![]() This update is available via Windows Update only. Windows Server 2012 R2 (Server Core installation) (3078601) Windows Server 2012 (Server Core installation) (3078601) Windows Server 2008 R2 for 圆4-based Systems Service Pack 1 (Server Core installation) (3078601) Windows Server 2008 for 圆4-based Systems Service Pack 2 (Server Core installation) (3078601) Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (3078601) Windows Server 2012 and Windows Server 2012 R2 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (3078601) Windows Server 2008 R2 for 圆4-based Systems Service Pack 1 (3078601) Windows 7 for 圆4-based Systems Service Pack 1 (3078601) Windows 7 for 32-bit Systems Service Pack 1 (3078601) Windows Server 2008 for Itanium-based Systems Service Pack 2 (3078601) Windows Server 2008 for 圆4-based Systems Service Pack 2 (3078601) Windows Server 2008 for 32-bit Systems Service Pack 2 (3078601) Windows Vista 圆4 Edition Service Pack 2 (3078601) OpenType Font Parsing Vulnerability - CVE-2015-2462 ![]() OpenType Font Parsing Vulnerability - CVE-2015-2461 OpenType Font Parsing Vulnerability - CVE-2015-2460 OpenType Font Parsing Vulnerability - CVE-2015-2459 OpenType Font Parsing Vulnerability - CVE-2015-2458 OpenType Font Parsing Vulnerability - CVE-2015-2432 Microsoft Windows - Table 1 of 3 Operating System For information regarding the likelihood, within 30 days of this security bulletin’s release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the August bulletin summary. The severity ratings indicated for each affected software assume the potential maximum impact of the vulnerability. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle. ![]() Versions or editions that are not listed are either past their support life cycle or are not affected. The following software versions or editions are affected. Affected Software and Vulnerability Severity Ratings The Windows shell validates impersonation levelsįor more information about the vulnerabilities, see the Vulnerability Information section.įor more information about this update, see Microsoft Knowledge Base Article 3078662.User processes are terminated upon logoff.The Windows kernel handles memory addresses.The Windows DirectWrite library handles TrueType fonts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |