![]() For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.įor administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update at the earliest opportunity using update management software, or by checking for updates using the Microsoft Update service.įor customers of Microsoft Office for Mac, Microsoft AutoUpdate for Mac can be configured to deliver updates for Microsoft software directly to your system. Customers who have not enabled automatic updating need to check for updates from Microsoft Update and install this update manually. Customers who have automatic updating enabled and configured to check online for updates from Microsoft Update typically will not need to take any action because this security update will be downloaded and installed automatically. Recommendation. Customers can configure automatic updating to check online for updates from Microsoft Update by using the Microsoft Update service. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. The security update addresses the vulnerability by correcting the way that Microsoft Office parses specially crafted Office files. For more information, see the subsection, Affected and Non-Affected Software, in this section. This security update is rated Important for supported editions of Microsoft Office 2003 and Microsoft Office for Mac 2011. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The vulnerability could allow remote code execution if a user opens a specially crafted Office document using an affected version of Microsoft Office software, or previews or opens a specially crafted email message in Outlook while using Microsoft Word as the email reader. This security update resolves one privately reported vulnerability in Microsoft Office. Version: 1.0 General Information Executive Summary ![]() This link from Microsoft tells you how to clear out those older registration files.Security Bulletin Microsoft Security Bulletin MS13-051 - Important Vulnerability in Microsoft Office Could Allow Remote Code Execution (2839571) In that case, you have to get rid of the Office registration files that remember what the original hardware was, and then reinstall, and then enter your Product Key, and then– finally!– do the “Activate by Phone” method. ![]() For example, if you decide to replace your hard drive with something better– I like the Solid State Drives (SSDs) from Crucial-– you’ll be asked to activate Office 2011, and in that case, you’ll never be able to… because each installation of Office is “keyed” to the hardware it’s originally installed on, and that includes the hard drive, and the Activation ID and Confirmation ID will only work on that particular configuration. ![]() The reason for this could be that you’ve moved Office 2011 for the Mac to a new machine, or to a new hard drive, by cloning the drive. There’s a chance that things still won’t work. That will get you started down the right path. ![]() Another option: call Microsoft’s general support number (1-80) and say “Office for Mac Activation Department” to the robot that answers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |