Microsoft Security Bulletins For June 2013 overview

Microsoft released a total of five security bulletins addressing 23 different vulnerabilities today of which four affect client and server versions of the Windows operating system while one is affecting Microsoft Office.
One bulletin has received the maximum severity rating of critical, the highest possible rating, while the remaining four received one of important, the second highest. This does not mean that all versions of Windows or Office are equally affected by those vulnerabilities.
Check out the operating system distribution listing that details how individual versions of Windows are affected this patch day.
Operating System Distribution
Windows editions and versions may be affected in different ways to vulnerabilities. A simple example is a vulnerability in a feature that Microsoft introduced in a later version of the operating system. In this case, all previous versions of Windows would not be affected by the vulnerability at all, as the affected feature would not exist in those versions.
Windows XP is affected the least this time in terms of vulnerabilities followed by Windows RT, then Vista and Windows 7, and finally Windows 8 which is affected most severely.
- Windows XP: 1 critical, 1 important
- Windows Vista: 1 critical, 2 important, 1 moderate
- Windows 7:Â 1 critical, 2 important, 1 moderate
- Windows 8:Â 1 critical, 3 important
- Windows RT: 1 critical, 2 important
- Windows Server 2003: 1 important, 1 moderate
- Windows Server 2008: 2 important, 2 moderate
- Windows server 2008 R2: 1 important, 2 moderate
- Windows Server 2012: 2 important, 1 moderate
Deployment Guide
Microsoft recommends to deploy the bulletins in the following order:
- First MS13-047 (Internet Explorer, critical) and then MS13-051 (Office, important).
- Then MS13-049 (Kernel-Mode, important) and then Ms13-050 (Print Spooler, important).
- Last MS13-048 (Kernel, important).
Security Bulletins
- MS13-047 Cumulative Security Update for Internet Explorer (2838727)
- MS13-048 Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229)
- MS13-049 Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (2845690)
- MS13-050 Vulnerability in Windows Print Spooler Components Could Allow Elevation of Privilege (2839894)
- MS13-051 Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571)
Non-security related updates
- Update for Windows (KB2808679)
- Update for Windows Server 2012 (KB2818604)
- Update for Windows 8, Windows RT, and Windows Server 2012 (KB2821895)
- Update Rollup for Windows Server 2012 Essentials (KB2824160)
- Update for Windows 7 and Windows Server 2008 R2 (KB2834140)
- Update for Microsoft Camera Codec Pack for Windows 8 and Windows RT (KB2836187)
- Update for Windows 7 and Windows Server 2008 R2 (KB2836502)
- Update for Microsoft .NET Framework 4 on Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP (KB2836939)
- Update for Microsoft .NET Framework 3.5 SP1 on Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP (KB2836940)
- Update for Microsoft .NET Framework 2.0 SP2 on Windows Server 2003 and Windows XP (KB2836941)
- Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 (KB2836942)
- Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 (KB2836943)
- Update for Microsoft .NET Framework 2.0 SP2 on Windows Server 2008 (KB2836945)
- Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 (KB2836946)
- Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 (KB2836947)
- Update for Windows 8, Windows RT, and Windows Server 2012 (KB2845533)
- Windows Malicious Software Removal Tool - June 2013 (KB890830)/Windows Malicious Software Removal Tool - June 2013 (KB890830) - Internet Explorer Version
- Update for Windows 7 and Windows Server 2008 R2 (KB2820331)
- System Update Readiness Tool for Windows 7, Windows Server 2008 R2, Windows Server 2008, and Windows Vista (KB947821) [May 2013]
How to download and install the June 2013 security updates
The automatic update feature of Windows is the easiest option when it comes to installing security updates.This is an automated process and you do not really need to do anything as updates are installed automatically on your system.
If you want to update manually, do the following instead:
All Windows users can tap on the Windows-key, enter Windows Update and select the appropriate option here to open the updater of the operating system.
Click on the check for updates button first to retrieve the latest updates from Microsoft before you hit the install updates button.
You can browse the updates that Windows has found before you do so, disable some or include others that are not installed automatically.
It is alternatively possible to use Microsoft's Download Center to download and install updates, or third party programs which you find listed on this page.
Advertisement
Are these articles AI generated?
Now the duplicates are more obvious.
This is below AI generated crap. It is copy of Microsoft Help website article without any relevant supporting text. Anyway you can find this information on many pages.
Yes, but why post the exact same article under a different title twice on the same day (19 march 2023), by two different writers?
1.) Excel Keyboard Shortcuts by Trevor Monteiro.
2.) 70+ Excel Keyboard Shortcuts for Windows by Priyanka Monteiro
Why oh why?
Yeah. Tell me more about “Priyanka Monteiro”. I’m dying to know. Indian-Portuguese bot ?
Probably they will announce that the taskbar will be placed at top, right or left, at your will.
Special event by they is a special crap for us.
If it’s Microsoft, don’t buy it.
Better brands at better prices elsewhere.
All new articles have zero count comments. :S
WTF? So, If I add one photo to 5 albums, will it count 5x on my storage?
It does not make any sense… on google photos, we can add photo to multiple albums, and it does not generate any additional space usage
I have O365 until end of this year, mostly for onedrive and probably will jump into google one
Photo storage must be kept free because customers chose gadgets just for photos and photos only.
What a nonsense. Does it mean that albums are de facto folders with copies of our pictures?
Sounds exactly like the poor coding Microsoft is known for in non-critical areas i.e. non Windows Core/Office Core.
I imagine a manager gave an employee the task to create the album feature with hardly any time so they just copied the folder feature with some cosmetic changes.
And now that they discovered what poor management results in do they go back and do the album feature properly?
Nope, just charge the customer twice.
Sounds like a go-getter that needs to be promoted for increasing sales and managing underlings “efficiently”, said the next layer of middle management.
When will those comments get fixed? Was every editor here replaced by AI and no one even works on this site?
Instead of a software company, Microsoft is now a fraud company.
For me this is proof that Microsoft has a back-door option into all accounts in their cloud.
quote “…… as the MSA key allowed the hacker group access to virtually any cloud account at Microsoft…..”
unquote
so this MSA key which is available to MS officers can give access to all accounts in MS cloud.This is the backdoor that MS has into the cloud accounts. Lucky I never got any relevant files of mine in their (MS) cloud.
>”Now You: what is your theory?”
That someone handed an employee a briefcase full of cash and the employee allowed them access to all their accounts and systems.
Anything that requires 5-10 different coincidences to happen is highly unlikely. Occam’s razor.
Good reason to never login to your precious machine with a Microsoft a/c a.k.a. as the cloud.
The GAFAM are always very careless about our software automatically sending to them telemetry and crash dumps in our backs. It’s a reminder not to send them anything when it’s possible to opt out, and not to opt in, considering what they may contain. And there is irony in this carelessness biting them back, even if in that case they show that they are much more cautious when it’s their own data that is at stake.