Microsoft Windows Vulnerabilities could Allow an Attacker to Gain Control of your Computer

Vulnerabilities in Microsoft Windows, Internet Explorer, and Office could allow an attacker to gain control of your computer.

[eminimall]

Last revised: —
Source: US-CERT

Systems Affected

* Microsoft Windows
* Microsoft Office
* Microsoft Internet Explorer

Overview

Vulnerabilities in Microsoft Windows, Internet Explorer, and Office could allow an attacker to gain control of your computer.

Solution

Apply Update

Microsoft has provided updates to remedy these vulnerabilities. To obtain these updates, visit the Microsoft Update web site. US-CERT also recommends enabling Automatic Updates.

Microsoft Office 2000 users must visit the Microsoft Office Update web site to get the appropriate updates.

Apple Mac OS X users should obtain updates from the Mactopia web site.

Do not open untrusted documents

Do not open unfamiliar or unexpected Office documents, including those received as email attachments or hosted on a web site. For more information, please see Using Caution with Email Attachments.

Description

Vulnerabilities in Microsoft Windows, Internet Explorer, and Office may allow an attacker to access your computer, install and run malicious software on your computer, or cause it to crash. An attacker could exploit these vulnerabilities by using specially crafted network traffic, by convincing you to click on a specially crafted URL, or by convincing you to open a specially crafted Office document. An Office document could be attached to an email message, hosted on a web site, or included in another Office document.

For more technical information, see US-CERT Technical Alert TA06-283A.

[eminimall]

[tags]microsoft,vulnerability,microsoft office,security alert,attacker,computer hacker,malicious software[/tags]