US-CERT Technical Cyber Security Alert TA09-013A -- Microsoft Updates for Multiple SMB Protocol Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA09-013A
Microsoft Updates for Multiple SMB Protocol Vulnerabilities
Original release date: January 13, 2009
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows 2000, XP, and Vista
* Microsoft Windows Server 2000, 2003, and 2008
Overview
Microsoft has released updates that address vulnerabilities in
Microsoft Windows and Windows Server.
I. Description
In their bulletin for January 2009, Microsoft released updates to
address vulnerabilities in the Server Message Block (SMB) Protocol
that affects all supported versions Microsoft Windows.
II. Impact
A remote, unauthenticated attacker could gain elevated privileges,
execute arbitrary code, or cause a denial of service.
III. Solution
Microsoft has provided updates for this vulnerability in the
Microsoft Security Bulletin Summary for January 2009. The security
bulletin describes any known issues related to the
updates. Administrators are encouraged to note these issues and
test for any potentially adverse effects. Administrators should
also consider using an automated update distribution system such as
Windows Server Update Services (WSUS).
IV. References
* Microsoft Security Bulletin Summary for January 2009 -
<http://www.microsoft.com/technet/security/bulletin/ms09-jan.mspx>
* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA09-013A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA09-013A Feedback VU#914388" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2009 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
January 13, 2009: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBSW0bDnIHljM+H4irAQLx0Af/b03sL+OgksDzO95k6jApkaMunERyHGu+
e4W4KRZ8e6felHu8bqRlXfiPbJgCXn9JkUPfc+GwhBS0q5QXmLmygLZiSP2KyQFW
u2Px2X60OyDveK3Qhl9vd09tmcw1iQYkoq+II7PcmErDwMww8ya/0d+KCBTiB73j
8kf5Odb3aD10iOqwCjJO8N8mq2T1vjb332qnhHLAZFaWArgyE1E8Dukmz6gVT84l
mSkQYObCoPIdaUsQgNrOh7pz2TjnI0PCzZoBHmV1ItF8W9vXmTQ1tCPDGHnSCe9q
TdjD+UlnowZ4Q8Vnh/XPrUU6IG6CH0lyN2GMBLsgEfnY4DrSmrvLeA==
=lISj
-----END PGP SIGNATURE-----