MS Sec Notification mailing list archives
Microsoft Security Bulletin Summary for October 2004
From: "Microsoft" <10_4757_UpnzEyrqtOS9+iJHfdrduA () newsletters microsoft com>
Date: Tue, 12 Oct 2004 21:54:23 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ******************************************************************** Title: Microsoft Security Bulletin Summary for October 2004 Issued: October 12, 2004 Version Number: 1.0 Bulletin: http://go.microsoft.com/fwlink/?LinkId=35989 ******************************************************************** Summary: ======== This advisory contains information about all security updates released this month. It is broken down by security bulletin severity. Critical Security Bulletins =========================== MS04-032 - Security Update for Microsoft Windows (840987) - Affected Software: - Windows NT Server 4.0 Service Pack 6a - Windows NT Server 4.0 Terminal Server Edition Service Pack 6 - Windows 2000 Service Pack 3 - Windows 2000 Service Pack 4 - Windows XP and Windows XP Service Pack 1 - Windows XP 64-Bit Edition Service Pack 1 - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Review the FAQ section of bulletin MS04-O32 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Remote Code Execution - Version Number: 1.0 MS04-033 - Vulnerability in Microsoft Excel Could Allow Remote Code Execution (886836) - Affected Software: - Microsoft Office 2000 Software Service Pack 3 - Microsoft Office XP Software Service Pack 2 - Microsoft Office 2001 for Mac - Microsoft Office v. X for Mac - Impact: Remote Code Execution - Version Number: 1.0 MS04-034 - Vulnerability in Compressed (zipped) Folders Could Allow Remote Code Execution (873376) - Affected Software: - Windows XP and Windows XP Service Pack 1 - Windows XP 64-Bit Edition Service Pack 1 - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Impact: Remote Code Execution - Version Number: 1.0 MS04-035 - Vulnerability in SMTP Could Allow Remote Code Execution (885881) - Affected Software: - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Exchange Server 2003 when installed on Windows Server 2003 - Exchange Server 2003 Service Pack 1 when installed on Microsoft Windows Server 2003 - Exchange Server 2003 when installed on Windows 2000 Service Pack 3 - Exchange Server 2003 when installed on Windows 2000 Service Pack 4 - Impact: Remote Code Execution - Version Number: 1.0 MS04-036 - Vulnerability in NNTP Could Allow Remote Code Execution (883935) - Affected Software: - Windows NT Server 4.0 Service Pack 6a - Windows 2000 Service Pack 3 - Windows 2000 Service Pack 4 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Exchange 2000 Server Service Pack 3 (Uses the Windows 2000 NNTP component) - Exchange Server 2003 (Uses the Windows 2000 or Windows Server 2003 NNTP component) - Exchange Server 2003 Service Pack 1 (Uses the Windows 2000 or Windows Server 2003 NNTP component) - Impact: Remote Code Execution - Version Number: 1.0 MS04-037 - Vulnerability in Windows Shell Could Allow Remote Code Execution (841356) - Affected Software: - Windows NT Server 4.0 Service Pack 6a - Windows NT Server 4.0 Terminal Server Edition Service Pack 6 - Windows 2000 Service Pack 3 - Windows 2000 Service Pack 4 - Windows XP and Windows XP Service Pack 1 - Windows XP 64-Bit Edition Service Pack 1 - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Review the FAQ section of bulletin MS04-O37 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Remote Code Execution - Version Number: 1.0 MS04-038 - Cumulative Security Update for Internet Explorer (834707) - Affected Software: - Windows NT Server 4.0 Service Pack 6a - Windows NT Server 4.0 Terminal Server Edition Service Pack 6 - Windows 2000 Service Pack 3 - Windows 2000 Service Pack 4 - Windows XP - Windows XP Service Pack 1 - Windows XP Service Pack 2 - Windows XP 64-Bit Edition Service Pack 1 - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Review the FAQ section of bulletin MS04-O38 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Remote Code