CariDotMy

 Forgot password?
 Register

ADVERTISEMENT

12
Return to list New
Author: Sarah_Radzi

nah korang, untuk mengelakkan korangkerja overtime

[Copy link]
 Author| Post time 16-10-2003 01:49 PM | Show all posts

kena counter check kat website microsoft .. pgp signature not verified

-----BEGIN PGP SIGNED MESSAGE-----

- --------------------------------------------------------------------
Title: Microsoft Exchange Server Security Bulletin Summary for
       October 2003
Issued: October 15, 2003
Version Number: 1.0
Bulletin: http://www.microsoft.com/technet/security/excoct03.asp
- --------------------------------------------------------------------

Summary:
========
Included in this advisory are updates for two newly discovered
vulnerabilities in Microsoft Exchange Server. These vulnerabilities,
broken down by severity are:

\\Critical Security Bulletins\\

    MS03-046 - Vulnerability in Exchange Server could allow
               Arbitrary Code Execution (829436)

             - Affected Software:
               - Exchange Server 5.5
               - Exchange 2000 Server

             - Impact: Remote Code Execution
             - Version Number: 1.0

\\Moderate Security Bulletins\\

    MS03-047 - Vulnerability in Exchange Server 5.5 Outlook Web
               Access Could Allow Cross-Site Scripting Attack
               (828489)

             - Affected Software:
               - Exchange Server 5.5

             - Impact: Remote Code Execution
             - Version Number: 1.0

   
Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Exchange
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/excoct03.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- - Jo鉶 Gouveia ([email protected]) for reporting the issue
described in MS03-046.

- - Ory Segal of Sanctum Inc. (http://www.sanctuminc.com/) for
reporting
the issue described in MS03-047.


Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PCSAFETY. There is no charge for support calls
associated with security patches.

Revisions:
==========
* V1.0 October 15, 2003: Bulletin Created.


********************************************************************
Protect your PC:
Microsoft has provided information on how you can
help protect your PC at the following locations:
http://www.microsoft.com/technet/security/protect

Patch Management Strategies:
The Microsoft Guide to Security Patch Management Web Site provides
additional information about Microsoft's best practice
recommendations for applying security patches:
http://www.microsoft.com/technet ... tch/secpatch/Defaul
t.asp

IT Pro Security Zone Community:
Learn to improve security and optimize your IT infrastructure,
and participate with other IT Pros on security topics:
http://www.microsoft.com/technet/security/community/default.mspx

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
- --------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.
- --------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQEVAwUBP42V/40ZSRQxA/UrAQGBpQf/QfirolX/+4hkE/oy85o/zOWUkjBlJZTc
BGaJ5R4P9NOQGr/cHuYkRj0I4F8GgxzG6/4L/QAeJUUc0ZMW9cz4wTHyVUK9Wvwi
CAbPNVV2v0ONeIl3JwTXLDtMnGIOl26NDBbYDTNGeskzN1sX6GtghkFtmchniACN
XwOvoauVHVDRwx532wLqsOuTvLXYGhsXAMAg6fvIRgnwqwlh7TiH+46BJaqprwnS
PtEG8eStCzsFbLmWe21OtJD1sIB2eOpFBLIjQDc3DIbzZ3keJPwgUi6y9SRTPbA3
L7NLWAE1efQKn50WeI0ZyMAMAdZCXc6bjKEjxVVsj9Gmzb8NJX+5zw==
=LAjg
-----END PGP SIGNATURE-----
Reply

Use magic Report


ADVERTISEMENT


 Author| Post time 16-10-2003 01:50 PM | Show all posts
----------------------------------------------------------------------
Title:      Cumulative Patch for Internet Explorer (828750)
Date:       October 3, 2003
Software:   Internet Explorer 5.01
            Internet Explorer 5.5
            Internet Explorer 6.0
            Internet Explorer 6.0 for Windows Server 2003
Impact:     Run code of attacker's choice
Max Risk:   Critical
Bulletin:   MS03-040

Microsoft encourages customers to review the Security Bulletins at:
    http://www.microsoft.com/technet/security/bulletin/MS03-040.asp
    http://www.microsoft.com/security/security_bulletins/MS03-040.asp
----------------------------------------------------------------------

Issue:
======
This is a cumulative patch that includes the functionality of all
previously released patches for Internet Explorer 5.01, 5.5 and 6.0.
In addition, it eliminates the following newly discovered
vulnerabilities:

A vulnerability that occurs because Internet Explorer does not
properly determine an object type returned from a Web server in a
popup window. It could be possible for an attacker who exploited this
vulnerability to run arbitrary code on a user's system. If a user
visited an attacker's Web site, it would be possible for the attacker
to exploit this vulnerability without any other user action. An
attacker could also craft an HTML-based e-mail that would attempt to
exploit this vulnerability.

A vulnerability that occurs because Internet Explorer does not
properly determine an object type returned from a Web server during
XML data binding. It could be possible for an attacker who exploited
this vulnerability to run arbitrary code on a user's system. If a
user visited an attacker's Web site, it would be possible for the
attacker to exploit this vulnerability without any other user action.
An attacker could also craft an HTML-based e-mail that would attempt
to exploit this vulnerability.

A change has been made to the method by which Internet Explorer
handles Dynamic HTML (DHTML) Behaviors in the Internet Explorer
Restricted Zone.  It could be possible for an attacker exploiting a
separate vulnerability (such as one of the two vulnerabilities
discussed above) to cause Internet Explorer to run script code in the
security context of the Internet Zone. In addition, an attacker could
use Windows Media Player's (WMP) ability to open URL's to construct
an attack. An attacker could also craft an HTML-based e-mail that
could attempt to exploit this behavior.

To exploit these flaws, the attacker would have to create a specially
formed HTML-based e-mail and send it to the user. Alternatively an
attacker would have to host a malicious Web site that contained a Web
page designed to exploit these vulnerabilities. The attacker would
then have to persuade a user to visit that site.

As with the previous Internet Explorer cumulative patches released
with bulletins MS03-004, MS03-015,  MS03-020, and MS03-032, this
cumulative patch will cause window.showHelp( ) to cease to function
if you have not applied the HTML Help update. If you have installed
the updated HTML Help control from Knowledge Base article 811630, you
will still be able to use HTML Help functionality after applying this
patch.

In addition to applying this security patch it is recommended that
users also install the Windows Media Player update referenced in
Knowledge Base Article 828026.  This update is available from Windows
Update as well as the Microsoft Download Center for all supported
versions of Windows Media Player. While not a security patch, this
update contains a change to the behavior of Windows Media Player's
ability to launch URL's to help protect against DHTML behavior based
attacks.  Specifically, it restricts Windows Media Player's ability
to launch URL's in the local computer zone from other zones.

Mitigating Factors:
====================
-By default, Internet Explorer on Windows Server 2003 runs in
Enhanced
Security Configuration. This default configuration of Internet
Explorer
blocks automatic exploitation of this attack. If Internet Explorer
Enhanced Security Configuration has been disabled, the protections
put in place that prevent this vulnerability from being automatically
exploited would be removed.

-In the Web-based attack scenario, the attacker would have to host a
Web site that contained a Web page used to exploit this
vulnerability.  An attacker would have no way to force a user to
visit a malicious Web Site. Instead, the attacker would need to lure
them there, typically by getting them to click a link that would take
them to the attacker's site.

-Exploiting the vulnerability would allow the attacker only the same
privileges as the user. Users whose accounts are configured to have
few privileges on the system would be at less risk than ones who
operate with administrative privileges.

Risk Rating:
============
-Critical

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
   Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/MS03-040.asp
    http://www.microsoft.com/security/security_bulletins/MS03-040.asp
   for information on obtaining this patch.


---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE
FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.
Reply

Use magic Report

 Author| Post time 16-10-2003 01:50 PM | Show all posts

ni pun tak verified gak

-----BEGIN PGP SIGNED MESSAGE-----

- --------------------------------------------------------------------
Title: Microsoft Windows Security Bulletin Summary for October
2003
Issued: October 15, 2003
Version Number: 1.0
Bulletin: http://www.microsoft.com/technet/security/winoct03.asp
- --------------------------------------------------------------------

Summary:
========
Included in this advisory are updates for five newly discovered
vulnerabilities in Microsoft Windows. These vulnerabilities,
broken down by severity are:

\\Critical Security Bulletins\\

    MS03-041 - Vulnerability in Authenticode Could Allow Remote
               Code Execution (823182)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.0

    MS03-042 - Buffer Overflow in the Windows Troubleshooter
               ActiveX Control Could Allow Code Execution (826232)

             - Affected Software:
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4

             - Impact: Remote Code Execution
             - Version Number: 1.0

    MS03-043 - Buffer Overrun in Messenger Service Could Allow
               Code Execution (828035)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.0

    MS03-044 - Buffer Overflow in Windows Help and Support Center
               Could lead to System Compromise (825119)

             - Affected Software:
               - Windows Millennium Edition
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.0

\\Important Security Bulletins\\

    MS03-045 - Buffer Overrun in the ListBox and in the ComboBox   
               Control Could Allow Code Execution (824141)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.0

   
Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Windows
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/winoct03.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- - Greg Jones of KPMG UK (http://www.kpmg.co.uk) and
    Cesar Cerrudo ([email protected])
    for reporting the issue described in MS03-042.

- - The Last Stage of Delirium Research Group (http://lsd-pl.net)
    for reporting the issue in MS03-043.

- - David Litchfield of Next Generation Security Software Ltd.
    (http://www.nextgenss.com)
    for reporting the issue in MS03-044.

- - Brett Moore of Security-Assessment.com
    (http://www.security-assessment.com)
    for reporting the issue in MS03-045.

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PCSAFETY. There is no charge for support calls
associated with security patches.

Revisions:
==========
* V1.0 October 15, 2003: Bulletin Created.


********************************************************************
Protect your PC:
Microsoft has provided information on how you can
help protect your PC at the following locations:
http://www.microsoft.com/technet/security/protect

Patch Management Strategies:
The Microsoft Guide to Security Patch Management Web Site provides
additional information about Microsoft's best practice
recommendations for applying security patches:
http://www.microsoft.com/technet ... tch/secpatch/Defaul
t.asp

IT Pro Security Zone Community:
Learn to improve security and optimize your IT infrastructure,
and participate with other IT Pros on security topics:
http://www.microsoft.com/technet/security/community/default.mspx

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
- --------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
- --------------------------------------------------------------------


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQEVAwUBP42W4I0ZSRQxA/UrAQFGowf+MPOn14ykPMlaJ7MTaQn7egikb9tKAUO9
Hsmn5peRN61dBfb9rgGzWkHiyGd42/cH6SB+uSuyoO+HMWBebgUAXvCWm2xaEIWk
KUJZV2JDH5fe19GwrcPVY0KBkmbrLk97ypl75Dfkn4HDuJTR/XO7DTYqMNlBX5S5
3C53hsElQciC9Huzy2UguOGqzl0lV5WL5dwggj58p04w9wY25xQvTpbl1Hp5/4Xx
vCDsX2snAmgEKVBaEUVuN5HLEFKNBI+VVNXbtjf9l2VUpzzJ/rvk/elereC4cACx
WkZ9j6wOHmeolDwC5mu+xVEeSD52qhfXsQJYjlxVLQ0/ALBa5mGkzg==
=LZVf
-----END PGP SIGNATURE-----
Reply

Use magic Report

Menfreya This user has been deleted
Post time 16-10-2003 11:57 PM | Show all posts
giler byk patch windows nih...nih yg tak larat aku nak kasik update sumer....
Reply

Use magic Report

Post time 17-10-2003 12:57 AM | Show all posts
Hehe OS lain tak payah nak dipatch ke???
Reply

Use magic Report

 Author| Post time 17-10-2003 01:26 AM | Show all posts
Originally posted by Remy_3D at 2003-10-16 18:57:
Hehe OS lain tak payah nak dipatch ke???


hehehe .. biasanya .. org org yang guna OS lain .. dia tahu patch sendiri .. takyah org suruh ... biasanya laa ..
Reply

Use magic Report

Follow Us
 Author| Post time 12-11-2003 07:14 AM | Show all posts
******** *BEGIN ENCRYPTED or SIGNED PART* *********

