PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : Alert - Critical Product Vulnerability - April 2008 Microsoft Security Bulletin Relea



joneum
09.04.2008, 11:56
gestern Abend wurden die Microsoft Security Bulletins für April 2008 veröffentlicht. Die Veröffentlichung der Bulletins ersetzt die Bulletin Advance Notification, die erstmalig am 03.04.08 veröffentlicht wurde.

Weitere Infos findet Ihr nachfolgend und auch unter: http://www.microsoft.com/germany/technet/sicherheit/bulletins/ms08-apr.mspx (dt.)


___________________________________

What is the purpose of this alert?
This alert is to provide you with an overview of the new security bulletins being released on 08 April 2008. Security bulletins are released monthly to resolve critical problem vulnerabilities.

New Security Bulletins:

Microsoft is releasing the following eight new security bulletins for newly discovered vulnerabilities. Below is a brief overview. A more detailed summary for each bulletin is provided at the bottom of this message.

Bulletin ID KB Article Severity Rating Product Affected Software
MS08-018 950183 Critical Project Project 2000, Project 2002, Project 2003
MS08-019 949032 Important Visio Visio 2002, Visio 2003, Visio 2007
MS08-020 945553 Important DNS Client Windows 2000, Windows XP, Windows Server 2003, Windows Vista
MS08-021 948590 Critical GDI Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008
MS08-022 944338 Critical VBScript and JScript Windows 2000, Windows XP, Windows Server 2003
MS08-023 948881 Critical ActiveX Killbits Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008
MS08-024 947864 Critical Internet Explorer Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008
MS08-025 941693 Important Kernel Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008

Summaries for these new bulletins may be found at the following pages:
http://www.microsoft.com/technet/security/bulletin/MS08-Apr.mspx

Microsoft Windows Malicious Software Removal Tool

Information on the Microsoft Windows Malicious Software Removal Tool can be found here: http://go.microsoft.com/fwlink/?LinkId=40573

High-Priority Non-Security Updates

High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU) or Windows Server Update Services (WSUS) will be detailed in the following KB Article: http://support.microsoft.com/?id=894199

Public Bulletin Webcast

Microsoft will host a Webcast to address customer questions on these bulletins:

Title: Information about Microsoft March Security Bulletins (Level 200)
Date: Wednesday, April 9th, 2008 11:00 AM Pacific Time (US & Canada)
URL: http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032357219

New Security Bulletin Technical Details

In the following tables, software editions that are not listed may be past their support lifecycle. To determine the support lifecycle for each product visit Microsoft Support Lifecycle<http://support.microsoft.com/lifecycle/> (http://support.microsoft.com/lifecycle/).

Bulletin Identifier Microsoft Security Bulletin MS08-018
Bulletin Title Vulnerability in Microsoft Project Could Allow Remote Code Execution (950183)
Executive Summary This security update resolves a privately reported vulnerability in Microsoft Office Project that could allow remote code execution if a user opens a specially crafted Project file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Project 2000, Project 2002, Project 2003. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update does not require a restart.
Removal Information Project 2000: After you install this update it cannot be removed.
Project 2002 and Project 2003: Use Add or Remove Programs tool in Control Panel.
Bulletins Superseded by This Bulletin None.
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-018.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-019
Bulletin Title Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (949032)
Executive Summary This security update resolves privately reported vulnerabilities in Microsoft Office Visio that could allow remote code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Important
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Visio 2002, Visio 2003, Visio 2007. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update does not require a restart.
Removal Information Visio 2002, Visio 2003, Visio 2007: Use Add or Remove Programs tool in Control Panel.
Bulletins Superseded by This Bulletin Visio 2002 and Visio 2003: MS07-030
Visio 2007: None
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-019.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-020
Bulletin Title Vulnerability in DNS Client Could Allow Spoofing (945553)
Executive Summary This security update resolves a privately reported vulnerability. This spoofing vulnerability exists in Windows DNS clients and could allow an attacker to send specially crafted responses to DNS requests, thereby spoofing or redirecting Internet traffic from legitimate locations.
Maximum Severity Rating Important
Impact of Vulnerability Spoofing
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003, Windows Vista. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility. Windows Vista: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Superseded by This Bulletin None
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-020.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-021
Bulletin Title Vulnerabilities in GDI Could Allow Remote Code Execution (948590)
Executive Summary This security update resolves two privately reported vulnerabilities in GDI. Exploitation of either of these vulnerabilities could allow remote code execution if a user opens a specially crafted EMF or WMF image file. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility. Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Superseded by This Bulletin Windows 2000, Windows XP, Windows Server 2003: MS07-046
Windows Vista, Windows Server 2008: None
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-021.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-022
Bulletin Title Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution (944338)
Executive Summary This security update resolves a privately reported vulnerability in the VBScript and JScript scripting engines in Windows. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.
Bulletins Superseded by This Bulletin For all affected products: MS06-023
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-022.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-023
Bulletin Title Security Update of ActiveX Kill Bits (948881)
Executive Summary This security update resolves one privately reported vulnerability for a Microsoft product. This update also includes a kill bit for the Yahoo! Music Jukebox product. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update may require a restart.
Removal Information Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility. Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Superseded by This Bulletin None
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-023.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-024
Bulletin Title Cumulative Security Update for Internet Explorer (947864)
Executive Summary This security update resolves one privately reported vulnerability. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility. Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Superseded by This Bulletin Windows 2000, Windows XP, Windows Server 2003, Windows Vista: MS08-010.
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-024.mspx

[X]

Bulletin Identifier Microsoft Security Bulletin MS08-025
Bulletin Title Vulnerability in Windows Kernel Could Allow Elevation of Privilege (941693)
Executive Summary This security update resolves a privately reported vulnerability in the Windows kernel. A local attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts.
Maximum Severity Rating Important
Impact of Vulnerability Elevation of Privilege
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008. For more information see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility. Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Superseded by This Bulletin None
Bulletin URL http://www.microsoft.com/technet/security/bulletin/MS08-025.mspx


Regarding Information Consistency

We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft's security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft's web-based security content, the information in Microsoft's web-based security content is authoritative.

If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.

Thank you,

Microsoft CSS Security Team