PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : ADVANCE NOTIFICATION - February 2008 MSRC Security Bulletin Release



joneum
08.02.2008, 13:29
Hallo liebe CLIPler,

für den 12. Februar 2008 ist die Veröffentlichung nachfolgender Security Bulletins (geordnet nach Schweregrad) geplant.

Deutsche Infos findet Ihr unter http://www.microsoft.com/germany/technet/sicherheit/bulletins/ms08-feb.mspx (dt.)

Am Mittwoch, dem 13. Februar 2008 um 20:00 Uhr (MEZ) führt Microsoft einen englischsprachigen Webcast durch, um Kundenfragen zu den neuen Bulletins zu beantworten. Bitte registrieret Euch bei Interesse unter: http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1032357215&EventCategory=4&culture=en-US&CountryCode=US

Informationen zu deutschsprachigen Webcasts von Microsoft TechNet findet Ihr hier: http://www.microsoft.com/germany/technet/webcasts/default.mspx

Viele Grüße


__________________________

What is this alert?

As part of the monthly security bulletin release cycle, Microsoft provides advance notification to our customers on the number of new security updates being released, the products affected, the aggregate maximum severity and information about detection tools relevant to the update. This is intended to help our customers plan for the deployment of these security updates more effectively.

On 12 February 2008 Microsoft is planning to release twelve new security bulletins. Here is a summary in order of severity:


Critical:


Bulletin Identifier Microsoft Security Bulletin 5
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 6
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows, Office, Visual Basic. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 7
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows, VBScript, JScript. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 8
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows, Internet Explorer. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 10
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will not require a restart.
Affected Software Office. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 11
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will not require a restart.
Affected Software Office. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 12
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will not require a restart.
Affected Software Office. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.


Important:


Bulletin Identifier Microsoft Security Bulletin 1
Maximum Severity Rating Important
Impact of Vulnerability Denial of Service
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows, Active Directory, ADAM. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 2
Maximum Severity Rating Important
Impact of Vulnerability Denial of Service
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 3
Maximum Severity Rating Important
Impact of Vulnerability Elevation of Privilege
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will require a restart.
Affected Software Windows, IIS. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.



Bulletin Identifier Microsoft Security Bulletin 4
Maximum Severity Rating Important
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will not require a restart.
Affected Software Windows, IIS. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.


Bulletin Identifier Microsoft Security Bulletin 9
Maximum Severity Rating Important
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. The update will not require a restart.
Affected Software Office, Works, Works Suite. For more information, see the Affected Software section of the Advance Notification web page at the link provided below.


Although we do not anticipate any changes, the number of bulletins, products affected, restart information and severities are subject to change until released.

Security Bulletin Advance Notification Web Page: The full version of the Microsoft Security Bulletin Advance Notification for this month can be found here: http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx

Microsoft Windows Malicious Software Removal Tool: Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services and the Download Center.

Monthly Security Bulletin Webcast: To address customer questions on these bulletins Microsoft will host a webcast next week Wednesday at 11:00 AM Pacific Time (US & Canada). Registration for this event and other details can be found here:

http://www.microsoft.com/technet/security/bulletin/summary.mspx

At this time no additional information on these bulletins such as details regarding severity or details regarding the vulnerability will be made available until the bulletins are published on Tuesday.

Regarding Information Consistency

We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft's security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft's web-based security content, the information in Microsoft's web-based security content is authoritative.

If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.

Thank you,
Microsoft CSS Security Team

joneum
08.02.2008, 13:47
und hier die meldung auf heise: http://www.heise.de/newsticker/meldung/103179


12 Updates von Microsoft am kommenden Patch-Tuesday

Gleich zwölf Sicherheitsupdates will Microsoft in der nächsten Woche am Dienstag, dem 12. Februar, an Anwender verteilen. Sieben davon sollen kritische Lücken in Windows, Office, und dem Internet Explorer schließen. Vier der Updates sollen sich allein Office widmen. Eines stopft auch Lücken in VBScript und JScript respektive JavaScript. Angreifer können durch die Lücken ein System mit Schädlingen infizieren.