--------------------------------------------------------------------
Title: Microsoft Windows Security Bulletin Summary for
       November 2003
Issued: November 11, 2003
Version Number: 1.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winnov03.asp
--------------------------------------------------------------------

Summary:
========
Included in this advisory are three updates describing newly
discovered vulnerabilities in Microsoft Windows. These
vulnerabilities, broken down by severity are:

** Critical Security Bulletins

    MS03-048 - Cumulative Update for Internet Explorer (824145)

             - Affected Software:
               - Microsoft Windows Millennium Edition
               - Microsoft Windows NT Workstation 4.0,
                 Service Pack 6a
               - Microsoft Windows NT Server 4.0, Service Pack 6a
               - Microsoft Windows NT Server 4.0, Terminal Server
                 Edition, Service Pack 6
               - Microsoft Windows 2000 Service Pack 2, Service
                 Pack 3, and Service Pack 4
               - Microsoft Windows XP,
                 Microsoft Windows XP Service Pack 1
               - Microsoft Windows XP 64-Bit Edition
               - Microsoft Windows XP 64-Bit Edition Version 2003
               - Microsoft Windows Server 2003
               - Microsoft Windows Server 2003 64 bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.0

    MS03-049 - Buffer Overrun in the Workstation Service Could Allow
               Code Execution (828749)

             - Affected Software:
               - Microsoft Windows 2000 Service Pack 2, Service
                 Pack 3, and Service Pack 4
               - Microsoft Windows XP,
                 Microsoft Windows XP Service Pack 1
               - Microsoft Windows XP 64-Bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.0

    MS03-051 - Buffer Overrun in Microsoft FrontPage Server
               Extensions Could Allow Code Execution (813360)

             - Affected Software:
               - Microsoft Windows 2000 Service Pack 2, Service
                 Pack 3
               - Microsoft Windows XP,
                 Microsoft Windows XP Service Pack 1
               - Microsoft Office XP,
                 Microsoft Office Service Release 1

             - Impact: Remote Code Execution
             - Version Number: 1.0

Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For a11itional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Windows Security
Bulletin Summary for November 2003 at:
http://www.microsoft.com/technet/security/bulletin/winnov03.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- jelmer
     ([email protected])
     for reporting the issue described in MS03-048.

- eEye Digital Security
     (http://www.eeye.com/)
     for reporting the issue described in MS03-049.

- Brett Moore of Security-Assessment.com
     (http://www.security-assessment.com/)
     for reporting the issue described in MS03-051.

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PCSAFETY (1-866-727-2338). There is no charge
for support calls associated with security patches.

International customers can get support from their local Microsoft
subsidiaries. There is no charge for support associated
with security updates. Information on how to contact Microsoft
support is available at
http://support.microsoft.com/common/international.aspx.

Revisions:
==========
* V1.0 November 2003: Bulletin Created.
********************************************************************
Protect your PC: Microsoft has provided information on how you
can help protect your PC at the following locations:
http://www.microsoft.com/technet/security/tips/pcprotec.asp

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------




********** *END ENCRYPTED or SIGNED PART* **********
Reply

Use magic Report

 Author| Post time 12-11-2003 07:14 AM | Show all posts
********* *BEGIN ENCRYPTED or SIGNED PART* *********

--------------------------------------------------------------------
Title: Microsoft Windows Security Bulletin Summary for
       October 2003
Issued: October 15, 2003
Updated: October 22, 2003
Version Number: 2.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp
--------------------------------------------------------------------

Reason for Major Revision
=========================
Subsequent to the release of the Windows Security Bulletin Summary
for October, the following bulletin has undergone a major revision
increment.  Please see the appropriate bulletin section of this
email for more details.

