April 2009 - Posts

Issued: April 29, 2009

Summary

The following bulletins have undergone a major revision increment.
Please see the appropriate bulletin for more details.

* MS09-012 - Important
* MS08-076 - Important
* MS08-069 - Critical

Bulletin Information:

* MS09-012 - Important

- http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx
- Reason for Revision: V2.0 (April 29, 2009): Added an entry to the
section, Frequently Asked Questions (FAQ) Related to This
Security Update to communicate the rerelease of the
Norwegian-language update for Microsoft Windows 2000 Service
Pack 4 (KB952004). Customers who require the
Norwegian-language update need to download and install the
rereleased update. No other updates or locales are affected
by this rerelease.
- Originally posted: April 14, 2009
- Updated: April 29, 2009
- Bulletin Severity Rating: Important
- Version: 2.0

* MS08-076 - Important

- http://www.microsoft.com/technet/security/bulletin/ms08-076.mspx
- Reason for Revision: V4.0 (April 29, 2009): Added Windows Media
Services 2008 (KB952068) on 32-bit and x64-based editions of
Windows Server 2008 Service Pack 2 as affected software.
Also, added Windows Server 2008 for Itanium-based Systems
Service Pack 2 as non-affected software. This is a detection
change only; there were no changes to the binaries. Customers
who have already successfully installed KB952068 do not need
to reinstall.
- Originally posted: December 9, 2008
- Updated: April 29, 2009
- Bulletin Severity Rating: Important
- Version: 4.0

* MS08-069 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms08-069.mspx
- Reason for Revision: V2.0 (April 29, 2009): Added Microsoft XML
Core Services 4.0 (KB954430) on 32-bit and x64-based editions
of Windows Vista Service Pack 2 and on 32-bit, x64-based, and
Itanium-based editions of Windows Server 2008 Service Pack 2
as affected software. Also added as non-affected software:
Microsoft XML Core Services 3.0 and Microsoft XML Core
Services 6.0 on 32-bit and x64-based editions of Windows
Vista Service Pack 2 and on 32-bit, x64-based, and
Itanium-based editions of Windows Server 2008 Service Pack 2.
This is a detection change only; there were no changes to the
binaries. Customers who have already successfully installed
KB954430 do not need to reinstall.
- Originally posted: November 11, 2008
- Updated: April 29, 2009
- Bulletin Severity Rating: Critical
- Version: 2.0

Issued: April 29, 2009

Summary

The following bulletins have undergone a minor revision increment.
Please see the appropriate bulletin for more details.

* MS09-013 - Critical

Bulletin Information:

* MS09-013 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms09-013.mspx
- Reason for Revision: V1.1 (April 29, 2009): Added entry to the
section, Frequently Asked Questions (FAQ) Related to This
Security Update, to communicate that the Known issues with
this security update section in the associated Microsoft
Knowledge Base Article 960803 has been updated. This is an
informational change only.
- Originally posted: April 14, 2009
- Updated: April 29, 2009
- Bulletin Severity Rating: Critical
- Version: 1.1

Issued: April 29, 2009

Security Advisories Updated or Released Today

* Microsoft Security Advisory (960715)
- Title: Update Rollup for ActiveX Kill Bits
- http://www.microsoft.com/technet/security/advisory/960715.mspx
- Revision Note: V1.1 (April 29, 2009): Added an entry to
Frequently Asked Questions to communicate that users with
Windows Server 2008 Server Core installation do not need to
install this update.

Issued: April 22, 2009

Summary

The following bulletins have undergone a minor revision increment.
Please see the appropriate bulletin for more details.