Bei den fünf nur als "Wichtig" eingestuften Updates sollen allerdings zwei Updates Lücken im Internet Information Server und Office schließen, die immerhin das Einschleusen und Ausführen von Code aus der Ferne ermöglichen. Warum sie dann nicht höher eingestuft wurden, werden die mehr oder minder detaillierten Informationen nach der Veröffentlichung nächste Woche erklären müssen. Angekündigt wird auch ein Patch für die Active Directory Services unter Windows 2000, XP und Server 2003. Wie immer gibt es auch ein aktualisiertes Windows Malicious Software Removal Tool. Weitere Details sind in der Ankündigung von Microsoft zu finden.

Zusätzlich wollen die Redmonder sieben nicht sicherheitsrelevante Updates über Microsoft Update (MU) und Windows Server Update Services (WSUS) sowie zwei nicht sicherheitsrelevante über Windows Update (WU) und WSUS verteilen. Dazu dürfte auch der Internet Explorer 7 gehören, den Microsoft am 12. Februar als Update-Rollup-Paket markieren will, wodurch es in Unternehmensnetzen mit WSUS-Server, die die Option zum automatischen Freigeben solcher Pakete aktiviert haben, automatisch verteilt und installiert wird. Microsoft hatte diesbezüglich bereits Mitte Januar eine Warnung und eine Anleitung veröffentlicht, wie man sich davor schützen kann.

purple_rose
12.02.2008, 20:26
Die Updates stehen bereit und können/sollten installiert werden...

joneum
13.02.2008, 01:42
http://www.heise.de/newsticker/meldung/103417


Microsoft stopft 17 Sicherheitslücken

Anders als vom Redmonder Softwarekonzern bereits vergangenen Freitag angekündigt, veröffentlicht das Unternehmen am heutigen Patchday elf statt zwölf Security-Bulletins mitsamt Updates, die zahlreiche Lücken in den Betriebssystemen, in den Office-Paketen und weiterer Software schließen. Die Updates zu den Bulletins beseitigen zehn als kritisch und sieben mit der Risikostufe hoch eingestufte Schwachstellen.

Das kumulative Sicherheitsupdate zur Sicherheitsmeldung MS08-010 schließt gleich vier Sicherheitslücken im Internet Explorer 5, 6 und 7 unter allen unterstützten Betriebssystemen. Beim Darstellen von präparierten HTML-Seiten mit bestimmten, aber von Microsoft nicht erläuterten Layout-Kombinationen tritt in der Render-Engine ein Fehler auf, durch den sich Code einschleusen und ausführen lässt. Dasselbe kann beim Aufrufen der "Property"-Funktion durch Webseiten im IE passieren. Auch das ActiveX-Modul dxtmsft.dll reißt so eine Lücke auf, die auf eine fehlerhafte Überprüfung der übergebenen Daten zurückzuführen ist. Zudem setzt das Update Killbits für die ActiveX-Module Foxtlib.ocx und Fpole.ocx von Microsofts Fox Pro.

Im Security-Bulletin MS08-008 beschreibt der Hersteller eine unter Windows 2000, XP, Vista, Microsoft Office 2004 für Mac und Visual Basic 6 kritische Sicherheitslücke in der OLE-Automatisierung (Object Linking and Embedding), die Angreifer etwa mit manipulierten Webseiten zum Unterschieben von Schadcode missbrauchen können. Manipulierte Skripte können in der OLE-Automatisierung den Speicher durcheinander bringen und dabei Teile des Heaps überschreiben.

Auch die Office-Pakete enthalten Sicherheitslücken, die Microsoft mit Patches abdichtet. Das Update zu MS08-009 behebt einen Fehler in Word, der das Einschmuggeln fremden Programmcodes ermöglicht. Die Lücke stufen die Redmonder in Office 2000 als kritisch ein, in Office XP, 2003 sowie im Word Viewer 2003 noch als "hoch". Neuere Versionen ab einschließlich Office 2003 SP3 sowie Office 2004 und 2008 für Mac sind nicht betroffen. Der Fehlerbericht MS08-012 beschreibt zwei kritische Lecks in Microsofts Publisher, die ebenfalls in Version 2000 kritisch und in XP und 2003 SP2 noch mit der Risikostufe hoch versehen sind.

