MS Sec Notification mailing list archives

Microsoft Security Advisory Notification


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 14 Dec 2010 13:43:14 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


********************************************************************
Title: Microsoft Security Advisory Notification
Issued: December 14, 2010
********************************************************************

Security Advisories Updated or Released Today
==============================================

 * Microsoft Security Advisory (973811)
  - Title: Extended Protection for Authentication
  - http://www.microsoft.com/technet/security/advisory/973811.mspx
  - Revision Note: V1.8 (December 14, 2010): Updated the FAQ
    with information about a non-security update enabling
    Microsoft Outlook to opt in to Extended Protection for Authentication.
 * Microsoft Security Advisory (2458511)
  - Title: Vulnerability in Internet Explorer Could
    Allow Remote Code Execution
  - http://www.microsoft.com/technet/security/advisory/2458511.mspx
  - Revision Note: V2.0 (December 14, 2010): Advisory updated
    to reflect publication of security bulletin.
 * Microsoft Security Advisory (2269637)
  - Title: Insecure Library Loading Could Allow Remote
    Code Execution
  - http://www.microsoft.com/technet/security/advisory/2269637.mspx
  - Revision Note: V3.0 (December 14, 2010) Added the following
    Microsoft Security Bulletins to the Updates relating to
    Insecure Library Loading section: MS10-093, "Vulnerability in
    Windows Movie Maker Could Allow Remote Code Execution;"
    MS10-094, "Vulnerability in Windows Media Encoder Could Allow
    Remote Code Execution;" MS10-095, "Vulnerability in Microsoft
    Windows Could Allow Remote Code Execution;" MS10-096,
    "Vulnerability in Windows Address Book Could Allow Remote
    Code Execution;" and MS10-097, "Insecure Library Loading in
    Internet Connection Signup Wizard Could Allow Remote Code Execution."  
 


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent e-mail to Microsoft customers:
=============================================================
If you receive an e-mail message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious Web sites. Microsoft does
not distribute security updates via e-mail.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To cancel your subscription to this newsletter, reply to this 
message with the word UNSUBSCRIBE in the Subject line.  

To set your contact preferences for this and other Microsoft 
communications, see the communications preferences section of the 
Microsoft Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.9.0 (Build 397)
Charset: utf-8
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=mdyp
-----END PGP SIGNATURE-----


Current thread: