US-CERT Technical Cyber Security Alert TA09-013A -- Microsoft Updates for Multiple SMB Protocol Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                     National Cyber Alert System

               Technical Cyber Security Alert TA09-013A


Microsoft Updates for Multiple SMB Protocol Vulnerabilities

   Original release date: January 13, 2009
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Windows 2000, XP, and Vista
     * Microsoft Windows Server 2000, 2003, and 2008


Overview

   Microsoft has released updates that address vulnerabilities in
   Microsoft Windows and Windows Server.


I. Description

   In their bulletin for January 2009, Microsoft released updates to
   address vulnerabilities in the Server Message Block (SMB) Protocol
   that affects all supported versions Microsoft Windows.


II. Impact

   A remote, unauthenticated attacker could gain elevated privileges,
   execute arbitrary code, or cause a denial of service.


III. Solution

   Microsoft has provided updates for this vulnerability in the
   Microsoft Security Bulletin Summary for January 2009. The security
   bulletin describes any known issues related to the
   updates. Administrators are encouraged to note these issues and
   test for any potentially adverse effects.  Administrators should
   also consider using an automated update distribution system such as
   Windows Server Update Services (WSUS).


IV. References

     * Microsoft Security Bulletin Summary for January 2009 -
       <http://www.microsoft.com/technet/security/bulletin/ms09-jan.mspx>

     * Microsoft Windows Server Update Services -
       <http://technet.microsoft.com/en-us/wsus/default.aspx>



 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA09-013A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@xxxxxxxx> with "TA09-013A Feedback VU#914388" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2009 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   January 13, 2009: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSW0bDnIHljM+H4irAQLx0Af/b03sL+OgksDzO95k6jApkaMunERyHGu+
e4W4KRZ8e6felHu8bqRlXfiPbJgCXn9JkUPfc+GwhBS0q5QXmLmygLZiSP2KyQFW
u2Px2X60OyDveK3Qhl9vd09tmcw1iQYkoq+II7PcmErDwMww8ya/0d+KCBTiB73j
8kf5Odb3aD10iOqwCjJO8N8mq2T1vjb332qnhHLAZFaWArgyE1E8Dukmz6gVT84l
mSkQYObCoPIdaUsQgNrOh7pz2TjnI0PCzZoBHmV1ItF8W9vXmTQ1tCPDGHnSCe9q
TdjD+UlnowZ4Q8Vnh/XPrUU6IG6CH0lyN2GMBLsgEfnY4DrSmrvLeA==
=lISj
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux