{"id":6230,"date":"2013-09-11T18:22:03","date_gmt":"2013-09-11T10:22:03","guid":{"rendered":"http:\/\/www.boostsolutions.com\/blog\/?p=6230"},"modified":"2023-07-31T11:38:46","modified_gmt":"2023-07-31T03:38:46","slug":"microsoft-patch-tuesday-fixes-security-vulnerabilities-sharepoint","status":"publish","type":"post","link":"https:\/\/www.boostsolutions.com\/blog\/microsoft-patch-tuesday-fixes-security-vulnerabilities-sharepoint\/","title":{"rendered":"Microsoft Patch Tuesday fixes security vulnerabilities in SharePoint"},"content":{"rendered":"<p>Microsoft released Security Bulletin MS13-067 on Tuesday to fix ten vulnerabilities in SharePoint, one publicly disclosed and nine privately reported. According to Microsoft this update resolves severe vulnerabilities that could &#8220;allow remote code execution in the context of the W3WP service account if an attacker sends specially crafted content to the affected server.&#8221; The security update affects those who have:<\/p>\n<p>Microsoft SharePoint Server 2007<br \/>\nMicrosoft SharePoint Server 2010<br \/>\nMicrosoft SharePoint Server 2013<br \/>\nMicrosoft SharePoint Services 2.0<br \/>\nMicrosoft SharePoint Services 3.0<br \/>\nMicrosoft SharePoint Foundation 2010<br \/>\nMicrosoft SharePoint Foundation 2013<br \/>\nExcel Services on Microsoft SharePoint Server 2007<\/p>\n<p>For more specific information refer to: <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms13-067\">Microsoft Security Bulletin MS13-067<\/a>.<\/p>\n<p>For more information about other affected software, refer to: <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms13-sep\">Microsoft Security Bulletin Summary for September 2013<\/a>.<\/p>\n<p>Please email us if you have any comments or questions: <a href=\"mailto:inquiry@boostsolutions.com\">inquiry@boostsolutions.com<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft released Security Bulletin MS13-067 on Tuesday to fix ten vulnerabilities in SharePoint, one publicly disclosed and nine privately reported. According to Microsoft this update resolves severe vulnerabilities that could &#8220;allow remote code execution in the context of the W3WP service account if an attacker sends specially crafted content to the affected server.&#8221; The security [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":6076,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,347],"tags":[],"_links":{"self":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6230"}],"collection":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=6230"}],"version-history":[{"count":5,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6230\/revisions"}],"predecessor-version":[{"id":9165,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6230\/revisions\/9165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/media\/6076"}],"wp:attachment":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=6230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=6230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=6230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}