US-CERT Technical Cyber Security Alert TA07-282A -- Microsoft Updates for Multiple Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-282A
Microsoft Updates for Multiple Vulnerabilities
Original release date: October 9, 2007
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Outlook Express and Windows Mail
* Microsoft Office
* Microsoft Office for Mac
* Microsoft SharePoint
Overview
Microsoft has released updates that address critical vulnerabilities
in Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook
Express and Windows Mail, Microsoft Office, Microsoft Office for Mac,
and Microsoft SharePoint. Exploitation of these vulnerabilities could
allow a remote, unauthenticated attacker to execute arbitrary code or
cause a denial of service on a vulnerable system.
I. Description
Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Microsoft Internet Explorer, Microsoft Outlook
Express and Windows Mail, Microsoft Office, Microsoft Office for Mac,
and Microsoft SharePoint as part of the Microsoft Security Bulletin
Summary for October 2007. The most severe vulnerabilities could allow
a remote, unauthenticated attacker to execute arbitrary code or cause
a denial of service on a vulnerable system.
Further information about the vulnerabilities addressed by these
updates is available in the Vulnerability Notes Database.
II. Impact
A remote, unauthenticated attacker could execute arbitrary code on a
vulnerable system. An attacker may also be able to cause a denial of
service.
III. Solution
Apply updates from Microsoft
Microsoft has provided updates for these vulnerabilities in the
October 2007 security bulletins. The security bulletins describe any
known issues related to the updates. Administrators are encouraged to
note any known issues that are described in the bulletins and test for
any potentially adverse effects.
System administrators should consider using an automated patch
distribution system such as Windows Server Update Services (WSUS).
IV. References
* US-CERT Vulnerability Notes for Microsoft October 2007 updates -
<http://www.kb.cert.org/vuls/byid?searchview&query=ms07-oct>
* Microsoft Security Bulletin Summary for October 2007 -
<http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Windows Server Update Services -
<http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>
* Securing Your Web Browser - <http://www.cert.org/tech_tips/securing_browser/>
* Mactopia - <http://www.microsoft.com/mac/>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-282A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA07-282A Feedback VU#569041" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
October 9, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRwvTGvRFkHkM87XOAQL0ZQgAhIOH3izST8xU1Xm3NQ65FRJumacpXdOl
OtDoysTaQBZcQN+4OikFztqNZuJHVUVRLvRZKO6k6cOfYq8oaaDDzlGiJP3yfl/u
byveiGWdgCnr1RlQdM/GG7Wz2JGK/4WsXc1K1dvHclswyFSC9/sYV7Gmj/aPo6aW
T7fJBlQFE+ffy3/6sQ8fhtXP2dwJgQ2uT+UyaFvZiG65efH+qOXXmSBy2CkyV2zJ
rdTSUqhp5nVUChwl/jYjywUVAUUqEM69P0E4t5VtOdhNYIz5fZH4uuJ4M+HM451Z
T9kGF4wi94QM9xPZzcb0+mthBXa/zzQNT5mV5GcorKTzJpSIGmCZUQ==
=Xij6
-----END PGP SIGNATURE-----
No comments:
Post a Comment