Microsoft Security Bulletins for August 9, 2005

Discussion in 'other security issues & news' started by FanJ, Aug 9, 2005.

Thread Status:
Not open for further replies.
  1. FanJ

    FanJ Guest

    Quoting Melissa Travers, Microsoft Corp, MVP Lead Security

    Quoted from here

    ==========

    August 9, 2005
    Today Microsoft released the following Security Bulletin(s).

    Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

    Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

    Bulletin Summary:

    http://www.microsoft.com/technet/security/Bulletin/ms05-Aug.mspx

    Critical Bulletins:

    Cumulative Security Update for Internet Explorer (896727)
    http://www.microsoft.com/technet/security/Bulletin/ms05-038.mspx

    Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege (89958:cool:
    http://www.microsoft.com/technet/security/Bulletin/ms05-039.mspx

    Vulnerability in Print Spooler Service Could Allow Remote Code Execution (896423)
    http://www.microsoft.com/technet/security/Bulletin/ms05-043.mspx

    Important Bulletins:

    Vulnerability in Telephony Service Could Allow Remote Code Execution (893756)
    http://www.microsoft.com/technet/security/Bulletin/ms05-040.mspx

    Moderate Bulletins:

    Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (899591)
    http://www.microsoft.com/technet/security/Bulletin/ms05-041.mspx

    Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587)
    http://www.microsoft.com/technet/security/Bulletin/ms05-042.mspx

    Re-Released Bulletins:

    Vulnerabilities in Microsoft Word May Lead to Remote Code Execution (890169)
    http://www.microsoft.com/technet/security/Bulletin/ms05-023.mspx

    Vulnerability in Microsoft Agent Could Allow Spoofing (890046)
    (890169) http://www.microsoft.com/technet/security/Bulletin/ms05-032.mspx

    This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety (1-866-727-233:cool:. International customers should contact their local subsidiary.

    Melissa Travers
    Microsoft Corp
    MVP Lead Security
     
  2. Paul2

    Paul2 Guest

    Microsoft Malicious Software Removal Tool 1.7.1

    This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. This tool will help to remove specific, prevalent malicious software from infected systems. Because computers can appear to function normally when infected, Microsoft advises you to run this tool even if your computer seems to be fine. In addition to using this tool, you should use an up-to-date antivirus product to help protect your computer from other malicious software. For more information, see Protect Your PC. A new version of this tool is released on the second Tuesday of every month. These new versions will be available from the Microsoft Download Center—this page—as well as from Windows Update / Automatic Updates. An online version of the tool is also available. It is recommended that Windows XP users use Windows Update / Automatic Updates to download the tool. If you are using any other version of Windows for which this tool is supported, please download the tool from this page or run the online version of the tool at least once a month to ensure that you are using the latest version of this software.

    http://www.klitetools.com/comments.php?catid=89&shownews=1387

    http://www.microsoft.com/downloads/...e0-e72d-4f54-9ab3-75b8eb148356&DisplayLang=en
     
  3. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    For further information with regards this Microsoft Windows Malicious Software Removal Tool which remove specific, prevalent malicious software from computers that are running Windows Server 2003, Windows XP, or Windows 2000 can be found here
    http://support.microsoft.com/?kbid=890830


    Also please note this Microsoft® Windows® Malicious Software Removal Tool (KB890830) tool was updated yesterday the 17th to include additional protection for the Zotob worm which started spreading on Sunday
     
  4. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    Microsoft Security Advisory 899588
    Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege
    Published: August 11, 2005 | Updated: August 17, 2005
    Please read the advisory for more details.
    http://www.microsoft.com/technet/security/advisory/899588.mspx


    Microsoft Security Advisory (906267)
    A COM Object (Msdds.dll) Could Cause Internet Explorer to Unexpectedly Exit
    Please read the advisory for more details.
    Published: August 18, 2005
    http://www.microsoft.com/technet/security/advisory/906267.mspx
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.