Microsoft Security Bulletin Re-Releases/Advisories

Discussion in 'Virus Software Updates (Read Only)' started by NICK ADSL UK, Jun 19, 2008.

  1. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-045 - Critical
    Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution (971961)
    Published: September 08, 2009 | Updated: September 30, 2009

    Revisions
    • V1.0 (September 8, 2009): Bulletin published.

    • V1.1 (September 9, 2009): Corrected the update package file name for JScript 5.6 on all supported x64-based editions of Windows Server 2003.

    • V1.2 (September 30, 2009): Added information about known issues related to uninstalling the security update and verifying the registry key on Windows XP and Windows Server 2003.

    http://www.microsoft.com/technet/security/bulletin/ms09-045.mspx
     
  2. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory Notification - Oct. 14, 2009

    Issued: October 14, 2009

    Security Advisory Updated or Released Today

    * Microsoft Security Advisory (973811)
    - Title: Extended Protection for Authentication
    http://www.microsoft.com/technet/security/advisory/973811.mspx

    Revisions:

    • V1.0 (August 11, 2009): Advisory published.

    • V1.1 (October 14, 2009): Updated the FAQ with information about a non-security update included in MS09-054 relating to WinINET
    .
     
  3. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Minor Revision - Oct. 13, 2009

    Issued: October 13, 2009

    Summary

    The following bulletin has undergone a minor revision increment.

    * MS09-024 - Critical

    Bulletin Information:

    * MS09-024 - Critical
    http://www.microsoft.com/technet/security/bulletin/ms09-024.mspx

    - Reason for Revision: V1.1 (October 13, 2009): Bulletin revised to
    announce the addition of language localizations to the update
    for Works 9. Customers who have already successfully applied
    the original update to Works 9 are not affected by this revision.
    - Originally posted: June 9, 2009
    - Updated: October 13, 2009
    - Bulletin Severity Rating: Critical
    - Version: 1.1
     
  4. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory Notification - Oct. 13, 2009

    Issued: October 13, 2009

    Security Advisories Updated or Released Today

    * Microsoft Security Advisory (975497)
    - Title: Vulnerabilities in SMB Could Allow Remote
    Code Execution
    Revision Note: V2.0 (October 13, 2009): Advisory updated to
    reflect publication of security bulletin.
    http://www.microsoft.com/technet/security/advisory/975497.mspx



    * Microsoft Security Advisory (975191)
    - Title: Vulnerabilities in the FTP Service in
    Internet Information Service
    - Revision Note: V3.0 (October 13, 2009): Advisory updated to
    reflect publication of security bulletin.
    http://www.microsoft.com/technet/security/advisory/975191.mspx


    Microsoft Security Advisory (973882)
    - Title: Vulnerabilities in Microsoft Active Template
    Library (ATL) Could Allow Remote Code Execution
    - Revision Note: V4.0 (October 13, 2009): Advisory revised to
    add an entry in the Updates related to ATL section to
    communicate the release of Microsoft Security Bulletin
    MS09-060, "Vulnerabilities in Microsoft Active Template
    http://www.microsoft.com/technet/security/advisory/973882.mspx
     
  5. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  6. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-061 - Critical
    Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (974378)
    Published: October 13, 2009 | Updated: October 21, 2009

    Revisions
    • V1.0 (October 13, 2009): Bulletin published.

    • V1.1 (October 21, 2009): Corrected the deployment information for Microsoft .NET Framework on all supported releases of Microsoft Windows. This is an informational change only. Customers who have successfully installed this update do not need to reinstall.


    http://www.microsoft.com/technet/security/bulletin/ms09-061.mspx


    Microsoft Security Bulletin MS09-060 - Critical
    Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution (973965)
    Published: October 13, 2009 | Updated: October 21, 2009
    Revisions
    • V1.0 (October 13, 2009): Bulletin published.

    • V1.1 (October 21, 2009): Added entries to the section, Frequently Asked Questions (FAQ) Related to This Security Update, to describe the known issue update available from KB974554, KB974556, or KB974234.


    http://www.microsoft.com/technet/security/bulletin/ms09-060.mspx
     
  7. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-045 - Critical
    Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution (971961)
    Published: September 08, 2009 | Updated: November 10, 2009

    Revisions
    • V1.0 (September 8, 2009): Bulletin published.

    • V1.1 (September 9, 2009): Corrected the update package file name for JScript 5.6 on all supported x64-based editions of Windows Server 2003.

    • V1.2 (September 30, 2009): Added information about known issues related to uninstalling the security update and verifying the registry key on Windows XP and Windows Server 2003.

    • V2.0 (November 10, 2009): Added JScript 5.7 on Microsoft Windows 2000 Service Pack 4 (KB975542) to the Affected Software table and the Security Update Deployment section.

    http://www.microsoft.com/technet/security/bulletin/ms09-045.mspx
     
  8. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-051 - Critical
    Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution (975682)
    Published: October 13, 2009 | Updated: November 10, 2009


    Revisions
    • V1.0 (October 13, 2009): Bulletin published.

    • V1.1 (October 14, 2009): Clarified the entry, "I have Windows Media Player installed on my system. Why am I not being offered some of the updates?" in the FAQ section. Also corrected the FAQ for CVE-2009-0555 to indicate that Microsoft is aware of limited attacks attempting to exploit the vulnerability.

    • V2.0 (November 10, 2009): Bulletin revised to communicate the rerelease of the update for Audio Compression Manager on Microsoft Windows 2000 Service Pack 4 to fix a detection issue. This is a detection change only; there were no changes to the binaries. Customers who have successfully updated their systems do not need to reinstall this update. Also corrected the registry key verification for DirectShow WMA Voice Codec on Windows Server 2003.

    http://www.microsoft.com/technet/security/bulletin/ms09-051.mspx
     
  9. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-065 - Critical
    Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947)
    Published: November 10, 2009 | Updated: November 12, 2009


    Revisions
    • V1.0 (November 10, 2009): Bulletin published.

