Welcome to Carpe Diem: Flaphead@Home Sign in | Join | Help

News



  • This information is provided "AS IS" with no warranties, and confers no rights. Also some of the information contains my views and thoughts.
    <script type="text/javascript" src="http://embed.technorati.com/embed/pe6uiuqhe.js"></script> <!-- START OF ADDME LINK --> Add Me! - Search Engine Optimization <!-- END OF ADDME LINK -->
Microsoft Security Bulletins - 10th Jan 2005

Two came out on the 10th Jan.  For a list of all the current security updates go here: http://www.microsoft.com/technet/security/current.aspx


MS06-002: Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution

An attacker who successfully exploited this vulnerability could take control of an affected system. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

We recommend that customers apply the update immediately


MS06-003: Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution

*** Does not affect Exchange 2003 with Service Pack 1 or Service Pack 2 installed ***

This update resolves a newly-discovered, privately-reported vulnerability that could allow an attacker to run arbitrary code on the system. The vulnerability is documented in the “Vulnerability Details” section of this bulletin.

On vulnerable versions of Outlook, Office Language Interface Packs, Office MultiLanguage Packs or Office Multilingual User Interface Packs, if a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of the client workstation. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

On vulnerable versions of Exchange, an attacker who successfully exploited this vulnerability could take complete control of an affected system. This vulnerability could be exploited automatically without user interaction. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

We recommend that customers apply the update immediately.


Posted: 11 January 2006 11:45 by Paul Flaherty
Filed under: ,

Comments

No Comments

New Comments to this post are disabled