Eine weitere Schwachstelle (MS08-013) tritt bei Office-Dokumente mit manipulierten, eingebetteten Objekten zu Tage; Microsoft stuft sie in Office 2000 als kritisch, in Office XP, 2003 bis SP2 und Office 2004 für Mac als "hoch" ein. Aktuellere Versionen und die Viewer enthalten den Fehler hingegen nicht. Weiterhin kommen die Importfilter von Office 2003, Works 8 und der Works Suite 2005 für Works-Dateien (.wps) mit manipulierten Dateien nicht zurecht und können eingeschleusten Schadcode ausführen. Im Security-Bulletin MS08-011 schätzt Microsoft das Gefahrenpotenzial der drei Fehler in den Works-Versionen lediglich als hoch ein, in Office 2003 sogar nur als mittel.

Der im Betriebssystem integrierte WebDAV-Client WebDAV Mini Redirector kann beim Verarbeiten präparierter Antwortpakete aus dem Tritt geraten und in dessen Folge ein Puffer auf dem Heap überlaufen. Dabei kann eingeschleuster Schadcode zur Ausführung kommen. Das Update zum Security-Bulletin MS08-007 behebt den Fehler in Windows XP, Server 2003 und Vista; Windows 2000, Vista Service Pack 1 und Windows 2008 enthalten die Schwachstelle nicht.

Das Gefährdungspotenzial einer Schwachstelle beim Verarbeiten von präparierten DHCP-Antworten (MS08-004) in Windows Vista schätzt Microsoft nur als hoch ein, Die gefälschten Antwortpakete können zum Absturz und Neustart betroffener Systeme führen. Eingaben auf ASP-Webseiten verarbeitet der Internet Information Server (IIS) 5.1 und 6.0 unter Windows XP und Server 2003 unter Umständen fehlerhaft, wodurch Angreifer Zugriff mit den Rechten des IIS auf das System erhalten können (MS08-006). Lokale Anwender können der Sicherheitsmeldung MS08-005 zufolge ihre Rechte auf Systemen mit dem IIS ausweiten. Betroffen sind die Versionen IIS 5.0 unter Windows 2000 bis IIS 7 unter Windows Vista. Eine Schwachstelle im Verzeichnisdienst Active Directory ermöglicht Denial-of-Service-Angriffe auf betroffene Systeme (MS08-003). Unter Windows XP und Server 2003 sind dazu gültige Anmeldedaten nötig, unter Windows 2000 hingegen nicht.

Da die meisten der Sicherheitslücken das Einschleusen und Ausführen von fremden Code ermöglichen, sollten Anwender die Updates zügig einspielen. Sofern das automatische Update von Windows sie noch nicht heruntergeladen hat, können Anwender den Internet Explorer starten und aus dem Menü des Browsers heraus die Windows-Update-Seite ansurfen und so das Update manuell anstoßen.

Siehe dazu auch:

Microsoft Security Bulletin Summary für Februar 2008 (http://www.microsoft.com/germany/technet/sicherheit/bulletins/ms08-feb.mspx), Zusammenfassung und Übersicht der Updates von Microsoft

joneum
13.02.2008, 13:09
und hier die Clip-meldung:


Hallo liebe CLIPler,

gestern Abend wurden die Microsoft Security Bulletins für Februar 2008 veröffentlicht. Die Veröffentlichung der Bulletins ersetzt die Bulletin Advance Notification, die erstmalig am 08.02.08 veröffentlicht wurde.

Weitere Infos findet Ihr nachfolgend und auch unter: http://www.microsoft.com/germany/technet/sicherheit/bulletins/ms08-feb.mspx (dt.)

Viele Grüße und einen schönen Tag wünscht Euch


________________________

What is this alert?

This alert is to provide you with an overview of the new Security Bulletin being released on 12 February 2008.

