P
PA Bear [MS MVP]
Guest
[Crossposted to Security, Security Home Users, and Windows Update
newsgroups; Followup To set for Security newsgroup]
Microsoft Security Advisory (958963): Exploit Code Published Affecting the
Server Service
<QP>
Microsoft is aware that detailed exploit code demonstrating code execution
has been published on the Internet for the vulnerability that is addressed
by security update MS08-067. This exploit code demonstrates code execution
on Windows 2000, Windows XP, and Windows Server 2003. Microsoft is aware of
limited, targeted active attacks that use this exploit code. At this time,
there are no self-replicating attacks associated with this vulnerability.
Microsoft has activated its Software Security Incident Response Process
(SSIRP) and is continuing to investigate this issue.
Our investigation of this exploit code has verified that it does not affect
customers who have installed the updates detailed in MS08-067 on their
computers. Microsoft continues to recommend that customers apply the
updates to the affected products by enabling the Automatic Updates feature
in Windows.
We continue to work with our Microsoft Security Response Alliance (MSRA) and
Microsoft Active Protections Program (MAPP) partners so that their products
can provide additional protections for customers. We have updated our
Windows Live Safety Scanner, Windows Live One Care, and Forefront security
products with protections for customers. We have also been working with our
partners in the Global Infrastructure Alliance for Internet Safety (GIAIS)
program to take steps to help keep attacks from spreading.
Customers who believe they are affected can contact Customer Service and
Support. Contact CSS in North America for help with security update issues
or viruses at no charge using the PC Safety line (1-866-PCSAFETY).
International customers may request help by using any method found at this
location: http://www.microsoft.com/protect/support/default.mspx (click on
the select your region hyperlink in the first paragraph).
Mitigating Factors:
• Customers who have installed the MS08-067 security update are not affected
by this vulnerability.
• Windows 2000, Windows XP and Windows Server 2003 systems are primarily at
risk from this vulnerability. Customers running these platforms should
deploy MS08-067 as soon as possible.
• While installation of the update is the recommended action, customers who
have applied the mitigations as identified in MS08-067 will have minimized
their exposure and potential exploitability against an attack.
</QP>
Source: http://www.microsoft.com/technet/security/advisory/958963.mspx
--
~Robear Dyer (PA Bear)
MS MVP-IE, Mail, Security, Windows Desktop Experience - since 2002
AumHa VSOP & Admin http://aumha.net
DTS-L http://dts-l.net/
newsgroups; Followup To set for Security newsgroup]
Microsoft Security Advisory (958963): Exploit Code Published Affecting the
Server Service
<QP>
Microsoft is aware that detailed exploit code demonstrating code execution
has been published on the Internet for the vulnerability that is addressed
by security update MS08-067. This exploit code demonstrates code execution
on Windows 2000, Windows XP, and Windows Server 2003. Microsoft is aware of
limited, targeted active attacks that use this exploit code. At this time,
there are no self-replicating attacks associated with this vulnerability.
Microsoft has activated its Software Security Incident Response Process
(SSIRP) and is continuing to investigate this issue.
Our investigation of this exploit code has verified that it does not affect
customers who have installed the updates detailed in MS08-067 on their
computers. Microsoft continues to recommend that customers apply the
updates to the affected products by enabling the Automatic Updates feature
in Windows.
We continue to work with our Microsoft Security Response Alliance (MSRA) and
Microsoft Active Protections Program (MAPP) partners so that their products
can provide additional protections for customers. We have updated our
Windows Live Safety Scanner, Windows Live One Care, and Forefront security
products with protections for customers. We have also been working with our
partners in the Global Infrastructure Alliance for Internet Safety (GIAIS)
program to take steps to help keep attacks from spreading.
Customers who believe they are affected can contact Customer Service and
Support. Contact CSS in North America for help with security update issues
or viruses at no charge using the PC Safety line (1-866-PCSAFETY).
International customers may request help by using any method found at this
location: http://www.microsoft.com/protect/support/default.mspx (click on
the select your region hyperlink in the first paragraph).
Mitigating Factors:
• Customers who have installed the MS08-067 security update are not affected
by this vulnerability.
• Windows 2000, Windows XP and Windows Server 2003 systems are primarily at
risk from this vulnerability. Customers running these platforms should
deploy MS08-067 as soon as possible.
• While installation of the update is the recommended action, customers who
have applied the mitigations as identified in MS08-067 will have minimized
their exposure and potential exploitability against an attack.
</QP>
Source: http://www.microsoft.com/technet/security/advisory/958963.mspx
--
~Robear Dyer (PA Bear)
MS MVP-IE, Mail, Security, Windows Desktop Experience - since 2002
AumHa VSOP & Admin http://aumha.net
DTS-L http://dts-l.net/