[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CSIRTUK ADVISORY - 3534 - Microsoft - Security Bulletin Advance Notification for January 2008



________________________________________________________________________


CSIRTUK ADVISORY - 3534 dated 04.01.08 time 16:24

Centre for the Protection of National Infrastructure (CPNI)

________________________________________________________________________

 Further details about CPNI, including information about our products
can be
 found at www.cpni.gov.uk

 Please note that CSIRTUK RSS Feeds are available from:
 http://www.cpni.gov.uk/rss/advisories.xml
________________________________________________________________________

Title
=====
3534 - Microsoft Security Bulletin Advance Notification for January 2008

Detail
======
ID: 3534
Date: 04/01/2008

------------------------------------------------------------------------
--------
Title: 3534 - Microsoft Security Bulletin Advance Notification for
January 2008
Platform level affected:Operating System
Hardware components affected:Intel PC
Specific operating systems components affected: 32-bit Windows
Net-enabled software: Other
Security software:Other
Other software: Other
Remediation Summary:Update your copy of the software with the download
available from the supplier.
Vendors affected:Microsoft
Applications affected:Windows 2000, XP, Server 2003, Vista
Adversity source: Unknown
Attack Vector: Vulnerability exploitation
Virulence: Unknown
Warning Status: Active
Potential Damage: Remote execution/modification
Possible Duration: Open Ended
Availability of fix: Future
Type of fix: Patch
Source: Microsoft
Reliability of source: Trusted
Source URL:
http://www.microsoft.com/technet/security/bulletin/ms08-jan.mspx
Abstract: Advance notification of two security bulletins that Microsoft
is intending to release on 8th January 2008.

********************************************************************

Microsoft Security Bulletin Advance Notification for January 2008

Issued: January 3, 2008

********************************************************************

This is an advance notification of two security bulletins that Microsoft
is intending to release on January 8, 2008.

The full version of the Microsoft Security Bulletin Advance Notification
for January 2008 can be found at
http://www.microsoft.com/technet/security/bulletin/ms08-jan.mspx.

This bulletin advance notification will be replaced with the January
bulletin summary on January 8, 2008. For more information about the
bulletin advance notification service, see
http://www.microsoft.com/technet/security/Bulletin/advance.mspx.

To receive automatic notifications whenever Microsoft Security Bulletins
are issued, subscribe to Microsoft Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

Microsoft will host a webcast to address customer questions on these
bulletins on Wednesday, January 9, 2008, at 11:00 AM Pacific Time (US &
Canada). Register for the January Security Bulletin Webcast at
http://www.microsoft.com/technet/security/bulletin/summary.mspx.

Microsoft also provides information to help customers prioritize monthly
security updates with any non-security, high-priority updates that are
being released on the same day as the monthly security updates. Please
see the section, Other Information.

 

Critical Security Bulletins

===========================

Microsoft Security Bulletin 1

- Affected Software: 

- Microsoft Windows 2000 Service Pack 4

- Windows XP Service Pack 2

- Windows XP Professional x64 Edition

- Windows XP Professional x64 Edition Service Pack 2

- Windows Server 2003 Service Pack 1

- Windows Server 2003 Service Pack 2

- Windows Server 2003 x64 Edition

- Windows Server 2003 x64 Edition Service Pack 2

- Windows Server 2003 with SP1 for Itanium-based Systems

- Windows Server 2003 with SP2 for Itanium-based Systems

- Windows Vista

- Windows Vista x64 Edition

- Impact: Remote Code Execution

- Version Number: 1.0

Important Security Bulletins

============================

Microsoft Security Bulletin 2

- Affected Software: 

- Microsoft Windows 2000 Service Pack 4

- Windows XP Service Pack 2

- Windows XP Professional x64 Edition

- Windows XP Professional x64 Edition Service Pack 2

- Windows Server 2003 Service Pack 1

- Windows Server 2003 Service Pack 2

- Windows Server 2003 x64 Edition

- Windows Server 2003 x64 Edition Service Pack 2

- Windows Server 2003 with SP1 for Itanium-based Systems

- Windows Server 2003 with SP2 for Itanium-based Systems

- Impact: Local Elevation of Privilege

- Version Number: 1.0

Other Information

=================

Microsoft Windows Malicious Software Removal Tool:

==================================================

Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services, and the Download Center.

Note that this tool will not be distributed using Software Update
Services (SUS).

Non-Security, High-Priority Updates on MU, WU, and WSUS:

========================================================

For this month:

* Microsoft is planning to release five non-security,

high-priority updates on Microsoft Update (MU) and

Windows Server Update Services (WSUS).

* Microsoft is planning to release two non-security,

high-priority update for Windows on Windows Update (WU) and

WSUS.

Note that this information pertains only to non-security, high-priority
updates on Microsoft Update, Windows Update, Windows Server Update
Services, and Software Update Services released on the same day as the
Security Bulletin Summary. Information will not be provided about
non-security updates released on other days.

Recognize and avoid fraudulent e-mail to Microsoft customers:

=============================================================

If you receive an e-mail message that claims to be distributing a
Microsoft security update, it is a hoax that may contain malware or
pointers to malicious Web sites. Microsoft does not distribute security
updates via e-mail.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign
all security notifications. However, it is not required to read security
notifications, read security bulletins, or install security updates. You
can obtain the MSRC public PGP key at
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.

To receive automatic notifications whenever Microsoft Security Bulletins
are issued, subscribe to Microsoft Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

********************************************************************

THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE.

IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR
ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.

SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT
APPLY.

********************************************************************

________________________________________________________________________

CPNI values your feedback.

1. Which of the following most reflects the value of the advisory to
you?
(Place an 'X' next to your choice)

Very useful:__ Useful:__ Not useful:__

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our advisories?


Thank you for your contribution.

________________________________________________________________________

CSIRTUK wishes to acknowledge the contributions of Microsoft for the
information
contained in this advisory.
________________________________________________________________________

This advisory contains information released by the original author. Some
of the
information may have changed since it was released. If the issue affects
you,
it may be prudent to retrieve the advisory from the site of the original
source to ensure that you receive the most current information
concerning that
problem.

Reference to any specific commercial product, process, or service by
trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its
endorsement, recommendation, or favouring by CPNI. The views and
opinions of
authors expressed within this notice shall not be used for advertising
or
product endorsement purposes.

CPNI shall not accept responsibility for any errors or omissions
contained
within this advisory. In particular, they shall not be liable for any
loss or
damage whatsoever, arising from or in connection with the usage of
information
contained within this advisory.

CSIRTUK is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams (IRTs)
in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing amongst
its
members and the community at large.
________________________________________________________________________

<End of CPNI Advisory>


The original of this email was scanned for viruses by the Government Secure Intranet virus scanning service supplied by Cable&Wireless in partnership with MessageLabs. (CCTM Certificate Number 2007/11/0032.) On leaving the GSi this email was certified virus free.
Communications via the GSi may be automatically logged, monitored and/or recorded for legal purposes.