
This security update is rated Critical for all supported Microsoft software that included the Windows common controls in their default installations. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. In all cases, however, an attacker would have no way to force users to visit such a website. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. This security update resolves a privately reported vulnerability in Windows common controls. Version: 2.1 General Information Executive Summary Published: Aug| Updated: January 30, 2013



Security Bulletin Microsoft Security Bulletin MS12-060 - Critical Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)