New Security Bulletins

Microsoft is releasing the following eleven new security bulletins for newly discovered vulnerabilities:


Bulletin Number Maximum Severity Affected Products Impact

MS08-003 Important Windows 2000, Windows XP, Windows Server 2003 Denial of Service

MS08-004 Important Windows Vista Denial of Service

MS08-005 Important Windows 2000, Windows XP, Windows Server 2003, Windows Vista Elevation of Privilege

MS08-006 Important Windows XP, Windows Server 2003 Remote Code Execution

MS08-007 Critical Windows XP, Windows Server 2003, Windows Vista Remote Code Execution

MS08-008 Critical Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Office 2004 for Mac, and Visual Basic 6.0 Remote Code Execution

MS08-009 Critical

Office 2000 SP3, Office XP SP3, Office 2003 SP2

Remote Code Execution

MS08-010 Critical All IE on Windows 2000, Windows XP, Windows Server 2003, and Windows Vista Remote Code Execution

MS08-011 Important Office 2003 SP2, Office 2003 SP3, Works 8.0, and Works Suite 2005 Remote Code Execution

MS08-012 Critical Office 2000 SP3, Office XP SP3, and Office 2003 SP2 Remote Code Execution

MS08-013 Critical Office 2000 SP3, Office XP SP3, and Office 2003 SP2, Office 2004 for Mac Remote Code Execution

Summaries for these new bulletins may be found at the following pages:

http://www.microsoft.com/technet/security/bulletin/MS08-Feb.mspx

Microsoft Windows Malicious Software Removal Tool

Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU) and the Download Center. Note that this tool will NOT be distributed using Software Update Services (SUS). Information on the Microsoft Windows Malicious Software Removal Tool can be located here: http://go.microsoft.com/fwlink/?LinkId=40573

High-Priority Non-Security Updates

High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU) or Windows Server Update Services (WSUS) will be detailed in the following KB Article: http://support.microsoft.com/?id=894199



TechNet Webcast: Microsoft will host a Webcast to address customer questions on these bulletins:

Title: Information about Microsoft February Security Bulletins (Level 200)
Date: Wednesday, February 13th, 2008 11:00 AM Pacific Time (US & Canada)
URL: http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032357215
Replay: Available 24 hours after webcast - same URL


New Security Bulletin Technical Details

In the following tables of affected and non-affected software, software editions that are not listed are past their support lifecycle. To determine the support lifecycle for your product and edition, visit Microsoft Support Lifecycle<http://support.microsoft.com/lifecycle/>.



