Guest PA Bear [MS MVP] Posted October 27, 2008 Posted October 27, 2008 [Crossposted to Security, Security Home Users, and Windows Update newsgroups; Followup To set for Security newsgroup] Microsoft Security Advisory (958963): Exploit Code Published Affecting the Server Service <QP> Microsoft is aware that detailed exploit code demonstrating code execution has been published on the Internet for the vulnerability that is addressed by security update MS08-067. This exploit code demonstrates code execution on Windows 2000, Windows XP, and Windows Server 2003. Microsoft is aware of limited, targeted active attacks that use this exploit code. At this time, there are no self-replicating attacks associated with this vulnerability. Microsoft has activated its Software Security Incident Response Process (SSIRP) and is continuing to investigate this issue. Our investigation of this exploit code has verified that it does not affect customers who have installed the updates detailed in MS08-067 on their computers. Microsoft continues to recommend that customers apply the updates to the affected products by enabling the Automatic Updates feature in Windows. We continue to work with our Microsoft Security Response Alliance (MSRA) and Microsoft Active Protections Program (MAPP) partners so that their products can provide additional protections for customers. We have updated our Windows Live Safety Scanner, Windows Live One Care, and Forefront security products with protections for customers. We have also been working with our partners in the Global Infrastructure Alliance for Internet Safety (GIAIS) program to take steps to help keep attacks from spreading. Customers who believe they are affected can contact Customer Service and Support. Contact CSS in North America for help with security update issues or viruses at no charge using the PC Safety line (1-866-PCSAFETY). International customers may request help by using any method found at this location: http://www.microsoft.com/protect/support/default.mspx (click on the select your region hyperlink in the first paragraph). Mitigating Factors: • Customers who have installed the MS08-067 security update are not affected by this vulnerability. • Windows 2000, Windows XP and Windows Server 2003 systems are primarily at risk from this vulnerability. Customers running these platforms should deploy MS08-067 as soon as possible. • While installation of the update is the recommended action, customers who have applied the mitigations as identified in MS08-067 will have minimized their exposure and potential exploitability against an attack. </QP> Source: http://www.microsoft.com/technet/security/...ory/958963.mspx -- ~Robear Dyer (PA Bear) MS MVP-IE, Mail, Security, Windows Desktop Experience - since 2002 AumHa VSOP & Admin http://aumha.net DTS-L http://dts-l.net/ Quote
Guest David H. Lipman Posted November 4, 2008 Posted November 4, 2008 From: "PA Bear [MS MVP]" <PABearMVP@gmail.com> | [Crossposted to Security, Security Home Users, and Windows Update | newsgroups; Followup To set for Security newsgroup] | Microsoft Security Advisory (958963): Exploit Code Published Affecting the | Server Service | Microsoft is aware that detailed exploit code demonstrating code execution | has been published on the Internet for the vulnerability that is addressed | by security update MS08-067. This exploit code demonstrates code execution | on Windows 2000, Windows XP, and Windows Server 2003. Microsoft is aware of | limited, targeted active attacks that use this exploit code. At this time, | there are no self-replicating attacks associated with this vulnerability. | Microsoft has activated its Software Security Incident Response Process | (SSIRP) and is continuing to investigate this issue. | Our investigation of this exploit code has verified that it does not affect | customers who have installed the updates detailed in MS08-067 on their | computers. Microsoft continues to recommend that customers apply the | updates to the affected products by enabling the Automatic Updates feature | in Windows. | We continue to work with our Microsoft Security Response Alliance (MSRA) and | Microsoft Active Protections Program (MAPP) partners so that their products | can provide additional protections for customers. We have updated our | Windows Live Safety Scanner, Windows Live One Care, and Forefront security | products with protections for customers. We have also been working with our | partners in the Global Infrastructure Alliance for Internet Safety (GIAIS) | program to take steps to help keep attacks from spreading. | Customers who believe they are affected can contact Customer Service and | Support. Contact CSS in North America for help with security update issues | or viruses at no charge using the PC Safety line (1-866-PCSAFETY). | International customers may request help by using any method found at this | location: http://www.microsoft.com/protect/support/default.mspx (click on | the select your region hyperlink in the first paragraph). | Mitigating Factors: | • Customers who have installed the MS08-067 security update are not affected | by this vulnerability. | • Windows 2000, Windows XP and Windows Server 2003 systems are primarily at | risk from this vulnerability. Customers running these platforms should | deploy MS08-067 as soon as possible. | • While installation of the update is the recommended action, customers who | have applied the mitigations as identified in MS08-067 will have minimized | their exposure and potential exploitability against an attack. | Source: http://www.microsoft.com/technet/security/...ory/958963.mspx | -- | ~Robear Dyer (PA Bear) | MS MVP-IE, Mail, Security, Windows Desktop Experience - since 2002 | AumHa VSOP & Admin http://aumha.net | DTS-L http://dts-l.net/ http://isc.sans.org/diary.html?storyid=5275 http://www.us-cert.gov/current/index.html#...rosoft_ms08_067 -- Dave http://www.claymania.com/removal-trojan-adware.html Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.