    • V1.1 (November 12, 2009): Added a link to Microsoft Knowledge Base Article 969947 under Known Issues in the Executive Summary.

    http://www.microsoft.com/technet/security/bulletin/ms09-065.mspx
     
  10. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  11. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-046 - Critical
    Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution (956844)
    Published: September 08, 2009 | Updated: December 02, 2009

    Revisions
    • V1.0 (September 8, 2009): Bulletin published.

    • V1.1 (October 14, 2009): Corrected the class identifier for the ActiveX control in the workaround, “Prevent the DHTML ActiveX control COM object from running in Internet Explorer.”

    • V1.2 (December 2, 2009): Added a link to Microsoft Knowledge Base Article 956844 under Known Issues in the Executive Summary.

    http://www.microsoft.com/technet/security/bulletin/ms09-046.mspx
     
  12. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS08-037 – Important
    Vulnerabilities in DNS Could Allow Spoofing (953230)
    Published: July 08, 2008 | Updated: December 08, 2009



    Revisions
    • V1.0 (July 8, 2008): Bulletin published.

    • V2.0 (July 10, 2008): Bulletin revised to inform users of ZoneAlarm and Check Point Endpoint Security of an Internet connectivity issue detailed in the section, Frequently Asked Questions (FAQ) Related to this Security Update. The revision did not change the security update files in this bulletin, but users of ZoneAlarm and Check Point Endpoint Security should read the FAQ entries for guidance.

    • V2.1 (July 23, 2008): Affected Software table revised to add MS06-064, MS07-062, and MS08-001 as bulletins replaced by this update.

    • V2.2 (July 25, 2008): Added three new known issues entries to Frequently Asked Questions (FAQ) Related to This Security Update.

    • V2.3 (January 13, 2009): Added a new entry to the Frequently Asked Questions (FAQ) Related to This Security Update section to communicate the fix to a detection and deployment issue with Windows XP Service Pack 3. There were no changes to the binaries or packages for this update. Customers who have successfully updated their systems do not need to reinstall this update.

    • V3.0 (December 8, 2009): Updated to communicate the rerelease of the security update for the DNS client on Microsoft Windows 2000 Service Pack 4 (KB951748). Also corrected the bulletin replacement information for this update. Customers who have previously installed this update need to reinstall the automatically reoffered update. No other updates are affected by this rerelease.

    http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx
     
  13. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    New Security Advisories

    Security Advisories Updated or Released Today

    * Microsoft Security Advisory (977981)
    - Title: Vulnerability in Internet Explorer Could
    Allow Remote Code Execution
    - Revision Note: V2.0 (December 8, 2009): Advisory updated to
    reflect publication of security bulletin.
    http://www.microsoft.com/technet/security/advisory/977981.mspx

    * Microsoft Security Advisory (974926)
    - Title: Credential Relaying Attacks on Integrated
    Windows Authentication
    Revision Note: V1.0 (December 8, 2009): Advisory published.
    http://www.microsoft.com/technet/security/advisory/974926.mspx

    Microsoft Security Advisory (973811)
    Extended Protection for Authentication
    Published: August 11, 2009 | Updated: December 08, 2009
    http://www.microsoft.com/technet/security/advisory/973811.mspx

    * Microsoft Security Advisory (954157)
    - Title: Security Enhancements for the Indeo Codec
    - Revision Note: V1.0 (December 8, 2009): Advisory published.
    http://www.microsoft.com/technet/security/advisory/954157.mspx
     
  14. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Minor Revisions - Dec. 9, 2009

    Issued: December 9, 2009

    Summary

    The following bulletins have undergone a minor revision increment.
    Please see the appropriate bulletin for more details.

    * MS09-073 - Important
    * MS09-072 - Critical
    * MS09-071 - Critical
    * MS09-070 - Important
    * MS09-058 - Important
    * MS08-037 - Important


    Bulletin Information:

    Microsoft Security Bulletin MS09-073 - Important
    Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution (975539)
    Published: December 08, 2009 | Updated: December 09, 2009
    Revisions
    • V1.0 (December 8, 2009): Bulletin published.

    • V1.1 (December 9, 2009): Removed a redundant entry for the Microsoft Office Compatibility Pack from the non-affected software table. Also corrected several deployment reference tables to clarify that in some cases, this update does not require a restart. This is an informational change only.

    http://www.microsoft.com/technet/security/bulletin/ms09-073.mspx


    Microsoft Security Bulletin MS09-072 - Critical
    Cumulative Security Update for Internet Explorer (976325)
    Published: December 08, 2009 | Updated: December 09, 2009
    Revisions
    • V1.0 (December 8, 2009): Bulletin published.

    • V1.1 (December 9, 2009): Corrected a reference to Microsoft Knowledge Base Article 976749 in the section, Frequently Asked Questions (FAQ) Related to This Security Update. Also corrected, in the Security Update Deployment section, the registry key for verification of the update for Internet Explorer 7 for all supported x64-based editions of Windows XP.

    http://www.microsoft.com/technet/security/bulletin/ms09-072.mspx


    Microsoft Security Bulletin MS09-071 - Critical
    Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution (974318)
    Published: December 08, 2009 | Updated: December 09, 2009
    Revisions
    • V1.0 (December 8, 2009): Bulletin published.

    • V1.1 (December 9, 2009): Added an entry to the Frequently Asked Questions (FAQ) Related to This Security Update section to explain this revision. This is an informational change only.

    http://www.microsoft.com/technet/security/bulletin/ms09-071.mspx


    Microsoft Security Bulletin MS09-070 - Important
    Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution (971726)
    Published: December 08, 2009 | Updated: December 09, 2009
    Revisions
    • V1.0 (December 8, 2009): Bulletin published.

    • V1.1 (December 9, 2009): Corrected the SMS 2.0 and SMS 2003 with SUIT entries for Windows Server 2003 x64 Edition Service Pack 2 in the SMS table. This is an information change only.

    http://www.microsoft.com/technet/security/bulletin/ms09-070.mspx


    Microsoft Security Bulletin MS09-058 - Important
    Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (971486)
    Published: October 13, 2009
    Revisions
    • V1.0 (October 13, 2009): Bulletin published.

    http://www.microsoft.com/technet/security/bulletin/ms09-058.mspx


    Microsoft Security Bulletin MS08-037 – Important
    Vulnerabilities in DNS Could Allow Spoofing (953230)
    Published: July 08, 2008 | Updated: December 09, 2009
    Revisions
    • V1.0 (July 8, 2008): Bulletin published.

    • V2.0 (July 10, 2008): Bulletin revised to inform users of ZoneAlarm and Check Point Endpoint Security of an Internet connectivity issue detailed in the section, Frequently Asked Questions (FAQ) Related to this Security Update. The revision did not change the security update files in this bulletin, but users of ZoneAlarm and Check Point Endpoint Security should read the FAQ entries for guidance.

    • V2.1 (July 23, 2008): Affected Software table revised to add MS06-064, MS07-062, and MS08-001 as bulletins replaced by this update.

    • V2.2 (July 25, 2008): Added three new known issues entries to Frequently Asked Questions (FAQ) Related to This Security Update.

    • V2.3 (January 13, 2009): Added a new entry to the Frequently Asked Questions (FAQ) Related to This Security Update section to communicate the fix to a detection and deployment issue with Windows XP Service Pack 3. There were no changes to the binaries or packages for this update. Customers who have successfully updated their systems do not need to reinstall this update.

    • V3.0 (December 8, 2009): Updated to communicate the rerelease of the security update for the DNS client on Microsoft Windows 2000 Service Pack 4 (KB951748). Also corrected the bulletin replacement information for this update. Customers who have previously installed this update need to reinstall the automatically reoffered update. No other updates are affected by this rerelease.

    • V3.1 (December 9, 2009): Corrected the registry key verification and removal information in the reference table for the DNS client on Microsoft Windows 2000 Service Pack 4 (KB951748). This is an informational change only.

    http://www.microsoft.com/technet/security/bulletin/ms08-037.mspx
     
  15. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  16. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS09-035 - Moderate

    Microsoft Security Bulletin MS09-035 - Moderate
    Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution (969706)
    Published: July 28, 2009 | Updated: January 12, 2010

    Revisions
    • V1.0 (July 28, 2009): Bulletin published.

    • V1.1 (August 4, 2009): Added new entries to the section, Frequently Asked Questions (FAQ) Related to This Security Update, to communicate that the Known issues with this security update section in the associated Microsoft Knowledge Base Article 969706 has been updated, and that the update detection logic for KB973923 and KB973924 has been revised to correct a package re-offering issue; and to clarify the difference between the Visual C++ Redistributable packages and the other Visual Studio updates.

    • V2.0 (August 11, 2009): Bulletin rereleased to offer new updates for Microsoft Visual Studio 2005 Service Pack 1 (KB973673), Microsoft Visual Studio 2008 (KB973674), and Microsoft Visual Studio 2008 Service Pack 1 (KB973675), for developers who use Visual Studio to create components and controls for mobile applications using ATL for Smart Devices.

    • V2.1 (August 12, 2009): Updated the Affected Software table to list MS07-012 as replaced by the update for Microsoft Visual Studio .NET 2003 Service Pack 1; added a new entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update, to clarify why Microsoft Download Center update KB numbers for Visual C++ Redistributable packages differ from SMS, SCCM, WSUS and MU update KB numbers; corrected restart requirements throughout the bulletin; added Product Code Verification entries to the update deployment reference tables for Microsoft Visual Studio 2005 Service Pack 1, and Microsoft Visual Studio 2008 and Microsoft Visual Studio 2008 Service Pack 1; and performed miscellaneous edits.

    • V2.2 (August 19, 2009): Added a link to Microsoft Knowledge Base Article 974653 to provide instructions for using product codes to verify the installation of the updates for Microsoft Visual Studio 2005 Service Pack 1 and Microsoft Visual Studio 2008 and Microsoft Visual Studio 2008 Service Pack 1.

    • V2.3 (September 8, 2009): Added a new entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update, to communicate that Microsoft Knowledge Base Article 969706 has been revised to change the known issue KB974223 to KB974479, in order to offer a non-security update to fix the issue.

    • V3.0 (January 12, 2010): Rereleased this bulletin to add Windows Embedded CE 6.0 to affected software. The new update for Windows Embedded CE 6.0 (KB974616) is available from the Microsoft Download Center only. Customers using the Windows Embedded CE 6.0 platform should consider applying the update. No other update packages are affected by this rerelease.

    http://www.microsoft.com/technet/security/bulletin/ms09-035.mspx
     
  17. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Title: Microsoft Security Bulletin Major Revision
    Issued: January 13, 2010



    Summary
    =======
    The following bulletin has undergone a major revision increment.

    * MS09-073 - Important


    Reason for Revision: V2.0 (January 13, 2010): Renamed the update
    packages formerly listed as Microsoft Office Word 2002
    Service Pack 3 (KB975008) and Microsoft Office Word 2003
    Service Pack 3 (KB975051) to Microsoft Office XP Service Pack
    3 (KB975008) and Microsoft Office 2003 Service Pack 3
    (KB975051), respectively. Added an Update FAQ to explain this
    bulletin-only change. There were no changes to the detection
    logic or the update files. Customers who have already
    successfully updated their systems do not need to take any action.
    - Originally posted: December 8, 2009
    - Updated: January 13, 2010
    - Bulletin Severity Rating: Important
    - Version: 2.0

    Revisions
    • V1.0 (December 8, 2009): Bulletin published.

    • V1.1 (December 9, 2009): Removed a redundant entry for the Microsoft Office Compatibility Pack from the non-affected software table. Also corrected several deployment reference tables to clarify that in some cases, this update does not require a restart. This is an informational change only.