Bulletin Identifier Microsoft Security Bulletin MS08-003
Bulletin Title Vulnerability in Active Directory Could Allow Denial of Service (946538)
Executive Summary This important security update resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows 2000 Server and Windows Server 2003, and Active Directory Application Mode (ADAM) when installed on Windows XP Professional and Windows Server 2003. The vulnerability could allow a denial of service condition. On Windows Server 2003 and Windows XP Professional an attacker must have valid logon credentials to exploit this vulnerability. An attacker who successfully exploited this vulnerability could cause the system to stop responding or automatically restart.
Maximum Severity Rating Important
Impact of Vulnerability Denial of Service
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows, Active Directory, ADAM. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will require a restart.
Removal Information Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Bulletins Replaced by This Update Windows 2000 and Windows Server 2003: MS07-039. For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-003.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-004
Bulletin Title Vulnerability in Windows TCP/IP Could Allow Denial of Service (946456)
Executive Summary This important update resolves a privately reported vulnerability in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. An attacker who successfully exploited this vulnerability could cause the affected system to stop responding and automatically restart.
Maximum Severity Rating Important
Impact of Vulnerability Denial of Service
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will require a restart.
Removal Information Windows Vista: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update MS08-001. For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-004.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-005
Bulletin Title Vulnerability in Internet Information Services Could Allow Elevation of Privilege (942831)
Executive Summary This important update resolves a privately reported vulnerability in Internet Information Services (IIS). A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Important
Impact of Vulnerability Elevation of Privilege
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows, IIS. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will require a restart.
Removal Information Windows 2000, Windows XP, and Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Windows Vista: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update None.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-005.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-006
Bulletin Title Vulnerability in Internet Information Services Could Allow Remote Code Execution (942830)
Executive Summary This important update resolves a privately reported vulnerability in Internet Information Services (IIS). A remote code execution vulnerability exists in the way that IIS handles input to ASP Web pages. An attacker who successfully exploited this vulnerability could then perform actions on the IIS server with the same rights as the Worker Process Identity (WPI). The WPI is configured with Network Service account privileges by default. IIS servers with ASP pages whose application pools are configured with a WPI that uses an account with administrative privileges could be more seriously impacted than IIS servers whose application pool is configured with the default WPI settings.
Maximum Severity Rating Important
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows, IIS. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will not require a restart.
Removal Information Windows XP and Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Bulletins Replaced by This Update MS06-034. For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-006.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-007
Bulletin Title Vulnerability in WebDAV Mini-Redirector Could Allow Remote Code Execution (946026)
Executive Summary This critical security update resolves one privately reported vulnerability in the WebDAV Mini-Redirector. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will require a restart.
Removal Information Windows XP and Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Windows Vista: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update None.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-007.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-008
Bulletin Title Vulnerability in OLE Automation Could Allow Remote Code Execution (947890)
Executive Summary This critical security update resolves a privately reported vulnerability. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page. The vulnerability could be exploited through attacks on Object Linking and Embedding (OLE) Automation. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows, Office, Visual Basic. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will require a restart.
Removal Information Windows XP and Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Windows Vista: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Office 2004 for Mac and Visual Basic 6.0: The update cannot be uninstalled.
Bulletins Replaced by This Update MS07-043. For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-008.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-009
Bulletin Title Vulnerability in Microsoft Word Could Allow Remote Code Execution (947077)
Executive Summary This critical security update resolves one privately reported vulnerability in Microsoft Word that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Office. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will not require a restart.
Removal Information Word 2000: After you install the update, you cannot remove it. To revert to an installation before the update was installed; you must remove the application, and then install it again from the original media.
Word 2002 and Word 2003: Use Add or Remove Programs tool in Control Panel.
Bulletins Replaced by This Update Office 2000 and Office XP: MS07-060
Office 2003 and Office Word Viewer 2003: MS07-024
For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-009.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-010
Bulletin Title Cumulative Security Update for Internet Explorer (944533)
Executive Summary This critical security update resolves three privately reported and one publicly reported vulnerabilities. The most serious of the vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows, Internet Explorer. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will require a restart.
Removal Information Internet Explorer on Windows 2000, Windows XP and Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Internet Explorer on Windows Vista: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update MS07-069. For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-010.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-011
Bulletin Title Vulnerabilities in Microsoft Works File Converter Could Allow Remote Code Execution (947081)
Executive Summary This important security update resolves three privately reported vulnerabilities in the Microsoft Works File Converter. These vulnerabilities could allow remote code execution if a user opens a specially crafted Works (.wps) file with an affected version of Microsoft Office, Microsoft Works, or Microsoft Works Suite. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Maximum Severity Rating Important
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Office, Works, Works Suite. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will not require a restart.
Removal Information Use Add or Remove Programs tool in Control Panel.
Bulletins Replaced by This Update None.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-011.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-012
Bulletin Title Vulnerabilities in Microsoft Office Publisher Could Allow Remote Code Execution (947085)
Executive Summary This critical security update resolves two privately reported vulnerabilities in Microsoft Office Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Office. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will not require a restart.
Removal Information Publisher 2000: After you install the update, you cannot remove it.
Publisher 2003 and Publisher 2003: Use Add or Remove Programs tool in Control Panel.
Bulletins Replaced by This Update MS06-054. For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-012.mspx

[X]


Bulletin Identifier Microsoft Security Bulletin MS08-013
Bulletin Title Vulnerability in Microsoft Office Could Allow Remote Code Execution (947108)
Executive Summary This critical security update resolves a privately reported vulnerability in Microsoft Office. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file with a malformed object inserted into the document. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Office. For more information, see the Affected Software section of the bulletin on the web at the link below.
Restart Requirement The update will not require a restart.
Removal Information After you install the update, you cannot remove it.
Bulletins Replaced by This Update Office 2000, Office XP, Office 2003: MS06-047
Office 2004 for Mac: MS07-060.
For more information, see the Affected Software section of the bulletin on the web at the link below.
Full Details: http://www.microsoft.com/technet/security/bulletin/MS08-013.mspx


[X]

PLEASE VISIT http://www.microsoft.com/technet/security FOR THE MOST CURRENT INFORMATION ON THESE ALERTS.

If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.

Thank you,

Microsoft CSS Security Team