If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
Office-VISTA firewall-Adobe Flash-other vulnerabilities - US-Cert-combined
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 National Cyber Alert System Cyber Security Alert SA07-191A Microsoft Updates for Multiple Vulnerabilities Original release date: July 12, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Office Overview Vulnerabilities in Microsoft Windows and Office could allow an attacker to gain control of your computer. Solution Install updates Microsoft has released updates to remedy vulnerabilities in Microsoft Windows and Office. To obtain these updates, visit the Microsoft Update web site. We also recommend enabling Automatic Updates. Description Vulnerabilities in Microsoft Windows and Office may allow an attacker to access your computer, install and run malicious software on your computer, or cause it to crash. More technical information is available in US-CERT Technical Cyber Security Alert TA07-191A. References * US-CERT Technical Cyber Security Alert TA07-191A - http://www.us-cert.gov/cas/techalerts/TA07-191A.html * Vulnerability Notes for Microsoft July 2007 updates - http://www.kb.cert.org/vuls/byid?searchview&query=ms07-Jul * Microsoft security updates for July 2007 - http://www.microsoft.com/protect/computer/updates/bulletins/200707.mspx * Microsoft Security at Home - http://www.microsoft.com/protect/ * Microsoft Update - https://update.microsoft.com/microsoftupdate/ * Microsoft Automatic Updates - http://www.microsoft.com/athome/secu..._current.mspx# EZB * Microsoft Security at Home - http://www.microsoft.com/protect/ * Microsoft Update - https://update.microsoft.com/microsoftupdate/ * Microsoft Automatic Updates - http://www.microsoft.com/athome/secu..._current.mspx# EZB __________________________________________________ _______________ The most recent version of this document can be found at: http://www.us-cert.gov/cas/alerts/SA07-191A.html __________________________________________________ _______________ Feedback can be directed to US-CERT Technical Staff. Please send email to with "SA07-191A Feedback VU#487905" in the subject. __________________________________________________ ______________ For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html. __________________________________________________ ______________ Produced 2007 by US-CERT, a government organization. Terms of use Terms of use: http://www.us-cert.gov/legal.html __________________________________________________ _______________ Revision History July 10, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpPqPvRFkHkM87XOAQIR7Qf/dB6eCYQn5pxrAHCEXP5edkpi3ZZiqdC0 omCvDyVgmDVfrs/ZE1yk0qLgQxR8TU9J4hnBdbIRNhsP+cRmr//fj8qvvU4IlI/X S/tY/o0pP8GEsJrFfpcSXuh0TMme4Vyw+V6mOwBzHiHS1LEmclQ954d grmbsJEER 35rtshZCSlKj98X0QXUT5Ev31F9ELcn1qcg5rv8a3tfefzzF5i Rshmhd8d06W2GL c7okyBZapeOYhjlaGjkVlex8kF75e+F3CcLplj551awCwRM0Wj iHWKIuePcYEES1 BIpAaVmsVWEdvvq7ybBq2MMXDFNxNPKSaMrQcVjCqQ1zCR3lmk XMcw== =Fg+7 -----END PGP SIGNATURE----- ******* -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-191A Microsoft Updates for Multiple Vulnerabilities Original release date: July 10, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Excel * Microsoft Publisher * Microsoft .NET Framework * Microsoft Internet Information Services (IIS) * Microsoft Windows Vista Firewall Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Excel, Publisher, .NET Framework, Internet Information Services, and Windows Vista Firewall. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system. I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Excel, Publisher, .NET Framework, Internet Information Services, and Windows Vista Firewall as part of the Microsoft Security Bulletin Summary for July 2007. The most severe vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system. Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database II. Impact A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the July 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects. System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft July 2007 updates - http://www.kb.cert.org/vuls/byid?searchview&query=ms07-jul * Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/ * Microsoft Security Bulletin Summary for July 2007 - http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx * Microsoft Update - https://update.microsoft.com/microsoftupdate/ * Microsoft Office Update - http://officeupdate.microsoft.com/ * Windows Server Update Services - http://www.microsoft.com/windowsserversystem/updateservices/default.mspx __________________________________________________ __________________ The most recent version of this document can be found at: http://www.us-cert.gov/cas/techalerts/TA07-191A.html __________________________________________________ __________________ Feedback can be directed to US-CERT Technical Staff. Please send email to with "TA07-191A Feedback VU#487905" in the