Microsoft Security Bulletin for December 14, 2004

Discussion in 'other security issues & news' started by NICK ADSL UK, Dec 14, 2004.

Thread Status:
Not open for further replies.
  1. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,502
    Location:
    UK
    Microsoft Security Bulletin(s) for 12/14/04

    Microsoft Security Bulletin(s) for 12/14/04

    December 14, 2004
    Today Microsoft released the following Security Bulletin(s).

    Note: www.microsoft.com/technet/security and
    www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summary:
    http://www.microsoft.com/technet/security/Bulletin/ms04-dec.mspx

    Important Bulletins:

    Vulnerability in WordPad Could Allow Code Execution (885836)
    http://www.microsoft.com/technet/security/Bulletin/ms04-041.mspx

    Vulnerability in DHCP Could Allow Remote Code Execution and Denial of Service (885249)
    http://www.microsoft.com/technet/security/Bulletin/ms04-042.mspx

    Vulnerability in HyperTerminal Could Allow Code Execution (873339)
    http://www.microsoft.com/technet/security/Bulletin/ms04-043.mspx

    Vulnerabilities in Windows Kernel and LSASS Could Allow Elevation of Privilege (885835)
    http://www.microsoft.com/technet/security/Bulletin/ms04-044.mspx

    Vulnerability in WINS Could Allow Remote Code Execution (870763)
    http://www.microsoft.com/technet/security/Bulletin/ms04-045.mspx

    Re-released Bulletins:

    Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution (833987)
    http://www.microsoft.com/technet/security/Bulletin/ms04-028.mspx

    This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety [1-866-727-2338]International customers should contact their local subsidiary.
     
  2. bigbuck

    bigbuck Registered Member

    Joined:
    Jul 7, 2004
    Posts:
    4,877
    Location:
    Qld, Aus
    New updates 14/12/04
     

    Attached Files:

    Last edited by a moderator: Dec 14, 2004
  3. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,502
    Location:
    UK
    Microsoft Security Bulletin for December 14, 2004
     
  4. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,502
    Location:
    UK
    Critical Update for Windows XP Service Pack 2
    Microsoft Corp. has quietly released a "critical" Windows XP Service Pack 2 update to fix a serious flaw in the Windows Firewall utility.

    Please note this was not issued in the Bulletin for 12/14/04. It is However a critical update and for further information regarding this update can be found here. http://support.microsoft.com/kb/886185


    You can also download this update from here>>>>>
    http://www.microsoft.com/downloads/...ac-55ca-4591-b3e6-d78695899141&displaylang=en


    There was also a optional update if you are using outlook express
     
    Last edited: Dec 16, 2004
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.