    • V2.0 (January 13, 2010): Renamed the update packages formerly listed as Microsoft Office Word 2002 Service Pack 3 (KB975008) and Microsoft Office Word 2003 Service Pack 3 (KB975051) to Microsoft Office XP Service Pack 3 (KB975008) and Microsoft Office 2003 Service Pack 3 (KB975051), respectively. Added an Update FAQ to explain this bulletin-only change. There were no changes to the detection logic or the update files. Customers who have already successfully updated their systems do not need to take any action.

    http://www.microsoft.com/technet/security/bulletin/ms09-073.mspx
     
  18. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (979352)
    Vulnerability in Internet Explorer Could Allow Remote Code Execution
    Published: January 14, 2010


    General Information
    Executive Summary
    Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.

    Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are affected.

    The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.

    At this time, we are aware of limited, active attacks attempting to use this vulnerability against Internet Explorer 6. We have not seen attacks against other affected versions of Internet Explorer. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.

    We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we’re actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.

    Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.
    http://www.microsoft.com/technet/security/advisory/979352.mspx
     
  19. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (979352)
    Vulnerability in Internet Explorer Could Allow Remote Code Execution
    Published: January 14, 2010 | Updated: January 15, 2010


    Revisions
    • V1.0 (January 14, 2010): Advisory published

    • V1.1 (January 15, 2010): Revised Executive Summary to reflect invesigation of limited targeted attacks. Added Data Execution Protection (DEP) information to Mitigating Factors section. Updated "How does configuring the Internet zone security setting to High protect me from this vulnerability?" in the Frequently Asked Questions section.

    http://www.microsoft.com/technet/security/advisory/979352.mspx


    Assessing risk of IE 0day vulnerability
    Yesterday, the MSRC released Microsoft Security Advisory 979352 alerting customers to limited, sophisticated attacks targeting Internet Explorer 6 customers. Today, samples of that exploit were made publicly available.

    Before we get into the details I want to make one thing perfectly clear. The attacks we have seen to date, including the exploit released publicly, only affect customers using Internet Explorer 6. As discussed in the security advisory, while newer versions of Internet Explorer are affected by this vulnerability, mitigations exist that make exploitation much more difficult. We would like to share a little more information about both the vulnerability and the exploits we have seen to help you understand the risk to your organization.

    Risk, by platform


    Newer versions of Internet Explorer and later Windows releases are at reduced risk to the exploit we have seen due to platform mitigations explained in the blog post below. (Note: Server platforms are omitted from this table because browsing is less likely from Servers.)
    http://blogs.technet.com/srd/archive/2010/01/15/assessing-risk-of-ie-0day-vulnerability.aspx
     
  20. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Further Insight into Security Advisory 979352 and the Threat Landscape

    Sunday, January 17, 2010 7:58 PM by MSRCTEAM
    http://blogs.technet.com/msrc/archi...advisory-979352-and-the-threat-landscape.aspx
     
  21. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Monday, January 18, 2010 5:55 PM by MSRCTEAM
    Advisory 979352 Update for Monday January 18


    http://blogs.technet.com/msrc/archive/2010/01/18/advisory-979352-update-for-monday-january-18.aspx
     
  22. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (979352)
    Vulnerability in Internet Explorer Could Allow Remote Code Execution
    Published: January 14, 2010 | Updated: January 20, 2010

    Version: 1.2

    General Information
    Executive Summary
    Microsoft continues to investigate reports of limited attacks against customers of Internet Explorer 6, using a vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.

    Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are vulnerable.

    The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.

    At this time, we are aware of limited attacks attempting to use this vulnerability against Internet Explorer 6. We have not seen attacks against other versions of Internet Explorer. Due to increased attention and an escalating threat environment, we are planning to release an out-of-band security update for this vulnerability.

    We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we’re actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.

    Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.


    Revisions
    • V1.0 (January 14, 2010): Advisory published

    • V1.1 (January 15, 2010): Revised Executive Summary to reflect investigation of limited targeted attacks. Added Data Execution Prevention (DEP) information to Mitigating Factors section. Updated "How does configuring the Internet zone security setting to High protect me from this vulnerability?" in the Frequently Asked Questions section.

    • V1.2 (January 20, 2010): Revised Executive Summary to reflect the changing nature of attacks attempting to exploit the vulnerability. Clarified information in the Mitigating Factors section for Data Execution Prevention (DEP) and Microsoft Outlook, Outlook Express, and Windows Mail. Clarified several Frequently Asked Questions to provide further details about the vulnerability and ways to limit the possibility of exploitation. Added "Enable or disable ActiveX controls in Office 2007" and "Do not open unexpected files" to the Workarounds section.



    http://www.microsoft.com/technet/security/advisory/979352.mspx
     
  23. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (979682)

    Microsoft Security Advisory (979682)
    Vulnerability in Windows Kernel Could Allow Elevation of Privilege
    Published: January 20, 2010

    Version: 1.0

    General Information
    Executive Summary
    Microsoft is investigating new public reports of a vulnerability in the Windows kernel. We are not aware of attacks that try to use the reported vulnerability or of customer impact at this time.

    We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers.

    Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-band security update, depending on customer needs.
    http://www.microsoft.com/technet/security/advisory/979682.mspx
     
  24. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (980088)
    Vulnerability in Internet Explorer Could Allow Information Disclosure
    Published: February 03, 2010

    Version: 1.0

    Microsoft is investigating a publicly reported vulnerability in Internet Explorer for customers running Windows XP or who have disabled Internet Explorer Protected Mode. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.

    Our investigation so far has shown that if a user is using a version of Internet Explorer that is not running in Protected Mode an attacker may be able to access files with an already known filename and location. These versions include Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service 4; Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4; and Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, and Windows Server 2003 Service Pack 2. Protected Mode prevents exploitation of this vulnerability and is running by default for versions of Internet Explorer on Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008.

    The vulnerability exists due to content being forced to render incorrectly from local files in such a way that information can be exposed to malicious websites.

    At this time, we are unaware of any attacks attempting to use this vulnerability. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.