subject. __________________________________________________ __________________ For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html. __________________________________________________ __________________ Produced 2007 by US-CERT, a government organization. Terms of use: http://www.us-cert.gov/legal.html __________________________________________________ __________________ Revision History July 10, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpPwhvRFkHkM87XOAQKWiQf/XFpYurcCFZ1qG700NatqdY7wL6pO4qbv hGzdzUJH+aRN7b6XaEE/ZLprWnyj2H8HbH+HAHOuKDOxBI7N6PQ4WPaeZ14tDsNP pNFg81LjE5Hlj6h5N2p8XML3t/4X7a7wk5YB7nhiBdisxAJ7iNjQ1BawjTlA9/kl dTaIRW2njHpupGLWuin60U/di12jI3JirgJHfiRK6Ruiqnv56rM7LS9IOT1HV5RR 0otIr1Dttdnmgveb0YOiz7A36nwMiCEUzcUu2rKzARpZ4gMBIr SbfkAJpyUE0w3K WMh1tgEt3fooTgvBUhpDjfxbMNka85wGbpizcsKnw6VVzIQAlr 0y3Q== =FRhW -----END PGP SIGNATURE----- ***** -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-192A Adobe Flash Player Updates for Multiple Vulnerabilities Original release date: July 11, 2007 Last revised: -- Source: US-CERT Systems Affected Microsoft Windows, Apple Mac OS X, Linux, Solaris, or other operating systems with any of the following Adobe products installed: * Flash Player 9.0.45.0 * Flash Player 9.0.45.0 and earlier network distribution * Flash Basic * Flash CS3 Professional * Flash Professional 8, Flash Basic * Flex 2.0 * Flash Player 7.070.0 for Linux or Solaris For more complete information, refer to Adobe Security Bulletin APSB07-12. Overview There are critical vulnerabilities in Adobe Flash player and related software. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system. I. Description Adobe Security Bulletin APSB07-12 addresses vulnerabilities in Adobe Flash Player and related software. Further information is available in the US-CERT Vulnerability Notes database. Several operating systems, including Microsoft Windows and Apple OS X, have vulnerable versions of Flash installed by default. Systems with Flash-enabled web browsers are vulnerable. To exploit these vulnerabilities, an attacker could host a specially crafted Flash file on a web site and convince a user to visit the site. II. Impact A remote, unauthenticated attacker could execute arbitrary code with the privileges of the user, steal credentials, or create a denial-of-service condition. If the user is logged on with administrative privileges, the attacker could take complete control of an affected system. III. Solution Apply Updates Check with your vendor for patches or updates. For information about a specific vendor, please see the Systems Affected section in the vulnerability notes or contact your vendor directly. If you get the flash player from Adobe, see the Adobe Get Flash page for information about updates. Disable Flash Users who are unable to apply the patch should disable Flash. Contact your vendor or see the US-CERT Vulnerability Notes VU#110297, VU#730785, or VU#138457 for more details. Appendix A. References * Adobe - APSB07-12: Flash Player update available to address security vulnerabilities - http://www.adobe.com/support/security/bulletins/apsb07-12.html * US-CERT Vulnerability Notes Database - http://www.kb.cert.org/vuls/byid?sea...,VU%2323110297 ,VU%23730785 __________________________________________________ _______________ The most recent version of this document can be found at: http://www.us-cert.gov/cas/techalerts/TA07-192A.html __________________________________________________ _______________ Feedback can be directed to US-CERT Technical Staff. Please send email to with "TA07-192A Feedback VU#730785" in the subject. __________________________________________________ _______________ For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html. __________________________________________________ _______________ Produced 2007 by US-CERT, a government organization. Terms of use Terms of use: http://www.us-cert.gov/legal.html __________________________________________________ _______________ Revision History July 11, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRpU9ffRFkHkM87XOAQKltggAm5ZRfQ8tfM+0WGcNtM PCxjHyWfX3VNNt 8Q6rkAkft8LcP0ek7dRs4kxfvEz4RHWmT+6J/tUeG/X8DoBZKcjbe/c/Vh0gLQYN xKlAUXGjThWuTeoUmKwZkDQTdlwR1Y3E/LpjUKxoErANuLsgsHQkyvM8lDw+qBY6 TzynZFOSR0ZNjS7IpP945dkaFEbxY5gYGYi19/0FbgRMfcMLEkSmOrWIc5n58U1U IOQ/1gtZIWsNBR50Xrjs6avfSHNR7kTYXSMoSupZkuBGoapwwmYp/cVh1KPYJRjt jc0IaQbcGA80o22TJ1yyYroF8x5oUVpzLqJBcZSJLHWUMSXxB4 Bv3g== =yQt6 -----END PGP SIGNATURE----- |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
us.cert.gov bulletin - Vulnerability Summary for the Week of May 14, 2007 | MEB | General | 0 | May 22nd 07 01:32 AM |
How to get rid of Adobe Flash Player 9 security warnings? | mistral | General | 8 | September 12th 06 10:16 AM |
New IE vulnerabilities | Dan | General | 7 | May 3rd 06 06:17 PM |
unpatched Critical vulnerabilities in Win 98 98SE? | Dan | General | 0 | February 13th 05 04:02 PM |
cert. of authenticity for windows xp | sue | General | 1 | May 20th 04 09:11 PM |