Patch Tuesday is here again. We’ve got a big one this month. The following updates will be available from Microsoft Update in the following few hours:
Critical
- MS07-008: This update resolves a vulnerability in HTML Help that could allow remote code execution – Windows.
- MS07-009: This update resolves a vulnerability in Microsoft Data Access Components that could allow remote code execution – Windows.
- MS07-010: This update resolves a vulnerability in the Microsoft Malware Protection Engine that could allow remote code execution – Microsoft Antivirus.
- MS07-014: This update resolves vulnerabilities in Microsoft Word that could allow remote code execution – Office
- MS07-015: This update resolves vulnerabilities in Microsoft Office that could allow remote code execution – Office.
- MS07-016: This update resolves vulnerabilities in Internet Explorer that could allow remote code execution – Windows, Internet Explorer.
Important
- MS07-005: This update resolves a vulnerability in Step-by-Step Interactive Training that could allow remote code execution. User interaction is required to exploit this vulnerability – Windows, Interactive Training.
- MS07-006: This update resolves a vulnerability in Windows Shell that could allow elevation of privilege – Windows.
- MS07-007: This update resolves a vulnerability in the Windows Image Acquisition Service that could allow elevation of privilege – Windows.
- MS07-011: This update resolves a vulnerability in Microsoft OLE Dialog that could allow remote code execution. User interaction is required to exploit this vulnerability – Windows.
- MS07-012: This update resolves a vulnerability in Microsoft MFC that could allow remote code execution. User interaction is required to exploit this vulnerability – Windows, Visual Studio.
- MS07-013: This update resolves a vulnerability in Microsoft RichEdit that could allow remote code execution. User interaction is required to exploit this vulnerability – Windows, Office.
Again, no Vista or Office 2007 in the affected software list.
Please be sure to test, test, test before you deploy these updates.