Tag Archives: Download

Internet Explorer 10 Release Preview for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011) has been released

Internet Explorer 10 Release Preview for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011) has been released.

Fast: Internet Explorer 10 harnesses the untapped power of your PC, delivering pages full of vivid graphics, smoother video, and interactive content Easy: Experience the web the way you want to with pinned sites, built-in Spellcheck, and seamless integration with your PC running Windows 7 Safer: Improved features like SmartScreen Filter and Tracking Protection let you be more aware of threats to your PC and your privacy

You can download Internet Explorer 10 Release Preview using the link below:

http://windows.microsoft.com/en-US/internet-explorer/ie-10-release-preview?ocid=GA8_O_WOL_DIS_IE_IE10_NULL

Apple release iTunes 10.7 (32 Bit and 64 Bit Editions)

Apple iTunes 10.7 (32 Bit and 64 Bit Editions) provides the following enhancements and security fixes

• Adds support for iOS 6 running on compatible iPhone, iPad, and iPod touch models

• Adds support for the latest iPod nano and iPod shuffle models

• Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

• Description: Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling

• CVE-ID

• CVE-2011-3016 : miaubiz

• CVE-2011-3021 : Arthur Gerkis

• CVE-2011-3027 : miaubiz

• CVE-2011-3032 : Arthur Gerkis

• CVE-2011-3034 : Arthur Gerkis

• CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis

• CVE-2011-3036 : miaubiz

• CVE-2011-3037 : miaubiz

• CVE-2011-3038 : miaubiz

• CVE-2011-3039 : miaubiz

• CVE-2011-3040 : miaubiz

• CVE-2011-3041 : miaubiz

• CVE-2011-3042 : miaubiz

• CVE-2011-3043 : miaubiz

• CVE-2011-3044 : Arthur Gerkis

• CVE-2011-3050 : miaubiz

• CVE-2011-3053 : miaubiz

• CVE-2011-3059 : Arthur Gerkis

• CVE-2011-3060 : miaubiz

• CVE-2011-3064 : Atte Kettunen of OUSPG

• CVE-2011-3068 : miaubiz

• CVE-2011-3069 : miaubiz

• CVE-2011-3071 : pa_kt working with HP’s Zero Day Initiative

• CVE-2011-3073 : Arthur Gerkis

• CVE-2011-3074 : Slawomir Blazek

• CVE-2011-3075 : miaubiz

• CVE-2011-3076 : miaubiz

• CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team

• CVE-2011-3081 : miaubiz

• CVE-2011-3086 : Arthur Gerkis

• CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz

• CVE-2011-3090 : Arthur Gerkis

• CVE-2011-3105 : miaubiz

• CVE-2011-3913 : Arthur Gerkis

• CVE-2011-3924 : Arthur Gerkis

• CVE-2011-3926 : Arthur Gerkis

• CVE-2011-3958 : miaubiz

• CVE-2011-3966 : Aki Helin of OUSPG

• CVE-2011-3968 : Arthur Gerkis

• CVE-2011-3969 : Arthur Gerkis

• CVE-2011-3971 : Arthur Gerkis

• CVE-2012-0682 : Apple Product Security

• CVE-2012-0683 : Dave Mandelin of Mozilla

• CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP

• CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP

• CVE-2012-2817 : miaubiz • CVE-2012-2818 : miaubiz

• CVE-2012-2829 : miaubiz

• CVE-2012-2831 : miaubiz

• CVE-2012-2842 : miaubiz

• CVE-2012-2843 : miaubiz

• CVE-2012-3589 : Dave Mandelin of Mozilla

• CVE-2012-3590 : Apple Product Security

• CVE-2012-3591 : Apple Product Security

• CVE-2012-3592 : Apple Product Security

• CVE-2012-3593 : Apple Product Security

• CVE-2012-3594 : miaubiz

• CVE-2012-3595 : Martin Barbella of Google Chrome Security

• CVE-2012-3596 : Skylined of the Google Chrome Security Team

• CVE-2012-3597 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3598 : Apple Product Security

• CVE-2012-3599 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3600 : David Levin of the Chromium development community

• CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3602 : miaubiz

• CVE-2012-3603 : Apple Product Security

• CVE-2012-3604 : Skylined of the Google Chrome Security Team

• CVE-2012-3605 : Cris Neckar of the Google Chrome Security team

• CVE-2012-3606 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3607 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3608 : Skylined of the Google Chrome Security Team

• CVE-2012-3609 : Skylined of the Google Chrome Security Team

• CVE-2012-3610 : Skylined of the Google Chrome Security Team

• CVE-2012-3611 : Apple Product Security

• CVE-2012-3612 : Skylined of the Google Chrome Security Team

• CVE-2012-3613 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3614 : Yong Li of Research In Motion, Inc.

• CVE-2012-3615 : Stephen Chenney of the Chromium development community

• CVE-2012-3616 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3617 : Apple Product Security

• CVE-2012-3618 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3620 : Abhishek Arya of Google Chrome Security Team

• CVE-2012-3621 : Skylined of the Google Chrome Security Team

• CVE-2012-3622 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3623 : Skylined of the Google Chrome Security Team

• CVE-2012-3624 : Skylined of the Google Chrome Security Team

• CVE-2012-3625 : Skylined of Google Chrome Security Team

• CVE-2012-3626 : Apple Product Security

• CVE-2012-3627 : Skylined and Abhishek Arya of Google Chrome Security team

• CVE-2012-3628 : Apple Product Security

• CVE-2012-3629 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3630 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3631 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3632 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3640 : miaubiz

• CVE-2012-3641 : Slawomir Blazek

• CVE-2012-3642 : miaubiz

• CVE-2012-3643 : Skylined of the Google Chrome Security Team

• CVE-2012-3644 : miaubiz

• CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3647 : Skylined of the Google Chrome Security Team

• CVE-2012-3648 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3652 : Martin Barbella of Google Chrome Security Team

• CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3654 : Skylined of the Google Chrome Security Team

• CVE-2012-3655 : Skylined of the Google Chrome Security Team

• CVE-2012-3656 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3657 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3658 : Apple

• CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3660 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3661 : Apple Product Security

• CVE-2012-3663 : Skylined of Google Chrome Security Team

• CVE-2012-3664 : Thomas Sepez of the Chromium development community

• CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3666 : Apple

• CVE-2012-3667 : Trevor Squires of propaneapp.com

• CVE-2012-3668 : Apple Product Security

• CVE-2012-3669 : Apple Product Security

• CVE-2012-3670 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer, Arthur Gerkis

• CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3672 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3673 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3674 : Skylined of Google Chrome Security Team

• CVE-2012-3675 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3676 : Julien Chaffraix of the Chromium development community

• CVE-2012-3677 : Apple

• CVE-2012-3678 : Apple Product Security

• CVE-2012-3679 : Chris Leary of Mozilla

• CVE-2012-3680 : Skylined of Google Chrome Security Team

• CVE-2012-3681 : Apple

• CVE-2012-3682 : Adam Barth of the Google Chrome Security Team

• CVE-2012-3683 : wushi of team509 working with iDefense VCP

• CVE-2012-3684 : kuzzcc

• CVE-2012-3685 : Apple Product Security

• CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing)

• CVE-2012-3687 : kuzzcc

• CVE-2012-3688 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security

• CVE-2012-3699 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3700 : Apple Product Security

• CVE-2012-3701 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3702 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3703 : Apple Product Security

• CVE-2012-3704 : Skylined of the Google Chrome Security Team

• CVE-2012-3705 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3706 : Apple Product Security

• CVE-2012-3707 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3708 : Apple

• CVE-2012-3709 : Apple Product Security

• CVE-2012-3710 : James Robinson of Google

• CVE-2012-3711 : Skylined of the Google Chrome Security Team

• CVE-2012-3712 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

You can download Apple iTunes 10.7 by visiting the following link http://www.apple.com/itunes/

Update Rollup 3 for Windows Small Business Server 2011 (SBS 2011) has been Released

Update Rollup 3 for Windows Small Business Server 2011 (SBS 2011) brings support for deploying Windows 8 in your SBS 2011 environment using the SBS 2011 connect computer wizard

This update rollup contains all the updates that were included in the previous update rollup. Additionally, this update fixes the following issues

Issue 1 You receive a warning message when you try to deploy a client computer that is running Windows 8 in Windows Small Business Server 2011 Standard. Note This issue occurs because Windows Small Business Server 2011 Standard does not support client computers that are running Windows 8. However, after you apply this update, you do not receive a warning message.

Issue 2 After you run client deployment tools in Windows Small Business Server 2011 Standard, Windows Store apps do not work on client computers that are running Windows 8

Note The update described in this article adds support for user profile migration

Issue 3 You cannot remotely connect to a Windows 8 client computer from the Remote Web Access webpage

Issue 4 After you install the Microsoft .NET Framework 4.5 and then install the .NET Framework 4, you do not receive email notifications

Issue 5 You cannot download a file or a folder whose path contains non-ASCII characters on the Remote Web Access webpage

Issue 6 Assume that the name of a user, group, or organization unit (OU) contains a slash (/). When the user, group, or OU is a member of a group that is traversed during the Remote Web Access logon process, the user, group, or OU cannot log on to the Remote Web Access webpage.

Issue 7 When Windows Small Business Server uses the default configuration, Windows Server Update Services (WSUS) cannot synchronize Best Practices Analyzer (BPA) with Windows Small Business Server.  Additionally, new updates for BPA are displayed only in the optional updates menu.

Note After you install the update that is described in this article, the following changes occur in BPA and WSUS:

• Update rollups for BPA are auto-approved as update rollups for Windows Small Business Server

• The “tools” category is added to WSUS

• The BPA installation is approved and is displayed in the “Updates with Microsoft Software License Terms that are pending approval” group

Microsoft SQL Server 2008 R2 Service Pack 2 Released

Microsoft SQL Server 2008 R2 Service Pack 2 has now been released and can be downloaded from the following link:

http://www.microsoft.com/en-us/download/details.aspx?id=30437

Important Note

If you are upgrading from SQL Server 2008 R2 SP1 Cumulative Update 6 to SQL Server 2008 R2 SP2 then you must apply a post-SQL Server 2008 R2 SP2 cumulative update after you upgrade to SQL Server 2008 R2 SP2 to obtain all the fixes.

Cumulative update package 1 for Microsoft SQL Server 2008 R2 Service Pack 2  can be downloaded from the following link and should be installed straight after you have applied Microsoft SQL Server 2008 R2 Service Pack 2

http://support.microsoft.com/kb/2720425