way IE handles objects in memory, and should be applied immediately. Vulnerability in Media Decompression This came from a publicly disclosed vulnerability in Microsoft Windows. This is a critical update for all editions of Windows XP, Windows Server 2003 and 2008, as well as Vista. Another remote code execution patch, this vulnerability could be exploited if a user opened a specially crafted media file, an Office document with embedded media files, or streaming content. This issues was corrected by focusing on the way DirectShow handles specially made media content. This may require a restart. Vulnerabilities...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-15T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"February Microsoft Security Updates\",\"datePublished\":\"2013-02-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\"},\"wordCount\":525,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\",\"url\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\",\"name\":\"February Microsoft Security Updates | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-02-15T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"February Microsoft Security Updates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"February Microsoft Security Updates | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/","og_locale":"en_US","og_type":"article","og_title":"February Microsoft Security Updates","og_description":"Internet Explorer takes the spotlight in this month\u2019s Microsoft Security Updates. There were 12 updates for February, 5 of which are considered critical. Here\u2019s the lowdown on the five critical vulnerabilities covered on Tuesday. Cumulative Security Update for Internet Explorer and a Vulnerability in the Vector Markup Language Both of these updates are relevant for IE 6-10, and both are to protect against vulnerabilities that could allow for remote code execution. If a user visits a specially crafted web page within Internet Explorer, an attacker could be given the same level of rights reserved for the user. All of these issues are related to the way IE handles objects in memory, and should be applied immediately. Vulnerability in Media Decompression This came from a publicly disclosed vulnerability in Microsoft Windows. This is a critical update for all editions of Windows XP, Windows Server 2003 and 2008, as well as Vista. Another remote code execution patch, this vulnerability could be exploited if a user opened a specially crafted media file, an Office document with embedded media files, or streaming content. This issues was corrected by focusing on the way DirectShow handles specially made media content. This may require a restart. Vulnerabilities...","og_url":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/","og_site_name":"OTAVA","article_published_time":"2013-02-15T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"February Microsoft Security Updates","datePublished":"2013-02-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/"},"wordCount":525,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/","url":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/","name":"February Microsoft Security Updates | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-02-15T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/february-microsoft-security-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"February Microsoft Security Updates"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2277"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2277\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2277"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}