{"id":4736,"date":"2010-11-10T09:42:03","date_gmt":"2010-11-10T13:42:03","guid":{"rendered":"http:\/\/www.schollnick.net\/wordpress\/?p=4736"},"modified":"2010-11-10T09:42:15","modified_gmt":"2010-11-10T13:42:15","slug":"microsoft-releases-the-first-security-patch-to-office-2011-v14-0-1","status":"publish","type":"post","link":"http:\/\/www.schollnick.net\/wordpress\/2010\/11\/microsoft-releases-the-first-security-patch-to-office-2011-v14-0-1\/","title":{"rendered":"Microsoft releases the first security patch to Office 2011 (v14.0.1)"},"content":{"rendered":"<p><span style=\"font-family: 'Lucida Grande', Verdana, Arial, sans-serif; color: #222222; font-size: 13px;\"><\/p>\n<p style=\"line-height: 1.4em; text-align: justify;\"><span style=\"line-height: normal;\"><\/p>\n<p style=\"line-height: 1.4em; text-align: justify;\">&#65279;Microsoft has released&nbsp;<a style=\"outline-width: 0px; outline-style: initial; outline-color: initial; text-decoration: none; color: #379626; border: 0px initial initial;\" href=\"http:\/\/www.microsoft.com\/downloads\/en\/details.aspx?FamilyID=8bd6ca3b-8004-4e8d-a09d-220dcbbce799&amp;displayLang=en\">its first update to Office 2011<\/a>, which, in addition to bug fixes, patches a security vulnerability that&nbsp;<a style=\"outline-width: 0px; outline-style: initial; outline-color: initial; text-decoration: none; color: #379626; border: 0px initial initial;\" href=\"http:\/\/www.microsoft.com\/technet\/security\/bulletin\/ms10-087.mspx\">could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message<\/a>.<\/p>\n<p style=\"line-height: 1.4em; text-align: justify;\">Users can download the 110.5 MB update&nbsp;<a style=\"outline-width: 0px; outline-style: initial; outline-color: initial; text-decoration: none; color: #379626; border: 0px initial initial;\" href=\"http:\/\/www.microsoft.com\/downloads\/en\/details.aspx?FamilyID=8bd6ca3b-8004-4e8d-a09d-220dcbbce799&amp;displayLang=en\">here<\/a>, or via the Microsoft AutoUpdate tool. More information about the update is&nbsp;<a style=\"outline-width: 0px; outline-style: initial; outline-color: initial; text-decoration: none; color: #379626; border: 0px initial initial;\" href=\"http:\/\/support.microsoft.com\/kb\/2454823\">here<\/a>.<br \/><a style=\"outline-width: 0px; outline-style: initial; outline-color: initial; text-decoration: none; color: #379626; border: 0px initial initial;\" href=\"http:\/\/www.computerworld.com\/s\/article\/9195819\/Microsoft_forgets_to_patch_Mac_Office_2004_2008\">Computerworld<\/a> points out that the same flaw exists in Microsoft Office 2004 and 2008, and that Microsoft is not offering patches for these versions.<\/p>\n<p><\/span><\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#65279;Microsoft has released&nbsp;its first update to Office 2011, which, in addition to bug fixes, patches a security vulnerability that&nbsp;could allow remote code execution if a user opens or previews a specially crafted RTF e-mail message. Users can download the 110.5 MB update&nbsp;here, or via the Microsoft AutoUpdate tool. More information about the update is&nbsp;here.Computerworld points <a class=\"read-more\" href=\"http:\/\/www.schollnick.net\/wordpress\/2010\/11\/microsoft-releases-the-first-security-patch-to-office-2011-v14-0-1\/\">[&hellip;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[5],"tags":[110,1838],"_links":{"self":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/posts\/4736"}],"collection":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/comments?post=4736"}],"version-history":[{"count":0,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/posts\/4736\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/media?parent=4736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/categories?post=4736"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.schollnick.net\/wordpress\/wp-json\/wp\/v2\/tags?post=4736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- WP Super Cache is installed but broken. The constant WPCACHEHOME must be set in the file wp-config.php and point at the WP Super Cache plugin directory. -->