- MS03-045

Summary:
========
Included in this advisory are updates for five newly discovered
vulnerabilities in Microsoft Windows. These vulnerabilities,
broken down by severity are:

** Critical Security Bulletins

    MS03-041 - Vulnerability in Authenticode Could Allow Remote

               Code Execution (823182)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.1

    MS03-042 - Buffer Overflow in the Windows Troubleshooter
               ActiveX Control Could Allow Code Execution (826232)

             - Affected Software:
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4

             - Impact: Remote Code Execution
             - Version Number: 1.1

    MS03-043 - Buffer Overrun in Messenger Service Could Allow
               Code Execution (828035)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.1


    MS03-044 - Buffer Overflow in Windows Help and Support Center
               Could lead to System Compromise (825119)

             - Affected Software:
               - Windows Millennium Edition
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.1


** Important Security Bulletins

    MS03-045 - Buffer Overrun in the ListBox and in the ComboBox
               Control Could Allow Code Execution (824141)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 2.0

     Reason for Major Revision, V2.0 October 22, 2003:
     =================================================
     Subsequent to the release of this bulletin and the associated
     patches, a compatibility problem with some third party
     software has been identified with a set of language specific
     versions of the Windows 2000 Service Pack 4 patch. This problem
     is unrelated to the security vulnerability discussed in this
     bulletin. Customers who have applied the patch are protected
     against the vulnerability discussed in this bulletin.

     Microsoft has developed a fix for this issue and is
     re-releasing this bulletin to reflect the new updated patches.
     The compatibility problems only affect the language versions
     of the patch listed within the bulletin and only those versions
     of the patch are being re-released. Other language versions of
     this patch are not affected and are not being re-released.
     Please note that the new security patches support both the
     Setup switches originally documented in this bulletin as well
     as a set of new Setup switches that are document in the
     Installation Information Section of this bulletin.
     Additionally, the updated language versions support Windows
     2000 Service Pack 2, Windows 2000 Service Pack 3, and
     Windows 2000 Service Pack 4 in a single security patch.


Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Windows
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- Greg Jones of KPMG UK (http://www.kpmg.co.uk) and
     Cesar Cerrudo ([email protected])
     for reporting the issue described in MS03-042.

- The Last Stage of Delirium Research Group (http://lsd-pl.net)
     for reporting the issue in MS03-043.

- David Litchfield of Next Generation Security Software Ltd.
     (http://www.nextgenss.com)
     for reporting the issue in MS03-044.

- Brett Moore of Security-Assessment.com
     (http://www.security-assessment.com)
     for reporting the issue in MS03-045.

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.

Revisions:
==========
* V1.0 October 15, 2003: Bulletin Created.
* V2.0 October 22, 2003: Updated to include details of the
  major revisions in MS03-045.

********************************************************************
Protect your PC: Microsoft has provided information on how you
can help protect your PC at the following locations:
http://www.microsoft.com/technet/security/tips/pcprotec.asp
Mitigation Strategies: Additional mitigation strategies and
techniques for securing corporate infrastructures can be found
at: http://www.microsoft.com/technet/mitigation.asp

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------




********** *END ENCRYPTED or SIGNED PART* **********
Reply

Use magic Report


ADVERTISEMENT


 Author| Post time 12-11-2003 07:14 AM | Show all posts
********* *BEGIN ENCRYPTED or SIGNED PART* *********

--------------------------------------------------------------------
Title: Microsoft Exchange Server Security Bulletin Summary for
       October 2003
Issued: October 15, 2003
Updated: October 22, 2003
Version Number: 2.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/excoct03.asp
--------------------------------------------------------------------

Reason for Major Revision
=========================
Subsequent to the release of the Windows Security Bulletin Summary
for October, the following bulletin has undergone a major revision
increment.  Please see the appropriate bulletin section of this
email for more details.

- MS03-047

Summary:
========
Included in this advisory are updates for two newly discovered
vulnerabilities in Microsoft Exchange Server. These vulnerabilities,
broken down by severity are:


** Critical Security Bulletins

    MS03-046 - Vulnerability in Exchange Server could allow
               Arbitrary Code Execution (829436)

             - Affected Software:
               - Exchange Server 5.5
               - Exchange 2000 Server

             - Impact: Remote Code Execution
             - Version Number: 1.1

** Moderate Security Bulletins

    MS03-047 - Vulnerability in Exchange Server 5.5 Outlook Web
               Access Could Allow Cross-Site Scripting Attack
               (828489)

