Critical Windows, Office, Office for Mac and Adobe updates
June 11, 2010
On June 8, 2010, Microsoft released new patches for critical vulnerabilities on Windows, Microsoft Office, and Office for Macintosh. Also, Adobe has released patches for critical vulnerabilities in Adobe Flash and Adobe AIR.
* All Windows PCs must be patched. *
To patch your PC:
Click on the update icon on the taskbar (it is a globe or yellow shield with an exclamation point, depending on which version of Windows you're running).
If you do not have such an icon, run Windows Update by going to the site:
After patching, you must reboot your PC in order for the patches to take effect.
To patch Microsoft Office for Macintoshes:
If you are using Microsoft Office 2004 or 2008 on a Macintosh, use Microsoft AutoUpdate for Mac, which comes with Office, to check for updates or visit the Macintosh Office download page to get the latest updates:
If you will be manually installing updates, check the "system requirements" section on the download page to make sure that previous required updates have been installed.
Adobe has released patches for critical vulnerabilities in Adobe Flash and Adobe AIR. Everyone using Flash or Adobe AIR must upgrade.
To patch Adobe Flash Player:
and upgrade your version of Flash Player to the latest version, 10.1.53.64. If you view Flash content in both Internet Explorer and another browser, such as Firefox, you will need to patch Flash Player for both types of browsers.
Visit: http://www.adobe.com/software/flash/about/ to see which version of Flash Player you are running.
If you are using Adobe AIR:
upgrade your version of Adobe AIR to the latest version, 184.108.40.20610.
atched Adobe Reader/Acrobat vulnerabilities:
re are current, unpatched critical vulnerabilities in Adobe Reader and Acrobat. Adobe plans on releasing patches for these vulnerabilities on June 29.
If you administer a Microsoft IIS server, see:
for information about a critical, remotely-exploitable vulnerability.
If you administer a Microsoft Sharepoint server, see:
for information about a privilege escalation vulnerability.
Please contact firstname.lastname@example.org or call the SCS Help Desk (x8-4231) if you have questions or problems with applying these patches.