Tuesday, January 13, 2009

US-CERT Technical Cyber Security Alert TA09-013A -- Microsoft Updates for Multiple SMB Protocol Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Alert System

Technical Cyber Security Alert TA09-013A


Microsoft Updates for Multiple SMB Protocol Vulnerabilities

Original release date: January 13, 2009
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows 2000, XP, and Vista
* Microsoft Windows Server 2000, 2003, and 2008


Overview

Microsoft has released updates that address vulnerabilities in
Microsoft Windows and Windows Server.


I. Description

In their bulletin for January 2009, Microsoft released updates to
address vulnerabilities in the Server Message Block (SMB) Protocol
that affects all supported versions Microsoft Windows.


II. Impact

A remote, unauthenticated attacker could gain elevated privileges,
execute arbitrary code, or cause a denial of service.


III. Solution

Microsoft has provided updates for this vulnerability in the
Microsoft Security Bulletin Summary for January 2009. The security
bulletin describes any known issues related to the
updates. Administrators are encouraged to note these issues and
test for any potentially adverse effects. Administrators should
also consider using an automated update distribution system such as
Windows Server Update Services (WSUS).


IV. References

* Microsoft Security Bulletin Summary for January 2009 -
<http://www.microsoft.com/technet/security/bulletin/ms09-jan.mspx>

* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA09-013A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA09-013A Feedback VU#914388" in the
subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2009 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________


Revision History

January 13, 2009: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSW0bDnIHljM+H4irAQLx0Af/b03sL+OgksDzO95k6jApkaMunERyHGu+
e4W4KRZ8e6felHu8bqRlXfiPbJgCXn9JkUPfc+GwhBS0q5QXmLmygLZiSP2KyQFW
u2Px2X60OyDveK3Qhl9vd09tmcw1iQYkoq+II7PcmErDwMww8ya/0d+KCBTiB73j
8kf5Odb3aD10iOqwCjJO8N8mq2T1vjb332qnhHLAZFaWArgyE1E8Dukmz6gVT84l
mSkQYObCoPIdaUsQgNrOh7pz2TjnI0PCzZoBHmV1ItF8W9vXmTQ1tCPDGHnSCe9q
TdjD+UlnowZ4Q8Vnh/XPrUU6IG6CH0lyN2GMBLsgEfnY4DrSmrvLeA==
=lISj
-----END PGP SIGNATURE-----

No comments:

CNN.com

News: Breaking News -- MercuryNews.com

AP Top U.S. News At 8:45 p.m.