* MS09-016 - Important
* MS09-014 - Critical
* MS09-012 - Important
* MS09-011 - Critical
* MS09-009 - Critical

Bulletin Information:

* MS09-016 - Important

- http://www.microsoft.com/technet/security/bulletin/ms09-016.mspx
- Reason for Revision: V1.1 (April 22, 2009): Corrected registry
key verification entries in the deployment reference tables
for ISA Server 2004 and ISA Server 2006.
- Originally posted: April 14, 2009
- Updated: April 22, 2009
- Bulletin Severity Rating: Important
- Version: 1.1

* MS09-014 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms09-014.mspx
- Reason for Revision: V1.2 (April 22, 2009): Corrected the FAQ,
"Is it possible to enable the Internet Explorer
defense-in-depth protection for the blended threat
vulnerability on Microsoft Windows 2000" in the section,
Frequently Asked Questions (FAQ) Related to This Security Update.
- Originally posted: April 14, 2009
- Updated: April 22, 2009
- Bulletin Severity Rating: Critical
- Version: 1.2

* MS09-012 - Important

- http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx
- Reason for Revision: V1.2 (April 22, 2009): Added entry to the
section, Frequently Asked Questions (FAQ) Related to This
Security Update, to communicate that the Known issues with
this security update section referenced in the associated
Microsoft Knowledge Base Article 959454 has been updated.
This is an informational change only.
- Originally posted: April 14, 2009
- Updated: April 22, 2009
- Bulletin Severity Rating: Important
- Version: 1.2

* MS09-011 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms09-011.mspx
- Reason for Revision: V1.1 (April 22, 2009): Added Microsoft
Windows 2000 Service Pack 4 with DirectX 7.0 to the
Non-Affected Software table. This is an informational change only.
- Originally posted: April 14, 2009
- Updated: April 22, 2009
- Bulletin Severity Rating: Critical
- Version: 1.1

* MS09-009 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms09-009.mspx
- Reason for Revision: V1.1 (April 22, 2009): Added Excel Viewer
2003 Service Pack 3 to the MBSA and SMS tables in the
section, Detection and Deployment Tools and Guidance. This is
an informational change only. There were no changes to the
security update binaries or detection logic.
- Originally posted: April 14, 2009
- Updated: April 22, 2009
- Bulletin Severity Rating: Critical
- Version: 1.1

Fixed in Firefox 3.0.9

MFSA 2009-22 Firefox allows Refresh header to redirect to BLOCKED SCRIPT URIs

MFSA 2009-21 POST data sent to wrong site when saving web page with embedded frame

MFSA 2009-20 Malicious search plugins can inject code into arbitrary sites

MFSA 2009-19 Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString

MFSA 2009-18 XSS hazard using third-party stylesheets and XBL bindings

MFSA 2009-17 Same-origin violations when Adobe Flash loaded via view-source: scheme

MFSA 2009-16 jar: scheme ignores the content-disposition: header on the inner URI

MFSA 2009-15 URL spoofing with box drawing character

MFSA 2009-14 Crashes with evidence of memory corruption (rv:1.9.0.9)

Posted Wed, Apr 22 2009 6:50 by Don
Filed under:

Issued: April 16, 2009

Summary

The following bulletins have undergone a minor revision increment.
Please see the appropriate bulletin for more details.

* MS09-010 - Critical

Bulletin Information:

* MS09-010 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms09-010.mspx
- Reason for Revision: V1.1 (April 16, 2009): Added a warning
message to the workarounds for disabling the converters,
stating you must undo the workaround before installing this
security update. This is an informational change only.
- Originally posted: April 14, 2009
- Updated: April 16, 2009
- Bulletin Severity Rating: Critical
- Version: 1.1

Websense Security Labs™ ThreatSeeker™ Network has detected a new Waledac variant in the wild being distributed via email since yesterday.

The new campaign uses a theme whereby the user is enticed to download an application that will permit them to view other people's SMS messages online. The download file uses alternating filenames, including sms.exe, freetrial.exe, and smstrap.exe. ThreatSeeker has identified thousands of spam emails using this theme. 

Not all major antivirus vendors are currently detecting this threat according to this VirusTotal report.

