|  |  | 
|  | As part of the monthly security bulletin 
release cycle, Microsoft provides advance notification to our customers 
concerning the number of new security updates being released, the products 
affected, the aggregate maximum severity, and information about detection tools 
relevant to the update. This is intended to help our customers plan for the 
deployment of these security updates more effectively. 
 On February 14, 
2012, Microsoft is planning to release nine new security bulletins. Below is a 
summary.
 |  | 
|  | 
|  |  
| NEW BULLETIN SUMMARY |  
| 
 |  
|  |  
| 
| 
| Bulletin 
ID | Maximum Severity 
Rating | Vulnerability 
Impact | Restart 
Requirement | Affected Software* |  
| Bulletin 1 | Critical | Remote Code Execution | Requires restart | Microsoft Windows XP, 
Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows 
Server 2008 R2. |  
| Bulletin 2 | Critical | Remote Code Execution | Requires restart | Internet Explorer on 
Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, 
Windows 7, and Windows Server 2008 R2. |  
| Bulletin 3 | Critical | Remote Code Execution | Requires restart | Windows Vista, Windows 
Server 2008, Windows 7, and Windows Server 2008 R2. |  
| Bulletin 4 | Critical | Remote Code Execution | May require restart | Microsoft Windows XP, 
Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 
Server 2008 R2, and Silverlight 4. |  
| Bulletin 5 | Important | Elevation of Privilege | Requires restart | Microsoft Windows XP, 
Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows 
Server 2008 R2. |  
| Bulletin 6 | Important | Elevation of Privilege | May require restart | Microsoft SharePoint Server 
2010 and Microsoft SharePoint Foundation 2010. |  
| Bulletin 7 | Important | Remote Code Execution | May require restart | Windows Server 2008 and 
Windows Server 2008 R2. |  
| Bulletin 8 | Important | Remote Code Execution | May require restart | Microsoft Windows 
XP. |  
| Bulletin 9 | Important | Remote Code Execution | May require restart | Microsoft Visio Viewer 2010. |  
| * 
The list of affected software in the summary table is an abstract. To see the 
full list of affected components please click on the "Advance Notification 
Webpage" link below and review the "Affected Software" section. |  |  |  |  | 
|  |  |  | 
|  | Although we do not anticipate any changes, 
the number of bulletins, products affected, restart information, and severities 
are subject to change until released. 
 Advance Notification 
Webpage: The full version of the Microsoft Security Bulletin Advance 
Notification for this month can be found at http://technet.microsoft.com/security/bulletin/ms12-feb.
 
 Microsoft 
Windows Malicious Software Removal Tool: Microsoft will release an 
updated version of the Microsoft Windows Malicious Software Removal Tool on 
Windows Update, Microsoft Update, Windows Server Update Services, and the 
Download Center.
 
 Monthly Security Bulletin Webcast: To 
address customer questions on these bulletins Microsoft will host a webcast next 
Wednesday, February 15, 2012, at 11:00 A.M. Pacific Time (UTC-8). Registration 
for this event and other details can be found at http://technet.microsoft.com/security/bulletin/.
 
 |  | 
|  | 
| At 
this time, no additional information on these bulletins, such as details 
regarding the vulnerability or severity, will be made available until the 
bulletins are published on Tuesday. |  |  | 
|  |  |  | 
|  | 
| REGARDING INFORMATION 
CONSISTENCY |  
| 
 |  
|  |  
| We strive to provide you with accurate information in 
static (this mail) and dynamic (web-based) content. Microsoft's security content 
posted to the web is occasionally updated to reflect late-breaking information. 
If this results in an inconsistency between the information here and the 
information in Microsoft's web-based security content, the information in 
Microsoft's web-based security content is authoritative. 
 If you have any 
questions regarding this alert please contact your Technical Account Manager.
 
 Thank you,
 Microsoft CSS Security Team
 |  | 
 
Comments