PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : Alert - Critical Product Vulnerability - July 2008 Microsoft Security Bulletin Releas



joneum
09.07.2008, 12:45
gestern Abend wurden die Microsoft Security Bulletins für Juli 2008 veröffentlicht. Die Veröffentlichung der Bulletins ersetzt die Bulletin Advance Notification, die erstmalig am 03. Juli 2008 veröffentlicht wurde.

Weitere Infos findet Ihr in der Benachrichtigung unten oder auch online unter: http://www.microsoft.com/germany/technet/sicherheit/bulletins/ms08-jul.mspx (dt.)

Am Mittwoch, den 09. Juli 2008 um 20:00 Uhr (MEZ) führt Microsoft einen englischsprachigen Webcast durch, um Kundenfragen zu den neuen Bulletins zu beantworten. Bitte registrieret Euch bei Interesse unter: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032374629&Culture=en-US

__________________________________________

What is the purpose of this alert?
This alert is to provide you with an overview of the new security bulletins being released on 08 July 2008. Security bulletins are released monthly to resolve critical problem vulnerabilities.

New Security Bulletins:

Microsoft is releasing the following four new security bulletins for newly discovered vulnerabilities:


Bulletin Number Maximum Severity Affected Products Impact

MS08-037 Important Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008. Spoofing

MS08-038 Important Windows Vista and Windows Server 2008 Remote Code Execution

MS08-039 Important Exchange Server 2003 and Exchange Server 2007 Elevation of Privilege

MS08-040


Important SQL Server 7.0, SQL Server 2000, SQL Server 2005, MSDE 1.0, MSDE 2000, SQL Server 2005 Express, SQL Server 2005 Express with Advanced Services, WMSDE, Windows Internal Database (WYukon) Elevation of Privilege

Summaries for these new bulletins may be found at the following pages:
http://www.microsoft.com/technet/security/bulletin/MS08-jul.mspx

Microsoft Windows Malicious Software Removal Tool

Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU) and the Download Center. Note that this tool will NOT be distributed using Software Update Services (SUS). Information on the Microsoft Windows Malicious Software Removal Tool can be located here: http://go.microsoft.com/fwlink/?LinkId=40573

High-Priority Non-Security Updates

High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU) or Windows Server Update Services (WSUS) will be detailed in the following KB Article: http://support.microsoft.com/?id=894199

Public Bulletin Webcast

Microsoft will host a Webcast to address customer questions on these bulletins:

Title: Information about Microsoft June Security Bulletins (Level 200)
Date: Wednesday, July 09th, 2008 11:00 AM Pacific Time (US & Canada)
URL: http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032374629

New Security Bulletin Technical Details

In the following tables of affected and non-affected software, software editions that are not listed are past their support lifecycle. To determine the support lifecycle for your product and edition, visit Microsoft Support Lifecycle<http://support.microsoft.com/lifecycle/> (http://support.microsoft.com/lifecycle/).

Bulletin Identifier Microsoft Security Bulletin MS08-037
Bulletin Title Vulnerabilities in DNS Could Allow Spoofing (953230)
Executive Summary This security update resolves two privately reported vulnerabilities in the Windows Domain Name System (DNS) that could allow spoofing. These vulnerabilities exist in both the DNS client and DNS server and could allow a remote attacker to redirect network traffic intended for systems on the Internet to the attacker's own systems.
Maximum Severity Rating Important
Impact of Vulnerability Spoofing
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008. For more information, see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information For Windows 2000, Windows XP and Windows Server 2003: use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility.

For Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update None
Full Details http://www.microsoft.com/technet/security/bulletin/MS08-037.mspx


Bulletin Identifier Microsoft Security Bulletin MS08-038
Bulletin Title Vulnerability in Windows Explorer Could Allow Remote Code Execution (950582)
Executive Summary This security update resolves a publicly reported vulnerability in Windows Explorer that could allow remote code execution when a specially crafted saved-search file is opened and saved. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Maximum Severity Rating Important
Impact of Vulnerability Remote Code Execution
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Windows Vista and Windows Server 2008. For more information, see the Affected Software section of the bulletin at the link below.
Restart Requirement The update requires a restart.
Removal Information For Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update None
Full Details http://www.microsoft.com/technet/security/bulletin/MS08-038.mspx


Bulletin Identifier Microsoft Security Bulletin MS08-039
Bulletin Title Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747)
Executive Summary This security update resolves two privately reported vulnerabilities in Outlook Web Access (OWA) for Microsoft Exchange Server. An attacker who successfully exploited these vulnerabilities could gain access to an individual OWA client's session data, allowing elevation of privilege. The attacker could then perform any action the user could perform from within the individual client's OWA session.
Maximum Severity Rating Important
Impact of Vulnerability Elevation of Privilege
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software Exchange Server 2003 and Exchange Server 2007. For more information, see the Affected Software section of the bulletin at the link below.
Restart Requirement No, this update does not require a restart. The installer stops the required services, applies the update, and then restarts the services. However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart your computer, see Microsoft Knowledge Base Article 887012<http://support.microsoft.com/kb/887012> (http://support.microsoft.com/kb/887012).
Removal Information Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility
Bulletins Replaced by This Update MS07-026 is replaced only for Exchange Sever 2007. For more information please see the Affected Software section of the bulletin at the link below for more details.
Full Details http://www.microsoft.com/technet/security/bulletin/MS08-039.mspx


Bulletin Identifier Microsoft Security Bulletin MS08-040
Bulletin Title Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege (941203)
Executive Summary This security update resolves four privately disclosed vulnerabilities. The more serious of the vulnerabilities could allow an attacker to run code and to take complete control of an affected system. An authenticated attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
Maximum Severity Rating Important
Impact of Vulnerability Elevation of Privilege
Detection Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software SQL Server 7.0, SQL Server 2000, SQL Server 2005, MSDE 1.0, MSDE 2000, SQL Server 2005 Express, SQL Server 2005 Express with Advanced Services, WMSDE, Windows Internal Database (WYukon). For more information, see the Affected Software section of the bulletin at the link below.
Restart Requirement Restart requirement varies depending on which version of the update is installed. For more information, see the Security Update Information section of the bulletin at the link below.
Removal Information For SQL Server 7.0 and MSDE: Update files for SQL 7.0 are provided in a self-extracting executable file from the Microsoft Download Center link in the Affected Software table. Instructions for manually uninstalling the update are provided in an attached README file.
For other versions, use Add or Remove Programs tool in Control Panel.
Bulletins Replaced by This Update None
Full Details http://www.microsoft.com/technet/security/bulletin/MS08-040.mspx

Regarding Information Consistency

We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft's security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft's web-based security content, the information in Microsoft's web-based security content is authoritative.

If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.

Thank you,

Microsoft CSS Security Team