Execution - Version Number: 1.0 Important Security Bulletins ============================ MS04-029 - Vulnerability in RPC Runtime Library Could Allow Information Disclosure and Denial of Service (873350) - Affected Software: - Windows NT Server 4.0 Service Pack 6a - Windows NT Server 4.0 Terminal Server Edition Service Pack 6 - Impact: Information Disclosure and Denial of Service - Version Number: 1.0 MS04-030 - Vulnerability in WebDAV XML Message Handler Could Lead to a Denial of Service (824151) - Affected Software: - Windows 2000 Service Pack 3 - Windows 2000 Service Pack 4 - Windows XP and Windows XP Service Pack 1 - Windows XP 64-Bit Edition Service Pack 1 - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Impact: Denial of Service - Version Number: 1.0 MS04-031 - Vulnerability in NetDDE Could Allow Remote Code Execution (841533) - Affected Software: - Windows NT Server 4.0 Service Pack 6a - Windows NT Server 4.0 Terminal Server Edition Service Pack 6 - Windows 2000 Service Pack 3 - Windows 2000 Service Pack 4 - Windows XP and Windows XP Service Pack 1 - Windows XP 64-Bit Edition Service Pack 1 - Windows XP 64-Bit Edition Version 2003 - Windows Server 2003 - Windows Server 2003 64-Bit Edition - Review the FAQ section of bulletin MS04-O31 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Remote Code Execution - Version Number: 1.0 Update Availability: ==================== An update is available to address these issues. For additional information, including Technical Details, Workarounds, answers to Frequently Asked Questions, and Update Deployment Information please read the Microsoft Security Bulletin Summary for this month at: http://go.microsoft.com/fwlink/?LinkId=35989 PGP Key Update: =============== Please note the Microsoft Security Response Center has generated a new PGP key. We use this key to sign all security bulletin notifications and encourage others to use this key when sending sensitive information to us. If you use PGP to verify the digital signature on these bulletin notifications or to send sensitive information to us, please update your copy of our key. Our new key is available at: https://www.microsoft.com/technet/security/bulletin/pgp.mspx You can verify the fingerprint of our key at: https://www.microsoft.com/technet/security/bulletin/pgp.mspx A revoked copy of our former key is available at: ldap://keyserver.pgp.com/ Support: ======== Technical support is available from Microsoft Product Support Services at 1-866-PC SAFETY (1-866-727-2338). There is no charge for support calls associated with security updates International customers can get support from their local Microsoft subsidiaries. Phone numbers for international support can be found at: http://support.microsoft.com/common/international.aspx Additional Resources: ===================== * Microsoft has created a free monthly e-mail newsletter containing valuable information to help you protect your network. This newsletter provides practical security tips, topical security guidance, useful resources and links, pointers to helpful community resources, and a forum for you to provide feedback and ask security-related questions. You can sign up for the newsletter at: http://www.microsoft.com/technet/security/secnews/default.mspx * Microsoft has created a free e-mail notification service that serves as a supplement to the Security Notification Service (this e-mail). It provides timely notification of any minor changes or revisions to previously released Microsoft Security Bulletins. This new service provides notifications that are written for IT professionals and contain technical information about the revisions to security bulletins. Visit http://www.microsoft.com to subscribe to this service: - Click on Subscribe at the top of the page. - This will direct you via Passport to the Subscription center. - Under Newsletter Subscriptions you can sign up for the "Microsoft Security Notification Service: Comprehensive Version". * Join Microsoft's webcast for a live discussion of the technical details of these security bulletins and steps you can take to protect your environment. Details about the live webcast can be found at: http://msevents.microsoft.com/cui/eventdetail.aspx?EventID=1032259702& Culture=en-US The on-demand version of the webcast will be available 24 hours after the live webcast at: http://msevents.microsoft.com/cui/eventdetail.aspx?EventID=1032259702& Culture=en-US * Protect your PC: Microsoft has provided information on how you can help protect your PC at the following locations: http://www.microsoft.com/security/protect/ If you receive an e-mail that claims to be distributing a Microsoft security update, it is a hoax that may be distributing a virus. Microsoft does not distribute security updates through e-mail. You can learn more about Microsoft's software distribution policies here: http://www.microsoft.com/technet/security/topics/policy/swdist.mspx Acknowledgments: ================ Microsoft thanks the following for working with us to protect customers: * BindView (http://www.bindview.com) for reporting an issue described in MS04-029. * Amit Klein and Sanctum Inc. (http://www.sanctuminc.com) for reporting an issue described in MS04-030. * John Heasman of Next Generation Security Software Ltd. (http://www.nextgenss.com) for reporting an issue described in MS04-031. * Brett Moore of Security-Assessment.com (http://www.security-assessment.com) for reporting an issue described in MS04-032. * eEye Digital Security (http://www.eeye.com) for reporting an issue described in MS04-032. * Patrick Porlan (porlan () free fr) working with Mark Russinovich of Winternals Software (http://www.winternals.com) for reporting an issue described in MS04-032. * hlt (hlt () dgap mipt ru) for reporting an issue described in MS04-032. * Brett Moore of Security-Assessment.com (http://www.security-assessment.com) for reporting an issue described in MS04-033. * eEye Digital Security (http://www.eeye.com) for reporting an issue described in MS04-034. * Lucas Lavarello and Juliano Rizzo of Core Security Technologies (http://www.coresecurity.com) for reporting an issue described in MS04-036. * Yorick Koster of ITsec Security Services (http://www.itsec-ss.nl) for working with us responsibly on an issue described in MS04-037. * Roozbeh Afrasiabi (http://www.persiax.com) for working with us responsibly on an issue described in MS04-037. * Greg Jones of KPMG UK (http://www.kpmg.co.uk) and Peter Winter-Smith of Next Generation Security Software Ltd. (http://www.nextgenss.com) for reporting an issue described in MS04-038. * Mitja Kolsek of ACROS Security (http://www.acrossecurity.com) for reporting an issue described in MS04-038. * John Heasman of Next Generation Security Software Ltd. (http://www.nextgenss.com) for reporting an issue described in MS04-038. ******************************************************************** THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQIVAwUBQWwR34reEgaqVbxmAQIpdQ/+Ka9AQeYo0Xt6k+nZKpIQUu6uC4zfc0Bw tWI0qHQhdwCoOUrCItpyPlxE4WTOSPErA5dlPcQV9CQeJYFD/ZrRO56Hv3K4b/N/ MKrJv9HNOR4xbepIwFHWrvb8ZC+ncwawmS/jSJTWjFcvUtfXmV9Y8LF7ALzyU/SX afN2nYumyhqfWjS2Y6ePHUtT+bmUB5HNfmwQVYswnzRfXX/mxsW2QqFJ4jQHTrwG 5e7hjLqqrD8NKyF/ygBEwXAr1L8YBhQF1+6QaxN5T0DNtIvPf7YdzXTc3JuopGCR FHN/3IwsxQX+fEL7Va4EgPK8KVWE5mLKgTuPMjT7ZU0ixwdI0wLpRmw6BMKjsOFS 9uH6Vi/fhK4dS/dm1dio2lqcDpQ7wdXwWYn8yUNmJuD8CzyVyIz9P1HCyb9dvo/j dThrBjrdC2J8tZEDp1myMo/7fGMDDqNZpLHrtQb+GAcFgUE6QL6z6erXy0CsEQA0 w8m8DhfxGWsHNebYc7D681OiXDWLuWz5v+l7twkqTscS4Pur66rwWop+YCZHSttO HQF3keMnHR+23kmDI3y/vm+EmfrbrtMEK3uIOUmHb264X0z3MqkqrUhU2w7QQat4 K1jIsDa5CIs81szYXJ+9gfgWBQwST+4MCY9X9xhddEqgWBvxjk3espUEZc9uiIhe MtLklBRKWWg= =2t9i -----END PGP SIGNATURE----- To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You can manage all your Microsoft.com communication preferences at this site. Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>. This newsletter was sent by the Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052
Current thread:
- Microsoft Security Bulletin Summary for October 2004 Microsoft (Oct 12)