Schweregrad: : Crítico
  Identificador(es) CVE: : CVE-2015-0081,CVE-2015-0096
  Data do informe: 02 abril 2015

  Descrição

This update resolves two vulnerabilities that are found in several versions of Windows operating systems. The vulnerabilities, when exploited, may result to remote code execution. The Windows Text Services vulnerability exists in because of its improper way of handling objects in memory. The DLL Planting vulnerability, on the other hand, exists in the way Windows loads DLL files.

  Solução

  Software infectado e versão:

  • Windows Server 2008 for Itanium-based Systems Service Pack 2
  • Windows RT 8.1
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows Server 2003 Service Pack 2
  • Windows Server 2003 x64 Edition Service Pack 2
  • Windows Server 2003 with SP2 for Itanium-based Systems
  • Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
  • Windows 8 for 32-bit Systems
  • Windows 8 for x64-based Systems
  • Windows 8.1 for 32-bit Systems
  • Windows 8.1 for x64-based Systems
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows RT
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2 (Server Core installation)