LANDesk Patch News Bulletin: Microsoft has Released its Patch Tuesday Bulletins for December 2011

Version 2

    LANDesk Security and Patch News



    • (December 13, 2011) As part of its Patch Tuesday, Microsoft released thirteen security updates to address vulnerabilities in Microsoft Windows OS, Microsoft Office Suites, Microsoft PowerPoint Viewer 2007 Service Pack 2, Microsoft Office Compatibility Pack for Word, Excel, PowerPoint 2007 File Formats Service Pack 2, Microsoft Office Pinyin SimpleFast Style 2010 and Microsoft Office Pinyin New Experience Style 2010. The vulnerability definitions can be downloaded from the LANDesk global host servers. These are recommended updates that customers should apply to affected machines. Please visit the following page for more details:



    New Vulnerabilities

              ·      Vulnerability ID – MS11-087

    –       Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417)

              ·      Vulnerability ID – MS11-088

    –       Vulnerability in Microsoft Office IME (Chinese) Could Allow Elevation of Privilege (2652016)

              ·      Vulnerability ID – MS11-089

    –      Vulnerability in Microsoft Office Could Allow Remote Code Execution (2590602)

              ·      Vulnerability ID – MS11-090

    –       Cumulative Security Update of ActiveX Kill Bits (2618451)

              ·      Vulnerability ID – MS11-091

    –       Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution (2607702)

              ·      Vulnerability ID – MS11-092

    –       Vulnerability in Windows Media Could Allow Remote Code Execution (2648048)

              ·      Vulnerability ID – MS11-093

    –      Vulnerability in OLE Could Allow Remote Code Execution (2624667)

              ·      Vulnerability ID – MS11-094

    –       Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2639142)

              ·      Vulnerability ID – MS11-095

    –       Vulnerability in Active Directory Could Allow Remote Code Execution (2640045)

              ·      Vulnerability ID – MS11-096

    –       Vulnerability in Microsoft Excel Could Allow Remote Code Execution (2640241)

              ·      Vulnerability ID – MS11-097

    –      Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2620712)

              ·      Vulnerability ID – MS11-098

    –       Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2633171)

              ·      Vulnerability ID – MS11-099

    –       Cumulative Security Update for Internet Explorer (2618444)


    Changed Vulnerabilities

    • Malicious Software Removal Tool (Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents. You can run the tool from this Web page anytime or download it to your computer).

    - Reason:  Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents.

    • Vulnerability ID: MS10-021,MS10-047,MS11-010,MS11-027,MS11-077,MS11-081,MS11-086,MS10-103_INTL,MS11-022_INTL,MS11-027_VISTA_WIN2008_WIN7,MS11-036_INTL,MS11-068_VISTA_WIN2008_WIN7,MS11-072_INTL,MS11-077_VISTA_WIN2008_WIN7,MS11-081_VISTA_WIN2008_WIN7,MS11-084_WIN2008_WIN7,MS11-086_VISTA_WIN2008_WIN7

           - Reason:  Adding the supercedence information.


    New Patch Downloads

    •           ie7-windowsserver2003-kb2618444-x86-enu.exe
    •           ie7-windowsserver2003.windowsxp-kb2618444-x64-enu.exe
    •           ie7-windowsxp-kb2618444-x86-enu.exe
    •           ie8-windows6.0-kb2618444-x64.msu
    •           ie8-windows6.0-kb2618444-x86.msu
    •           ie8-windowsserver2003-kb2618444-x86-enu.exe
    •           ie8-windowsserver2003.windowsxp-kb2618444-x64-enu.exe
    •           ie8-windowsxp-kb2618444-x86-enu.exe
    •           ie9-windows6.0-kb2618444-x64.msu
    •           ie9-windows6.0-kb2618444-x86.msu
    •           ie9-windows6.1-kb2618444-x64.msu
    •           ie9-windows6.1-kb2618444-x86.msu
    •           windows-kb890830-v4.3.exe
    •           windows-kb890830-x64-v4.3.exe
    •           windows6.0-kb2618444-x64.msu
    •           windows6.0-kb2618444-x86.msu
    •           windows6.0-kb2618451-x64.msu
    •           windows6.0-kb2618451-x86.msu
    •           windows6.0-kb2619339-x64.msu
    •           windows6.0-kb2619339-x86.msu
    •           windows6.0-kb2620712-x64.msu
    •           windows6.0-kb2620712-x86.msu
    •           windows6.0-kb2621146-x64.msu
    •           windows6.0-kb2621146-x86.msu
    •           windows6.0-kb2633171-x86.msu
    •           windows6.0-kb2639417-x64.msu
    •           windows6.0-kb2639417-x86.msu
    •           windows6.1-kb2618444-x64.msu
    •           windows6.1-kb2618444-x86.msu
    •           windows6.1-kb2618451-x64.msu
    •           windows6.1-kb2618451-x86.msu
    •           windows6.1-kb2619339-x64.msu
    •           windows6.1-kb2619339-x86.msu
    •           windows6.1-kb2620712-x64.msu
    •           windows6.1-kb2620712-x86.msu
    •           windows6.1-kb2621146-x64.msu
    •           windows6.1-kb2621146-x86.msu
    •           windows6.1-kb2633171-x86.msu
    •           windows6.1-kb2639417-x64.msu
    •           windows6.1-kb2639417-x86.msu
    •           windowsserver2003-kb2618444-x86-enu.exe
    •           windowsserver2003-kb2618451-x86-enu.exe
    •           windowsserver2003-kb2620712-x86-enu.exe
    •           windowsserver2003-kb2621146-x86-enu.exe
    •           windowsserver2003-kb2624667-x86-enu.exe
    •           windowsserver2003-kb2626416-x86-enu.exe
    •           windowsserver2003-kb2633171-x86-enu.exe
    •           windowsserver2003-kb2639417-x86-enu.exe
    •           windowsserver2003.windowsxp-kb2618444-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2618451-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2619339-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2620712-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2621146-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2624667-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2626416-x64-enu.exe
    •           windowsserver2003.windowsxp-kb2639417-x64-enu.exe
    •           windowsxp-kb2618444-x86-enu.exe
    •           windowsxp-kb2618451-x86-enu.exe
    •           windowsxp-kb2619339-x86-enu.exe
    •           windowsxp-kb2620712-x86-enu.exe
    •           windowsxp-kb2624667-x86-enu.exe
    •           windowsxp-kb2626416-x86-enu.exe
    •           windowsxp-kb2633171-x86-enu.exe
    •           windowsxp-kb2639417-x86-enu.exe


    Where to Send Feedback

    At LANDesk, we are constantly striving to improve our products and services and hope you find these changes reflective of our ongoing commitment to listen to you—our partners and customers—in providing the best possible solutions to meet your needs now and in the future.  Please continue to provide feedback by contacting our local support organization.


    Best regards,

    LANDesk Product Support


    Copyright © 2011 LANDesk Software.  All rights reserved. LANDesk is either a registered trademark or trademark of LANDesk Software, Ltd. or its affiliated entities in the United States and/or other countries. Other names or brands may be claimed as the property of others.


    Information in this document is provided for information purposes only.  The information presented here is subject to change without notice.  This information is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including any implied warranties and conditions of merchantability or fitness for a particular purpose. LANDesk disclaims any liability with respect to this document and LANDesk has no responsibility or liability for any third party products of any content contained on any site referenced herein.  This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. For the most current product information, please visit