On September 11, 2012, Microsoft will make available for download a new series of security updates for its users, in an attempt to patch some of the recently discovered issues with its products.
The company has already published a Security Bulletin Advance Notification
for September 2012, but did not offer too many details on the actual vulnerabilities
that would be resolved.
However, it did unveil that the first bulletin there would patch a security hole in Microsoft Developer Tools that could allow for Elevation of Privilege.
The second bulletin in this month’s update is meant to fix issues with the Microsoft Server Software that could also result in Elevation of Privilege.
Affecting Microsoft Visual FoxPro, the first bulletin is rated as Important for Microsoft Visual Studio Team Foundation Server 2010 Service Pack 1.
Aimed at Microsoft System Center Configuration Manager, the second bulletin is rendered Important for Microsoft Systems Management Server 2003 Service Pack 3 and for Microsoft System Center Configuration Manager 2007 Service Pack 2.
“This advance notification provides a number as the bulletin identifier, because the official Microsoft Security Bulletin numbers are not issued until release,” the software giant explains.
“The bulletin summary that replaces this advance notification will have the proper Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the bulletin identifier.”
The new set of security updates will be accompanied by a new, updated version of the Microsoft Windows Malicious Software Removal Tool.
The new iteration of the utility will be pushed out through Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.
As usual, customers with the Automatic Update feature turned on will receive the new security patches
as soon as they are released. The rest of users will have to perform the update manually.
It is recommended to always have the latest such fixes installed on your computers, so as to make sure that you are protected from newly discovered vulnerabilities.