US-CERT Technical Cyber Security Alert TA07-254A -- Microsoft Updates for Multiple Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                         National Cyber Alert System

		Technical Cyber Security Alert TA07-254A


Microsoft Updates for Multiple Vulnerabilities

   Original release date: September 11, 2007
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Windows
     * Microsoft Visual Studio
     * Microsoft Windows Services for Unix
     * Microsoft MSN Messenger


Overview

   Microsoft has released updates that address critical vulnerabilities
   in Microsoft Windows, Microsoft Visual Studio, Microsoft Windows
   Services for Unix, and Microsoft MSN Messenger. Exploitation of these
   vulnerabilities could allow a remote, unauthenticated attacker to
   execute arbitrary code or cause a denial of service on a vulnerable
   system.


I. Description

   Microsoft has released updates to address vulnerabilities that affect
   Microsoft Windows, Microsoft Visual Studio, Microsoft Windows Services
   for Unix and Microsoft MSN Messenger as part of the Microsoft Security
   Bulletin Summary for September 2007. The most severe vulnerabilities
   could allow a remote, unauthenticated attacker to execute arbitrary
   code or cause a denial of service on a vulnerable system.

   Further information about the vulnerabilities addressed by these
   updates is available in the Vulnerability Notes Database.


II. Impact

   A remote, unauthenticated attacker could execute arbitrary code on a
   vulnerable system. An attacker may also be able to cause a denial of
   service.


III. Solution

Apply updates from Microsoft

   Microsoft has provided updates for these vulnerabilities in the
   September 2007 security bulletins. The security bulletins describe any
   known issues related to the updates. Administrators are encouraged to
   note any known issues that are described in the bulletins and test for
   any potentially adverse effects.

   System administrators should consider using an automated patch
   distribution system such as Windows Server Update Services (WSUS).


IV. References

 * US-CERT Vulnerability Notes for Microsoft September 2007 updates - 
   <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-sep>

 * Microsoft Security Bulletin Summary for September 2007 -
   <http://www.microsoft.com/technet/security/bulletin/ms07-sep.mspx>
     
 * Microsoft Update - 
   <https://update.microsoft.com/microsoftupdate/>
     
 * Windows Server Update Services -
   <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>


 _________________________________________________________________    

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA07-254A.html>
 _________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@xxxxxxxx> with "TA07-254A Feedback VU#716872" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2007 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   September 11, 2007: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRubwtPRFkHkM87XOAQK+wwf/RTjTr3ndtczDA1D4n3f+0o5Nz1pJ/2PV
VL0YpmJaA1M0MKfQU9QhNvzZhQcIVfrk0kvTqod5J6zZ9IHmYyXRcdk0OEGQafIF
EVmljAf4i2rOkGqh9MbsRjeKClZ+V96oORTew9Ub2mtS1EWvnpWSRAaEYfdO6ZQZ
ix90Uj+2hF5D4dIiLoCSM0oYi9IgkoW68xYUuNUFaS/sx6utueHZGsjJpm0wgVfJ
7TH9BlZ3khOhDZyyKkPEe2csojnDk/D+163l25m4Uu18PDu7/1o1lGgImDte5SgZ
5aVnSg2Mr47zrB5We3vuxPVzV1t/v8jjmPEf0ELT+je6WZ+Rllgw1A==
=/2qY
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux