Jump to content

Microsoft Security Advisory (958963): Exploit Code Published Affecting the Server Service


Recommended Posts

Guest PA Bear [MS MVP]
Posted

[Crossposted to Security, Security Home Users, and Windows Update

newsgroups; Followup To set for Security newsgroup]

 

Microsoft Security Advisory (958963): Exploit Code Published Affecting the

Server Service

<QP>

Microsoft is aware that detailed exploit code demonstrating code execution

has been published on the Internet for the vulnerability that is addressed

by security update MS08-067. This exploit code demonstrates code execution

on Windows 2000, Windows XP, and Windows Server 2003. Microsoft is aware of

limited, targeted active attacks that use this exploit code. At this time,

there are no self-replicating attacks associated with this vulnerability.

Microsoft has activated its Software Security Incident Response Process

(SSIRP) and is continuing to investigate this issue.

 

Our investigation of this exploit code has verified that it does not affect

customers who have installed the updates detailed in MS08-067 on their

computers. Microsoft continues to recommend that customers apply the

updates to the affected products by enabling the Automatic Updates feature

in Windows.

 

We continue to work with our Microsoft Security Response Alliance (MSRA) and

Microsoft Active Protections Program (MAPP) partners so that their products

can provide additional protections for customers. We have updated our

Windows Live Safety Scanner, Windows Live One Care, and Forefront security

products with protections for customers. We have also been working with our

partners in the Global Infrastructure Alliance for Internet Safety (GIAIS)

program to take steps to help keep attacks from spreading.

 

Customers who believe they are affected can contact Customer Service and

Support. Contact CSS in North America for help with security update issues

or viruses at no charge using the PC Safety line (1-866-PCSAFETY).

International customers may request help by using any method found at this

location: http://www.microsoft.com/protect/support/default.mspx (click on

the select your region hyperlink in the first paragraph).

 

Mitigating Factors:

 

• Customers who have installed the MS08-067 security update are not affected

by this vulnerability.

 

• Windows 2000, Windows XP and Windows Server 2003 systems are primarily at

risk from this vulnerability. Customers running these platforms should

deploy MS08-067 as soon as possible.

 

• While installation of the update is the recommended action, customers who

have applied the mitigations as identified in MS08-067 will have minimized

their exposure and potential exploitability against an attack.

</QP>

Source: http://www.microsoft.com/technet/security/...ory/958963.mspx

--

~Robear Dyer (PA Bear)

MS MVP-IE, Mail, Security, Windows Desktop Experience - since 2002

AumHa VSOP & Admin http://aumha.net

DTS-L http://dts-l.net/

  • Replies 1
  • Created
  • Last Reply
Guest David H. Lipman
Posted

From: "PA Bear [MS MVP]" <PABearMVP@gmail.com>

 

| [Crossposted to Security, Security Home Users, and Windows Update

| newsgroups; Followup To set for Security newsgroup]

 

| Microsoft Security Advisory (958963): Exploit Code Published Affecting the

| Server Service

 

| Microsoft is aware that detailed exploit code demonstrating code execution

| has been published on the Internet for the vulnerability that is addressed

| by security update MS08-067. This exploit code demonstrates code execution

| on Windows 2000, Windows XP, and Windows Server 2003. Microsoft is aware of

| limited, targeted active attacks that use this exploit code. At this time,

| there are no self-replicating attacks associated with this vulnerability.

| Microsoft has activated its Software Security Incident Response Process

| (SSIRP) and is continuing to investigate this issue.

 

| Our investigation of this exploit code has verified that it does not affect

| customers who have installed the updates detailed in MS08-067 on their

| computers. Microsoft continues to recommend that customers apply the

| updates to the affected products by enabling the Automatic Updates feature

| in Windows.

 

| We continue to work with our Microsoft Security Response Alliance (MSRA) and

| Microsoft Active Protections Program (MAPP) partners so that their products

| can provide additional protections for customers. We have updated our

| Windows Live Safety Scanner, Windows Live One Care, and Forefront security

| products with protections for customers. We have also been working with our

| partners in the Global Infrastructure Alliance for Internet Safety (GIAIS)

| program to take steps to help keep attacks from spreading.

 

| Customers who believe they are affected can contact Customer Service and

| Support. Contact CSS in North America for help with security update issues

| or viruses at no charge using the PC Safety line (1-866-PCSAFETY).

| International customers may request help by using any method found at this

| location: http://www.microsoft.com/protect/support/default.mspx (click on

| the select your region hyperlink in the first paragraph).

 

| Mitigating Factors:

 

| • Customers who have installed the MS08-067 security update are not affected

| by this vulnerability.

 

| • Windows 2000, Windows XP and Windows Server 2003 systems are primarily at

| risk from this vulnerability. Customers running these platforms should

| deploy MS08-067 as soon as possible.

 

| • While installation of the update is the recommended action, customers who

| have applied the mitigations as identified in MS08-067 will have minimized

| their exposure and potential exploitability against an attack.

 

| Source: http://www.microsoft.com/technet/security/...ory/958963.mspx

| --

| ~Robear Dyer (PA Bear)

| MS MVP-IE, Mail, Security, Windows Desktop Experience - since 2002

| AumHa VSOP & Admin http://aumha.net

| DTS-L http://dts-l.net/

 

 

http://isc.sans.org/diary.html?storyid=5275

 

http://www.us-cert.gov/current/index.html#...rosoft_ms08_067

 

--

Dave

http://www.claymania.com/removal-trojan-adware.html

Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...