    We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we are actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.

    Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.
    http://www.microsoft.com/technet/security/advisory/980088.mspx


    Microsoft Security Advisory: Vulnerability in Internet Explorer could allow information disclosure
    http://support.microsoft.com/kb/980088
     
  25. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (981374)
    Vulnerability in Internet Explorer Could Allow Remote Code Execution
    Published: March 09, 2010
    http://www.microsoft.com/technet/security/advisory/981374.mspx

    Revisions•
    V1.0 (March 9, 2010): Advisory published.


    Microsoft Security Advisory (973811)
    Extended Protection for Authentication
    Published: August 11, 2009 | Updated: March 09, 2010
    http://www.microsoft.com/technet/security/advisory/973811.mspx

    Revisions: •
    V1.0 (August 11, 2009): Advisory published.

    V1.1 (October 14, 2009): Updated the FAQ with information about a non-security update included in MS09-054 relating to WinINET.

    V1.2 (December 8, 2009): Updated the FAQ with information about three non-security updates relating to Windows HTTP Services, HTTP Protocol Stack, and Internet Information Services.

    V1.3 (March 9, 2010): Updated the FAQ to announce the rerelease of the update that enables Internet Information Services to opt in to Extended Protection for Authentication. For more information, see Known issues in Microsoft Knowledge Base Article 973917.
     
  26. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Major Revisions

    ********************************************************************
    Title: Microsoft Security Bulletin Major Revisions
    Issued: March 9, 2010
    ********************************************************************

    Summary
    =======
    The following bulletins have undergone a major revision increment.
    Please see the appropriate bulletin for more details.

    * MS09-033 - Important

    Bulletin Information:
    =====================

    * MS09-033 - Important

    http://www.microsoft.com/technet/security/bulletin/ms09-033.mspx

    - Reason for Revision: V2.0 (March 9, 2010): Rereleased this
    bulletin to add Microsoft Virtual Server 2005 to affected
    software. No other update packages are affected by this rerelease.
    - Originally posted: July 14, 2009
    - Updated: March 9, 2010
    - Bulletin Severity Rating: Important
    - Version: 2.0
     
  27. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS10-025 - Critical
    Vulnerability in Microsoft Windows Media Services Could Allow Remote Code Execution (980858)
    Published: April 13, 2010 | Updated: April 21, 2010


    Revisions
    • V1.0 (April 13, 2010): Bulletin published.

    • V1.1 (April 14, 2010): Corrected the restart requirement for Microsoft Windows 2000 Server.

    • V2.0 (April 21, 2010): Revised bulletin to inform customers that the original security update did not protect systems from the vulnerability described in this bulletin. Microsoft recommends that customers apply one of the workarounds described in this bulletin to help mitigate the impact to affected systems until a revised security update is made available.

    http://www.microsoft.com/technet/security/bulletin/ms10-025.mspx
     
  28. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    http://blogs.technet.com/msrc/archive/2010/04/23/update-on-ms10-025.aspx

     
  29. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    MS10-025 - Critical

    Reason for Revision: V3.0 (April 27, 2010): Revised bulletin to

    offer the rereleased security update for Windows Media
    Services running on Microsoft Windows 2000 Server Service
    Pack 4. Microsoft recommends that customers running the
    affected software apply the rereleased security update immediately.
    - Originally posted: April 13, 2010
    - Updated: April 27, 2010
    - Bulletin Severity Rating: Critical
    - Version: 3.0

    http://www.microsoft.com/technet/security/bulletin/ms10-025.mspx
     
  30. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    ********************************************************************
    Title: Microsoft Security Bulletin Major Revision
    Issued: May 3, 2010
    ********************************************************************

    Summary
    =======
    The following bulletin has undergone a major revision increment.

    * MS10-016 - Important


    Bulletin Information:
    =====================

    * MS10-016 - Important
    http://blogs.technet.com/msrc/archive/2010/05/03/update-on-ms10-016-for-microsoft-producer.aspx

    - Reason for Revision: V2.0 (May 3, 2010): Corrected installation
    switches for Movie Maker 2.6 on Windows Vista and Windows 7.
    Also, announced availability of Microsoft Producer. Microsoft
    recommends that users of Microsoft Producer 2003 upgrade to
    the new version, Microsoft Producer.
    - Originally posted: March 9, 2010
    - Updated: May 3, 2010
    - Bulletin Severity Rating: Important
    - Version: 2.0
    Revisions
    • V1.0 (March 9, 2010): Bulletin published.

    • V1.1 (March 17, 2010): Corrected the registry keys in the workaround, Remove the Microsoft Producer 2003 .MSProducer, .MSProducerZ, and .MSProducerBF file associations.

    • V2.0 (May 3, 2010): Corrected installation switches for Movie Maker 2.6 on Windows Vista and Windows 7. Also, announced availability of Microsoft Producer. Microsoft recommends that users of Microsoft Producer 2003 upgrade to the new version, Microsoft Producer.

    .http://www.microsoft.com/technet/security/bulletin/ms10-016.mspx
     
  31. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  32. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS10-024 - Important
    Vulnerabilities in Microsoft Exchange and Windows SMTP Service Could Allow Denial of Service (981832)
    Published: April 13, 2010 | Updated: July 13, 2010

    Version: 2.0
    Revisions
    • V1.0 (April 13, 2010): Bulletin published.

    • V1.1 (April 14, 2010): Added an entry to the Update FAQ to clarify the Microsoft Exchange servicing model. Also corrected the Configuration Manager 2007 detection value for Microsoft Exchange Server 2000 Service Pack 3 and the installation switches for Microsoft Exchange Server 2000 Service Pack 3 and Microsoft Exchange Server 2003 Service Pack 2.

    • V1.2 (April 15, 2010): Added an entry in the Update FAQ to announce a detection change to the update for Microsoft Exchange Server 2000 Service Pack 3. This is a detection change only. There were no changes to the security update files in this bulletin. Customers who have already installed the update successfully do not need to reinstall.

