Updated 08-14-2012
Microsoft Security Bulletin MS12-060, released August 14, 2012, (update to MS12-027) re-introduces the problem executing VBA scripts within Bentley Structural Modeler XM & V8i, Bentley Structural Modeler XM & V8i and AECOsim Building Designer V8i original cause by applying MS12-027 security update. The issue may also be present in other Bentley applications that use VBA scripts.
The symptoms that you have been affected by Microsoft Security Bulletin MS12-060 update or the original MS12-027 is you may receive one of several variation of a VBA error, in the message center of Bentley Structural Modeler XM & V8i, Bentley Structural Modeler XM & V8i, AECOsim Building Designer V8i or other Bentley applications. Error messages include but are not limited to:
To verify the issue is the result of Microsoft Security Bulletin MS12-060 or MS12-027, please review the Microsoft Updates applied to your computer and determine whether any of the corresponding Service Packs lists either Microsoft Security Bulletin MS12-060 Critical or Microsoft Security Bulletin MS12-027 - Critical were recently applied.
The following are the most commonly applied Service Packs that can cause the reported issue with VBA scripts within Bentley Application
Microsoft Office Suites and Software
For a complete list of Service Packs or Updates that are associated with the Microsoft Security Bulletin MS12-060, please reference http://technet.microsoft.com/en-us/security/bulletin/ms12-060
Microsoft Security Bulletin MS12-060 - CriticalVulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)
This security update resolves a privately reported vulnerability in Windows common controls. The vulnerability could allow remote code execution if a user visits a website containing specially crafted content designed to exploit the vulnerability. In all cases, however, an attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website. The malicious file could be sent as an email attachment as well, but the attacker would have to convince the user to open the attachment in order to exploit the vulnerability.
Resolution:
Please reference the following Microsoft Support Article (Article ID: 2703186) for the resolution to this issue:
To resolve the issue, you must run the “Fix It” option in Microsoft article.