Alert Details

Posted Thu, Apr 16 2009 7:07 by Don
Filed under:

Websense Security Labs™ ThreatSeeker™ Network has discovered a new Russian language spam campaign spreading widely by email, that lures users into downloading a fake SMS reader application.

We have received hundreds of these malicious emails through our HoneyPot system. The email messages are written in Russian and claim to introduce the latest version of their SMS Reader V4.0, which can download SMS messages to any mobile phone anonymously and automatically. At the end of the email they provide the link to download a free trial version which, when clicked, downloads a trojan file with MD5 104032f2a5789a2468fb47005ae256ee. See AV detection report here. Each spam email contains a URL link to a seemingly randomly-named executable hosted on Russian hosting servers.

Alert Details

Posted Thu, Apr 16 2009 7:05 by Don
Filed under:

Issued: April 15, 2009

Summary

The following bulletins have undergone a minor revision increment.
Please see the appropriate bulletin for more details.

* MS09-015 - Moderate
* MS09-014 - Critical
* MS09-012 - Important

Bulletin Information:

* MS09-015 - Moderate

- http://www.microsoft.com/technet/security/bulletin/ms09-015.mspx
- Reason for Revision: V1.1 (April 15, 2009): Added FAQs in the
section, Frequently Asked Questions (FAQ) Related to This
Security Update as well as in the Vulnerability section for
CVE-2008-2540 to explain the relationship between
CVE-2008-2540 in this bulletin and in MS09-014. Also added
Microsoft Knowledge Base Article 959426 as a reference for
instructions in implementing SetSearchPathMode in Microsoft
Windows 2000.
- Originally posted: April 14, 2009
- Updated: April 15, 2009
- Bulletin Severity Rating: Moderate
- Version: 1.1

* MS09-014 - Critical

- http://www.microsoft.com/technet/security/bulletin/ms09-014.mspx
- Reason for Revision: V1.1 (April 15, 2009): Added FAQs in the
section, Frequently Asked Questions (FAQ) Related to This
Security Update as well as in the Vulnerability section for
CVE-2008-2540 to explain the relationship between
CVE-2008-2540 in this bulletin and in MS09-015.
- Originally posted: April 14, 2009
- Updated: April 15, 2009
- Bulletin Severity Rating: Critical
- Version: 1.1

* MS09-012 - Important

- http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx
- Reason for Revision: V1.1 (April 15, 2009): Corrected the FAQ for
the Windows Thread Pool ACL Weakness Vulnerability
(CVE-2009-0080) to remove an erroneous "What does the update
do" entry. This is an informational change only.
- Originally posted: April 14, 2009
- Updated: April 15, 2009
- Bulletin Severity Rating: Important
- Version: 1.1

Oracle has released their Critical Patch Update for April 2009 to address 43 vulnerabilities across several products. This update contains the following security fixes:

  • 16 updates for Oracle Database Server
  • 12 updates for Oracle Application Server
  • 3 updates for Oracle Applications
  • 4 updates for Oracle PeopleSoft and JDEdwards Suite
  • 8 updates for BEA Products Suite

US-CERT encourages users and administrators to review the April Critical Patch Update and apply any necessary updates.

http://www.us-cert.gov/current/index.html#oracle_releases_critical_patch_update6

Issued: April 14, 2009

Security Advisories Updated or Released Today

* Microsoft Security Advisory (968272)
- Title: Vulnerability in Microsoft Office Excel
Could Allow Remote Code Execution
- http://www.microsoft.com/technet/security/advisory/968272.mspx
- Revision Note: V3.0 (April 14, 2009) Advisory updated to
reflect publication of security bulletin.

* Microsoft Security Advisory (960906)
- Title: Vulnerability in WordPad Text Converter
Could Allow Remote Code Execution
- http://www.microsoft.com/technet/security/advisory/960906.mspx
- Revision Note: V2.0 (April 14, 2009): Advisory updated to
reflect publication of security bulletin.

* Microsoft Security Advisory (953818)
- Title: Blended Threat from Combined Attack Using
Apple's Safari on the Windows Platform
- http://www.microsoft.com/technet/security/advisory/953818.mspx
- Revision Note: V2.0 (April 14, 2009): Added references and
links to MS09-014 and MS09-015, which address the issue in
this advisory.

* Microsoft Security Advisory (951306)
- Title: Vulnerability in Windows Could Allow
Elevation of Privilege
- http://www.microsoft.com/technet/security/advisory/951306.mspx
- Revision Note: V3.0 (April 14, 2009): Advisory updated to
reflect publication of security bulletin.

Event Overview

On April, 15, 2009, Microsoft releases its monthly security bulletins. Join us for a brief overview of the technical details of the April bulletins. We intend to address your concerns in this webcast, therefore, most of the webcast is devoted to attendees asking questions about the bulletins and getting answers from Microsoft security experts.

Presenters: Adrian Stone, Senior Security Program Manager Lead, Microsoft Corporation and Jerry Bryant, Senior Security Program Manager, Microsoft Corporation

Register Online

Posted Tue, Apr 14 2009 15:45 by Don
Filed under:

Updated: April 14, 2009

New Additions

We have added detection and cleaning capabilities for the following malicious software:

Waledac

See the complete list of malicious software cleaned by this tool.


http://www.microsoft.com/security/malwareremove/default.mspx

Posted Tue, Apr 14 2009 14:15 by Don
Filed under:

Note: There may be latency issues due to replication, if the page does not display keep refreshing

Today Microsoft released the following Security Bulletin(s).

Note: »www.microsoft.com/technet/security and »www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:

»www.microsoft.com/technet/securi···apr.mspx

Critical (5)

Microsoft Security Bulletin MS09-010
Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477)
»www.microsoft.com/technet/securi···010.mspx

Microsoft Security Bulletin MS09-013
Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)
»www.microsoft.com/technet/securi···013.mspx

Microsoft Security Bulletin MS09-011
Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (961373)
»www.microsoft.com/technet/securi···011.mspx

Microsoft Security Bulletin MS09-014
Cumulative Security Update for Internet Explorer (963027)
»www.microsoft.com/technet/securi···014.mspx

Microsoft Security Bulletin MS09-009
Vulnerabilities in Microsoft Office Excel Could Cause Remote Code Execution (968557)
»www.microsoft.com/technet/securi···009.mspx

Important (2)

Microsoft Security Bulletin MS09-012
Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)
»www.microsoft.com/technet/securi···012.mspx

Microsoft Security Bulletin MS09-016
Vulnerabilities in Microsoft ISA Server and Forefront Threat Management Gateway (Medium Business Edition) Could Cause Denial of Service (961759)
»www.microsoft.com/technet/securi···016.mspx

Moderate (1)

Microsoft Security Bulletin MS09-015
Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)
»www.microsoft.com/technet/securi···015.mspx

Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

Security Tool
Find out if you are missing important Microsoft product updates by using MBSA

.

A Web worm and three variants spread to hundreds of user accounts on Twitter's microblogging network over the weekend, producing upwards of 10,000 posts, or "tweets," to other users, the company stated on Sunday.

The worms, which started spreading at 2 a.m. on Saturday morning, used a Javascript exploit to take advantage of a cross-site scripting (XSS) vulnerability in Twitter, infecting users' profiles with malicious code. The compromised accounts then sent out their own messages to further spread the worm.

http://www.securityfocus.com/brief/945

Posted Tue, Apr 14 2009 7:44 by Don
Filed under:

Issued: April 9, 2009

This is an advance notification of security bulletins that
Microsoft is intending to release on April 14, 2009.

The full version of the Microsoft Security Bulletin Advance
Notification for April 2009 can be found at
http://www.microsoft.com/technet/security/bulletin/ms09-apr.mspx.

This bulletin advance notification will be replaced with the
April bulletin summary on April 14, 2009. For more information
about the bulletin advance notification service, see
http://www.microsoft.com/technet/security/Bulletin/advance.mspx.

To receive automatic notifications whenever Microsoft Security
Bulletins are issued, subscribe to Microsoft Technical Security
Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

Microsoft will host a webcast to address customer questions on
these bulletins on Wednesday, April 15, 2009,
at 11:00 AM Pacific Time (US & Canada). Register for the April
Security Bulletin Webcast at
http://www.microsoft.com/technet/security/bulletin/summary.mspx.

The security bulletins for this month are as
follows, in order of severity:

Critical Security Bulletins

Windows 1 Bulletin

- Affected Software:
- Microsoft Windows 2000 Service Pack 4
- Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
- Microsoft Office Word 2000 Service Pack 3
- Microsoft Office Word 2002 Service Pack 3
- Microsoft Office Converter Pack

- Impact: Remote Code Execution
- Version Number: 1.0

Windows 2 Bulletin

- Affected Software:
- Microsoft Windows 2000 Service Pack 4
- Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista and
Windows Vista Service Pack 1
- Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation affected)
- Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation affected)
- Windows Server 2008 for Itanium-based Systems

- Impact: Remote Code Execution
- Version Number: 1.0

Windows 3 Bulletin

- Affected Software:
- DirectX 8.1 on Microsoft Windows 2000 Service Pack 4
- DirectX 9.0 on Microsoft Windows 2000 Service Pack 4
- DirectX 9.0 on Windows XP Service Pack 2 and
Windows XP Service Pack 3
- DirectX 9.0 on Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- DirectX 9.0 on Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- DirectX 9.0 on Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- DirectX 9.0 on
Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
Note: The update for DirectX 9.0 also applies to DirectX 9.0a,
DirectX 9.0b, and DirectX 9.0c

- Impact: Remote Code Execution
- Version Number: 1.0

IE Bulletin

- Affected Software:
- Internet Explorer 5.01 Service Pack 4 when installed on
Microsoft Windows 2000 Service Pack 4
- Internet Explorer 6 Service Pack 1 when installed on
Microsoft Windows 2000 Service Pack 4
- Internet Explorer 6 for
Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Internet Explorer 6 for
Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Internet Explorer 6 for
Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Internet Explorer 6 for
Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Internet Explorer 6 for
Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
- Internet Explorer 7 for
Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Internet Explorer 7 for
Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Internet Explorer 7 for
Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Internet Explorer 7 for
Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Internet Explorer 7 for
Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
- Internet Explorer 7 in
Windows Vista and
Windows Vista Service Pack 1
- Internet Explorer 7 in
Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Internet Explorer 7 in
Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation not affected)
- Internet Explorer 7 in
Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation not affected)
- Internet Explorer 7 in
Windows Server 2008 for Itanium-based Systems

- Impact: Remote Code Execution
- Version Number: 1.0

Excel Bulletin

- Affected Software:
- Microsoft Office Excel 2000 Service Pack 3
- Microsoft Office Excel 2002 Service Pack 3
- Microsoft Office Excel 2003 Service Pack 3
- Microsoft Office Excel 2007 Service Pack 1
- Microsoft Office 2004 for Mac
- Microsoft Office 2008 for Mac
- Microsoft Office Excel Viewer 2003 Service Pack 3
- Microsoft Office Excel Viewer
- Microsoft Office Compatibility Pack for Word, Excel, and
PowerPoint 2007 File Formats Service Pack 1
Note: For Microsoft Office Excel 2007 Service Pack 1, customers
also need to install the security update for Microsoft Office
Compatibility Pack for Word, Excel, and PowerPoint 2007 File
Formats Service Pack 1 to be protected from the vulnerabilities
described in this bulletin

- Impact: Remote Code Execution
- Version Number: 1.0

Important Security Bulletins

Windows 4 Bulletin

- Affected Software:
- Microsoft Windows 2000 Service Pack 4
- Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista and
Windows Vista Service Pack 1
- Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation affected)
- Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation affected)
- Windows Server 2008 for Itanium-based Systems

- Impact: Elevation of Privilege
- Version Number: 1.0


ISA Bulletin

- Affected Software:
- Microsoft Forefront Threat Management Gateway,
Medium Business Edition
(Delivered both as a standalone product and as a component of
Windows Essential Business Server 2008)
- Microsoft Internet Security and Acceleration Server 2004
Standard Edition Service Pack 3
(Delivered as a standalone product. Also delivered as a
component of Windows Small Business Server Enterprise Edition
Service Pack 1 and
Windows Small Business Server 2003 R2 Enterprise Edition)
- Microsoft Internet Security and Acceleration Server 2004
Enterprise Edition Service Pack 3
- Microsoft Internet Security and Acceleration Server 2006
- Microsoft Internet Security and Acceleration Server 2006
Supportability Update
- Microsoft Internet Security and Acceleration Server 2006
Service Pack 1

- Impact: Denial of Service
- Version Number: 1.0

Moderate Security Bulletins

Windows 5 Bulletin

- Affected Software:
- Microsoft Windows 2000 Service Pack 4
- Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista and
Windows Vista Service Pack 1
- Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation affected)
- Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation affected)
- Windows Server 2008 for Itanium-based Systems

- Impact: Elevation of Privilege
- Version Number: 1.0


Other Information

Microsoft Windows Malicious Software Removal Tool:

Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services, and the Download Center.

Non-Security, High-Priority Updates on MU, WU, and WSUS:

For information about non-security releases on Windows Update and Microsoft
update, please see:
* http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
Article 894199, Description of Software Update Services and
Windows Server Update Services changes in content.
Includes all Windows content.
* http://technet.microsoft.com/en-us/wsus/bb466214.aspx: New,
Revised, and Released Updates for Microsoft Products Other Than
Microsoft Windows

Cisco has released a security advisory to address multiple vulnerabilities in the ASA Adaptive Security Appliance and PIX Security Appliances. These vulnerabilities may allow an attacker to bypass authentication mechanisms, bypass access control lists, or cause a denial-of-service condition.

US-CERT encourages users and administrators to review Cisco security advisory cisco-sa-20090408-asa and apply any necessary updates or workarounds to help mitigate the risks.

Cisco Advisory

Websense Security Labs™ ThreatSeeker™ Network has noticed that a new spam campaign aimed at Match.com is being used to spread a trojan called Papras over the Internet.

Full Alert

Posted Wed, Apr 8 2009 6:59 by Don
Filed under:

Issued: April 2, 2009

Security Advisories Updated or Released Today

* Microsoft Security Advisory (969136)
- Title: Vulnerability in Microsoft Office PowerPoint
Could Allow Remote Code Execution
- http://www.microsoft.com/technet/security/advisory/969136.mspx
- Revision Note: Advisory published

Issued: April 2, 2009

Summary

The following bulletins have undergone a minor revision increment.
Please see the appropriate bulletin for more details.

* MS08-032 - Moderate

Bulletin Information:

* MS08-032 - Moderate

- http://www.microsoft.com/technet/security/bulletin/ms08-032.mspx
- Reason for Revision: V1.1 (April 1, 2009): Clarified in
footnotes under the Affected Software and Severity Ratings
tables that Windows Server 2008 server core installations are
not affected by the vulnerability discussed in this bulletin,
but will still be offered this update. Added an entry in the
section, Frequently Asked Questions (FAQ) Related to This
Security Update, to reiterate that such installations do not
need to install this update.
- Originally posted: June 10, 2008
- Updated: April 1, 2009
- Bulletin Severity Rating: Moderate
- Version: 1.1

More Posts Next page »