    • V2.0 (July 13, 2010): Rereleased bulletin to reoffer the updates for Windows Server 2008 and Windows Server 2008 R2 to address the known issue listed in KB 976323.

    http://www.microsoft.com/technet/security/bulletin/ms10-024.mspx
     
  33. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS10-045 - Important
    Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution (978212)
    Published: July 13, 2010 | Updated: July 14, 2010

    Revisions


    V1.0 (July 13, 2010): Bulletin published.


    V1.1 (July 14, 2010): Added a link to Microsoft Knowledge Base Article 978212 under Known Issues in the Executive Summary.
    http://www.microsoft.com/technet/security/bulletin/MS10-045.mspx?pubDate=2010-07-14



    Microsoft Security Bulletin MS10-044 - Critical
    Vulnerabilities in Microsoft Office Access ActiveX Controls Could Allow Remote Code Execution (982335)
    Published: July 13, 2010 | Updated: July 14, 2010

    Revisions


    V1.0 (July 13, 2010): Bulletin published.


    V1.1 (July 14, 2010): Added a link to Microsoft Knowledge Base Article 982335 under Known Issues in the Executive Summary.
    http://www.microsoft.com/technet/security/bulletin/MS10-044.mspx?pubDate=2010-07-14



    Microsoft Security Bulletin MS10-043 - Critical
    Vulnerability in Canonical Display Driver Could Allow Remote Code Execution (2032276)
    Published: July 13, 2010 | Updated: July 14, 2010

    Revisions


    V1.0 (July 13, 2010): Bulletin published.


    V1.1 (July 14, 2010): Added an entry to the update FAQ to provide guidance for Windows 7 Service Pack 1 Beta and Windows Server 2008 R2 Service Pack 1 Beta releases. Also removed erroneous references to Windows Embedded Standard 7.
    http://www.microsoft.com/technet/security/bulletin/MS10-043.mspx?pubDate=2010-07-14
     
  34. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    http://blogs.technet.com/b/msrc/archive/2010/07/20/security-advisory.aspx

    Microsoft Security Advisory (2286198)
    Vulnerability in Windows Shell Could Allow Remote Code Execution
    Published: July 16, 2010 | Updated: July 20, 2010

    Revisions
    • V1.0 (July 16, 2010): Advisory published.

    • V1.1 (July 19, 2010): Clarified the vulnerability description and the "Is this a security vulnerability that requires Microsoft to issue a security update?" FAQ entry.

    • V1.2 (July 20, 2010): Clarified the vulnerability exploit description and updated the workarounds.

    http://www.microsoft.com/technet/security/advisory/2286198.mspx
     
  35. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Out-Of-Band Security Bulletin(s) - August 2, 2010

    Note: There may be latency issues due to replication, if the page does not display keep refreshing

    Today Microsoft released the following Out-of-Band Security Bulletin(s).

    Bulletin Summary:

    http://www.microsoft.com/technet/security/bulletin/ms10-aug.mspx


    Critical (1)

    Microsoft Security Bulletin MS10-046
    Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)
    http://www.microsoft.com/technet/security/bulletin/ms10-046.mspx
     
  36. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Summary for August 10, 2010

    Microsoft Security Bulletin Summary for August 10 2010
    Published: August 10 2010


    Note: There may be latency issues due to replication, if the page does not display keep refreshing


    Note: http://www.microsoft.com/technet/security and http://www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.


    Today Microsoft released the following Security Bulletin(s).

    Bulletin Summary:

    http://www.microsoft.com/technet/security/bulletin/ms10-aug.mspx


    Critical (9)
    Microsoft Security Bulletin MS10-046 - Critical
    Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)
    Published: August 02, 2010 | Updated: August 03, 2010
    http://www.microsoft.com/technet/security/bulletin/MS10-046.mspx


    Microsoft Security Bulletin MS10-049 - Critical
    Vulnerabilities in SChannel could allow Remote Code Execution (980436)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/bulletin/MS10-049.mspx


    Microsoft Security Bulletin MS10-051 - Critical
    Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)
    http://www.microsoft.com/technet/security/bulletin/ms10-051.mspx


    Microsoft Security Bulletin MS10-060 - Critical
    Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-060.mspx


    Microsoft Security Bulletin MS10-056 - Critical
    Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-056.mspx



    Microsoft Security Bulletin MS10-055 - Critical
    Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-055.mspx


    Microsoft Security Bulletin MS10-054 - Critical
    Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-054.mspx


    Microsoft Security Bulletin MS10-053 - Critical
    Cumulative Security Update for Internet Explorer (2183461)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-053.mspx


    Microsoft Security Bulletin MS10-052 - Critical
    Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution (2115168)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-052.mspx


    (Important (6)
    Microsoft Security Bulletin MS10-059 - Important
    Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-059.mspx


    Microsoft Security Bulletin MS10-058 - Important
    Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-058.mspx


    Microsoft Security Bulletin MS10-057 - Important
    Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-057.mspx

    Microsoft Security Bulletin MS10-047 - Important
    Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/bulletin/MS10-047.mspx


    Microsoft Security Bulletin MS10-048 - Important
    Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-048.mspx


    Microsoft Security Bulletin MS10-050 - Important
    Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (981997)
    Published: August 10, 2010
    http://www.microsoft.com/technet/security/Bulletin/MS10-050.mspx


    Moderate (0)



    Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

    As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

    Security Tool
    Find out if you are missing important Microsoft product updates by using MBSA.
     
  37. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  38. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Updates 08/18/10


    MS10-058 - Important: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886) - Version:1.1
    Severity Rating: Important - Revision Note: V1.1 (August 18, 2010): Added workaround for IPv6 Memory Corruption Vulnerability - CVE-2010-1892.

    Summary: This security update resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege due to an error in the processing of a specific input buffer. An attacker who is able to log on to the target system could exploit this vulnerability and run arbitrary code with system-level privileges. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

    Revisions


    V1.0 (August 10, 2010): Bulletin published.


    V1.1 (August 18, 2010): Added workaround for IPv6 Memory Corruption Vulnerability - CVE-2010-1892.

    http://www.microsoft.com/technet/security/bulletin/MS10-058.mspx?pubDate=2010-08-18


    MS10-055 - Critical: Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665) - Version:1.1
    Severity Rating: Critical - Revision Note: V1.1 (August 12, 2010): Added Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2 to the Non-Affected Software table.

    Summary: This security update resolves a privately reported vulnerability in Cinepak Codec. The vulnerability could allow remote code execution if a user opens a specially crafted media file or receives specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

    Revisions


    V1.0 (August 10, 2010): Bulletin published.


    V1.1 (August 12, 2010): Added Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2 to the Non-Affected Software table.


    http://www.microsoft.com/technet/security/bulletin/MS10-055.mspx?pubDate=2010-08-12
     
  39. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  40. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS10-056 - Critical
    Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)
    Published: August 10, 2010 | Updated: September 01, 2010

    Revisions


    V1.0 (August 10, 2010): Bulletin published.


    V1.1 (August 11, 2010): Corrected the update package names for Microsoft Office Word Viewer and Microsoft Office Compatibility Pack in the deployment reference tables. This is an informational change only. There were no changes to the security update files or detection logic.


    V1.2 (August 25, 2010): Added a link to Microsoft Knowledge Base Article 2269638 under Known Issues in the Executive Summary.


    V1.3 (September 1, 2010): Added note to the affected software table to inform customers using Word 2007 that in addition to security update package KB2251419, they also need to install the security update package KB2277947 to be protected from the vulnerabilities described in this bulletin.

    http://www.microsoft.com/technet/security/bulletin/MS10-056.mspx?pubDate=2010-09-01


    Microsoft Security Bulletin MS10-049 - Critical
    Vulnerabilities in SChannel could allow Remote Code Execution (980436)
    Published: August 10, 2010 | Updated: September 01, 2010

    Revisions


    V1.0 (August 10, 2010): Bulletin published.


    V1.1 (September 1, 2010): Corrected the bulletin replacement information for this update. This is an informational change only. There were no changes to the detection logic or the update files.

    http://www.microsoft.com/technet/security/bulletin/MS10-049.mspx?pubDate=2010-09-01
     
  41. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS10-050 - Important


    Microsoft Security Bulletin MS10-050 - Important
    Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (981997)
    Published: August 10, 2010 | Updated: September 15, 2010

    Revisions


    V1.0 (August 10, 2010): Bulletin published.


    V1.1 (August 11, 2010): Added a link to Microsoft Knowledge Base Article 981997 under Known Issues in the Executive Summary.


    V1.2 (September 15, 2010): Added a link to Microsoft Knowledge Base Article 981997 to provide an automated Microsoft Fix it solution for the workaround, Remove the Movie Maker .MSWMM file association.

    http://www.microsoft.com/technet/security/bulletin/MS10-050.mspx?pubDate=2010-09-15
     
  42. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

  43. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (2416728)
    Vulnerability in ASP.NET Could Allow Information Disclosure
    Published: September 17, 2010 | Updated: September 20, 2010

    Revisions
    • V1.0 (September 17, 2010): Advisory published.

    • V1.1 (September 20, 2010): Revised Executive Summary to communicate that Microsoft is aware of limited, active attacks. Also added additional entries to the Frequently Asked Questions section and additional clarification to the workaround.

    http://www.microsoft.com/technet/security/advisory/2416728.mspx
     
  44. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Advance Notification for September 2010
    Published: September 27, 2010

    Microsoft Security Bulletin Advance Notification issued: September 27, 2010
    Microsoft Security Bulletin to be issued: September 28, 2010

    This is an advance notification of one out-of-band security bulletin that Microsoft is intending to release on September 28, 2010. The bulletin addresses a security vulnerability in all supported releases of Microsoft Windows.

    This bulletin advance notification will be replaced with the September bulletin summary on September 28, 2010. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.

    To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications.

    Microsoft will host a webcast to address customer questions on the out-of-band bulletin on September 28, 2010, at 1:00 PM Pacific Time (US & Canada). Register now for the September 28, 1:00 PM webcast. Afterwards, this webcast is available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.
    http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx
     
  45. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member



    MS Out-of-Band Security Bulletin Summary for september 28, 2010

    Microsoft Security Bulletin Summary for september 2010
    Published: september 28, 2010


    Note: There may be latency issues due to replication, if the page does not display keep refreshing

    Note: »www.microsoft.com/technet/security and »www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

    Today Microsoft released the following Security Bulletin(s).

    Bulletin Summary:

    http://www.microsoft.com/technet/security/current.aspx

    Important (1)
    Microsoft Security Bulletin MS10-070 - Important
    Vulnerability in ASP.NET Could Allow Information Disclosure (2418042)
    Published: September 28, 2010
    http://www.microsoft.com/technet/security/bulletin/MS10-070.mspx




    The security update is fully tested and ready for release, but will be made available initially only on the Microsoft Download Center. This enables us to get the update out as quickly as possible, allowing administrators with enterprise installations, or end users who want to install this security update manually, the ability to test and update their systems immediately. We strongly encourage these customers to visit the Download Center, download the update, test it in their environment and deploy it as soon as possible.

    http://www.microsoft.com/downloads/en/default.aspx
     
  46. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Summary for October 12 2010

    Microsoft Security Bulletin Summary for October 12 2010
    Published: October 12 2010


    Note: There may be latency issues due to replication, if the page does not display keep refreshing


    Note: http://www.microsoft.com/technet/security and http://www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the Microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.


    Today Microsoft released the following Security Bulletin(s).

    Bulletin Summary:


    http://www.microsoft.com/technet/security/bulletin/ms10-oct.mspx

    Critical (4)
    Cumulative Security Update for Internet Explorer (2360131)
    http://go.microsoft.com/fwlink/?LinkId=202013

    Vulnerability in Media Player Network Sharing Service Could Allow Remote Code Execution (2281679)
    http://go.microsoft.com/fwlink/?LinkId=201722

    Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132)
    http://go.microsoft.com/fwlink/?LinkId=194560

    Vulnerability in .NET Framework Could Allow Remote Code Execution (2160841)
    http://go.microsoft.com/fwlink/?LinkId=201704

    Important (10)
    Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)
    http://go.microsoft.com/fwlink/?LinkID=202016

    Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)
    http://go.microsoft.com/fwlink/?LinkId=201093

    Vulnerabilities in the OpenType Font (OTF) Format Driver Could Allow Elevation of Privilege (2279986)
    http://go.microsoft.com/fwlink/?LinkId=201084

    Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2293194)
    http://go.microsoft.com/fwlink/?LinkId=201696

    Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2293211)
    http://go.microsoft.com/fwlink/?LinkId=200529

    Vulnerability in Windows Common Control Library Could Allow Remote Code Execution (2296011)
    http://go.microsoft.com/fwlink/?LinkId=201086

    Vulnerability in Windows Media Player Could Allow Remote Code Execution (2378111)
    http://go.microsoft.com/fwlink/?LinkId=201098

    Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution (2405882)
    http://go.microsoft.com/fwlink/?LinkId=190553

    Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (2360937)
    http://go.microsoft.com/fwlink/?LinkId=201720

    Vulnerability in SChannel Could Allow Denial of Service (2207566)
    http://go.microsoft.com/fwlink/?LinkId=201705



    Moderate (2)
    Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution (2387149)
    http://go.microsoft.com/fwlink/?LinkId=201703

    Vulnerability in Windows Shared Cluster Disks Could Allow Tampering (2294255)
    http://go.microsoft.com/fwlink/?LinkId=201721


    Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

    As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

    Security Tool
    Find out if you are missing important Microsoft product updates by using MBSA.
     
  47. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin MS10-077 - Critical
    Vulnerability in .NET Framework Could Allow Remote Code Execution (2160841)
    Published: October 12, 2010 | Updated: October 26, 2010

    Revisions
    • V1.0 (October 12, 2010): Bulletin published.

    • V1.1 (October 13, 2010): Changed the vulnerability severity rating for Windows Server 2008 and Windows Server 2008 R2 to Important. Also added a link to Microsoft Knowledge Base Article 2160841 under Known Issues in the Executive Summary, and revised the vulnerability mitigations.

    • V1.2 (October 26, 2010): Revised this bulletin to announce a detection change to fix an installation issue. This is a detection change only. There were no changes to the security update. Customers who have already installed the update successfully do not need to reinstall.

    http://www.microsoft.com/technet/security/bulletin/ms10-077.mspx
     
  48. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Advisory (2458511)
    Vulnerability in Internet Explorer Could Allow Remote Code Execution
    Published: November 03, 2010

    Version: 1.0

    General Information
    Executive Summary
    Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code execution. This advisory contains workarounds and mitigations for this issue.

    The vulnerability exists due to an invalid flag reference within Internet Explorer. It is possible under certain conditions for the invalid flag reference to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.

    At this time, we are aware of targeted attacks attempting to use this vulnerability. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.

    http://www.microsoft.com/technet/security/advisory/2458511.mspx
     
  49. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Summary for November 9 2010

    Microsoft Security Bulletin Summary for November 9 2010
    Published: November 9 2010


    Note: There may be latency issues due to replication, if the page does not display keep refreshing


    Note: http://www.microsoft.com/technet/security and http://www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the Microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.


    Today Microsoft released the following Security Bulletin(s).

    Bulletin Summary:

    http://www.microsoft.com/technet/security/bulletin/ms10-nov.mspx


    Critical (1)
    Microsoft Security Bulletin MS10-087 - Critical

    Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930)
    Published: November 09, 2010
    http://www.microsoft.com/technet/security/bulletin/MS10-087.mspx

    important (2)

    Microsoft Security Bulletin MS10-088 - Important

    Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (2293386)
    Published: November 09, 2010
    http://www.microsoft.com/technet/security/bulletin/ms10-088.mspx


    Microsoft Security Bulletin MS10-089 - Important
    Vulnerabilities in Forefront Unified Access Gateway (UAG) Could Allow Elevation of Privilege (2316074)
    Published: November 09, 2010
    http://www.microsoft.com/technet/security/bulletin/ms10-089.mspx


    Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

    As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

    Security Tool
    Find out if you are missing important Microsoft product updates by using MBSA.
     
  50. NICK ADSL UK

    NICK ADSL UK MajorGeeks Forum Administrator Staff Member

    Microsoft Security Bulletin Minor Revisions - Nov 17, 2010

    Issued: November 17, 2010

    Summary
    =======
    The following bulletins have undergone a minor revision increment.
    Please see the appropriate bulletin for more details.

    * MS10-088 - Important
    * MS10-087 - Critical

    Bulletin Information:
    =====================

    * MS10-088 - Important

    http://www.microsoft.com/technet/security/bulletin/ms10-088.mspx
    - Reason for Revision: V1.2 (November 17, 2010): Clarified that for
    Microsoft PowerPoint 2002 and Microsoft PowerPoint 2003,
    customers also need to install the Microsoft Office update
    provided in MS10-087 to be protected from the vulnerability
    described in CVE-2010-2573. This is an informational change
    only. Customers who have already successfully applied the
    MS10-087 and the MS10-088 updates do not need to take any action.
    - Originally posted: November 9, 2010
    - Updated: November 17, 2010
    - Bulletin Severity Rating: Important
    - Version: 1.2

    * MS10-087 - Critical

    http://www.microsoft.com/technet/security/bulletin/ms10-087.mspx
    - Reason for Revision: V1.1 (November 17, 2010): Corrected the
    severity table and vulnerability section to add CVE-2010-2573
    as a vulnerability addressed by this update. This is an
    informational change only.
    - Originally posted: November 9, 2010
    - Updated: November 17, 2010
    - Bulletin Severity Rating: Critical
    - Version: 1.1
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds