US-CERT Technical Cyber Security Alert TA07-282A -- Microsoft Updates for Multiple Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

		   National Cyber Alert System
	    
	    Technical Cyber Security Alert TA07-282A

Microsoft Updates for Multiple Vulnerabilities

   Original release date: October 9, 2007
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows
     * Microsoft Internet Explorer
     * Microsoft Outlook Express and Windows Mail
     * Microsoft Office
     * Microsoft Office for Mac
     * Microsoft SharePoint

Overview

   Microsoft has released updates that address critical vulnerabilities
   in Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook
   Express and Windows Mail, Microsoft Office, Microsoft Office for Mac,
   and Microsoft SharePoint. Exploitation of these vulnerabilities could
   allow a remote, unauthenticated attacker to execute arbitrary code or
   cause a denial of service on a vulnerable system.

I. Description

   Microsoft has released updates to address vulnerabilities that affect
   Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook
   Express and Windows Mail, Microsoft Office, Microsoft Office for Mac,
   and Microsoft SharePoint as part of the Microsoft Security Bulletin
   Summary for October 2007. The most severe vulnerabilities could allow
   a remote, unauthenticated attacker to execute arbitrary code or cause
   a denial of service on a vulnerable system.

   Further information about the vulnerabilities addressed by these
   updates is available in the Vulnerability Notes Database.

II. Impact

   A remote, unauthenticated attacker could execute arbitrary code on a
   vulnerable system. An attacker may also be able to cause a denial of
   service.

III. Solution

Apply updates from Microsoft

   Microsoft has provided updates for these vulnerabilities in the
   October 2007 security bulletins. The security bulletins describe any
   known issues related to the updates. Administrators are encouraged to
   note any known issues that are described in the bulletins and test for
   any potentially adverse effects.

   System administrators should consider using an automated patch
   distribution system such as Windows Server Update Services (WSUS).

IV. References

     * US-CERT Vulnerability Notes for Microsoft October 2007 updates -
       <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-oct>
     
     * Microsoft Security Bulletin Summary for October 2007 -
       <http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx>
     
     * Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
     
     * Windows Server Update Services -
       <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>
     
     * Securing Your Web Browser - <http://www.cert.org/tech_tips/securing_browser/>
     
     * Mactopia - <http://www.microsoft.com/mac/>
     
 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA07-282A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@xxxxxxxx> with "TA07-282A Feedback VU#569041" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2007 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   October 9, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRwvTGvRFkHkM87XOAQL0ZQgAhIOH3izST8xU1Xm3NQ65FRJumacpXdOl
OtDoysTaQBZcQN+4OikFztqNZuJHVUVRLvRZKO6k6cOfYq8oaaDDzlGiJP3yfl/u
byveiGWdgCnr1RlQdM/GG7Wz2JGK/4WsXc1K1dvHclswyFSC9/sYV7Gmj/aPo6aW
T7fJBlQFE+ffy3/6sQ8fhtXP2dwJgQ2uT+UyaFvZiG65efH+qOXXmSBy2CkyV2zJ
rdTSUqhp5nVUChwl/jYjywUVAUUqEM69P0E4t5VtOdhNYIz5fZH4uuJ4M+HM451Z
T9kGF4wi94QM9xPZzcb0+mthBXa/zzQNT5mV5GcorKTzJpSIGmCZUQ==
=Xij6
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux