View Single Post
  #9  
Old October 10th 07, 04:58 AM posted to microsoft.public.win98.gen_discussion
MEB[_2_]
External Usenet User
 
Posts: 1,626
Default Office-VISTA firewall-Adobe Flash-other vulnerabilities - US-Cert-combined

Please note the potential issues as described within. Take due notice of
the linked materials.
Relates to IE (5 & 6), OE (5 & 6), Word (2000, 2002), and Office, which may
be used by
readers/9X users of this group.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA07-282A

Microsoft Updates for Multiple Vulnerabilities

Original release date: October 9, 2007
Last revised: --
Source: US-CERT

Systems Affected

* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Outlook Express and Windows Mail
* Microsoft Office
* Microsoft Office for Mac
* Microsoft SharePoint

Overview

Microsoft has released updates that address critical vulnerabilities
in Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook
Express and Windows Mail, Microsoft Office, Microsoft Office for Mac,
and Microsoft SharePoint. Exploitation of these vulnerabilities could
allow a remote, unauthenticated attacker to execute arbitrary code or
cause a denial of service on a vulnerable system.

I. Description

Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook
Express and Windows Mail, Microsoft Office, Microsoft Office for Mac,
and Microsoft SharePoint as part of the Microsoft Security Bulletin
Summary for October 2007. The most severe vulnerabilities could allow
a remote, unauthenticated attacker to execute arbitrary code or cause
a denial of service on a vulnerable system.

Further information about the vulnerabilities addressed by these
updates is available in the Vulnerability Notes Database.

II. Impact

A remote, unauthenticated attacker could execute arbitrary code on a
vulnerable system. An attacker may also be able to cause a denial of
service.

III. Solution

Apply updates from Microsoft

Microsoft has provided updates for these vulnerabilities in the
October 2007 security bulletins. The security bulletins describe any
known issues related to the updates. Administrators are encouraged to
note any known issues that are described in the bulletins and test for
any potentially adverse effects.

System administrators should consider using an automated patch
distribution system such as Windows Server Update Services (WSUS).

IV. References

* US-CERT Vulnerability Notes for Microsoft October 2007 updates -
http://www.kb.cert.org/vuls/byid?searchview&query=ms07-oct

* Microsoft Security Bulletin Summary for October 2007 -
http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx

* Microsoft Update - https://update.microsoft.com/microsoftupdate/

* Windows Server Update Services -

http://www.microsoft.com/windowsserversystem/updateservices/default.mspx

* Securing Your Web Browser -
http://www.cert.org/tech_tips/securing_browser/

* Mactopia - http://www.microsoft.com/mac/

__________________________________________________ __________________

The most recent version of this document can be found at:

http://www.us-cert.gov/cas/techalerts/TA07-282A.html
__________________________________________________ __________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to with "TA07-282A Feedback VU#569041" in the
subject.
__________________________________________________ __________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html.
__________________________________________________ __________________

Produced 2007 by US-CERT, a government organization.

Terms of use:

http://www.us-cert.gov/legal.html
__________________________________________________ __________________


Revision History

October 9, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRwvTGvRFkHkM87XOAQL0ZQgAhIOH3izST8xU1Xm3NQ 65FRJumacpXdOl
OtDoysTaQBZcQN+4OikFztqNZuJHVUVRLvRZKO6k6cOfYq8oaa DDzlGiJP3yfl/u
byveiGWdgCnr1RlQdM/GG7Wz2JGK/4WsXc1K1dvHclswyFSC9/sYV7Gmj/aPo6aW
T7fJBlQFE+ffy3/6sQ8fhtXP2dwJgQ2uT+UyaFvZiG65efH+qOXXmSBy2CkyV2zJ
rdTSUqhp5nVUChwl/jYjywUVAUUqEM69P0E4t5VtOdhNYIz5fZH4uuJ4M+HM451Z
T9kGF4wi94QM9xPZzcb0+mthBXa/zzQNT5mV5GcorKTzJpSIGmCZUQ==
=Xij6
-----END PGP SIGNATURE-----