October 2012 Patch Tuesday Bulletins are now Supported by Desktop Central

Microsoft October 2012 Patch Tuesday bulletins are now supported by Desktop Central. The patch assessment team at Desktop Central has tested the patches and have updated their online patch database on October 09, 2012 at 19:30 EDT.

Update your vulnerability database to install the patches pertaining to the Security Bulletins:

MS12-064 – Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)

MS12-066 – Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)

MS12-068 – Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2724197)

MS12-069 – Vulnerability in Kerberos Could Allow Denial of Service (2743555)

MS12-050 – Vulnerabilities in SharePoint Could Allow Elevation of Privilege (2695502) (Only Infopath 2007 and InfoPath 2010 updates are supported)

Update your vulnerability database to install the patches pertaining to the Non Security Updates

Windows Malicious Software Removal Tool – October 2012 (KB890830)

Update for Windows XP (KB2661254)

Update for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP (KB2756822)

Update for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP (KB2749655)

Update for Windows 7 and Windows Server 2008 R2 (KB2739159)

Update for Windows 7 and Windows Server 2008 R2 (KB2731771)

Outlook Junk Email Filters for Office 2007 (KB2687407)

Outlook Junk Email Filters for Office 2010 (KB982726)

Deployment Priority (Courtesy: MSRC blog )

 

For any assistance on patching feel free to contact desktopcentral-support@manageengine.com

Happy Patching.

cheers!!

You Can Learn More About the ManageEngine Product Line By Going to manageengine.optrics.com

The original article/video can be found at October 2012 Patch Tuesday Bulletins are now Supported by Desktop Central

Leave a Reply

Your email address will not be published. Required fields are marked *