             - Affected Software:
               - Exchange Server 5.5

             - Impact: Remote Code Execution
             - Version Number: 2.0

     Reason for Major Revision, V2.0 October 22, 2003:
     =================================================
     Subsequent to the original release of this bulletin, it was
     discovered that certain languages were not covered by the
     original patch. This bulletin has been updated to provide
     information about a new patch, which is intended for customers
     having installed a language from the Language Packs for
     Outlook Web Access. In addition, for this patch to function
     properly the Outlook Web Access (OWA) server on which the
     patch is installed must have Internet Explorer 5.01 or greater
     installed. If the patch is installed on a system with a version
     of IE less than 5.01, unexpected consequences may result.
     The "Caveats" section has been updated to include version
     requirements for this patch. It also contains version
     recommendations for dependent components that are applicable at
     the time of this writing. The deployment section has also been
     expanded to discuss in detail how to download and install this
     security patch.


Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Exchange
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/bulletin/excoct03.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- Jo鉶 Gouveia ([email protected])
     for reporting the issue described in MS03-046.

- Ory Segal of Sanctum Inc. (http://www.sanctuminc.com/)
     for reporting the issue described in MS03-047.


Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no charge for
support calls associated with security patches.

Revisions:
==========
* V1.0 October 15, 2003: Bulletin Created.
* V2.0 October 22, 2003: Updated to include details of the
  major revisions in MS03-047.

********************************************************************
Protect your PC:
Microsoft has provided information on how you can
help protect your PC at the following locations:
http://www.microsoft.com/technet/security/protect

Patch Management Strategies:
The Microsoft Guide to Security Patch Management Web Site provides
additional information about Microsoft's best practice
recommendations for applying security patches:
http://www.microsoft.com/technet ... patch/secpatch/Defa
ult.asp

IT Pro Security Zone Community:
Learn to improve security and optimize your IT infrastructure,
and participate with other IT Pros on security topics:
http://www.microsoft.com/technet/security/community/default.mspx

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------



********** *END ENCRYPTED or SIGNED PART* **********
Reply

Use magic Report

 Author| Post time 12-11-2003 07:15 AM | Show all posts
--------------------------------------------------------------------
Title: Microsoft Windows Security Bulletin Summary for
       October 2003
Issued: October 15, 2003
Updated: October 29, 2003
Version Number: 3.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp
--------------------------------------------------------------------

Reason for Major Revision
=========================
Subsequent to the release of the Windows Security Bulletin Summary
for October, the following bulletins have undergone a major revision
increment.  Please see the appropriate bulletin section of this
email for more details.

- MS03-042
- MS03-043
- MS03-045

Summary:
========
Included in this advisory are updates for five newly discovered
vulnerabilities in Microsoft Windows. These vulnerabilities,
broken down by severity are:

** Critical Security Bulletins

    MS03-041 - Vulnerability in Authenticode Could Allow Remote

               Code Execution (823182)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.1

    MS03-042 - Buffer Overflow in the Windows Troubleshooter
               ActiveX Control Could Allow Code Execution (826232)

             - Affected Software:
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4

             - Impact: Remote Code Execution
             - Version Number: V2.0

     Reason for Major Revision, V2.0 October 29, 2003:
     =================================================
     Microsoft re-issued this bulletin on October 29, 2003 to
     advise on the availability of an updated Windows 2000 patch.

     This revised patch corrects the Debug Programs
(SeDebugPrivilege)
     user right issue that some customers experienced with the
     original patch that is discussed in Knowledge Base Article
830846.

     This problem is unrelated to the security vulnerability
     discussed in this bulletin. Customers who have already applied
     the patch are protected against the vulnerability discussed in
     this bulletin.

    MS03-043 - Buffer Overrun in Messenger Service Could Allow
               Code Execution (828035)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 2.0

     Reason for Major Revision, V2.0 October 29, 2003:
     =================================================
     Microsoft re-issued this bulletin on October 29, 2003 to
     advise on the availability of an updated Windows 2000,
     Windows XP, and Windows Server 2003 patch.

     This revised patch corrects the Debug Programs
(SeDebugPrivilege)
     user right issue that some customers experienced with the
     original patch that is discussed in Knowledge Base Article
830846.

     This problem is unrelated to the security vulnerability
     discussed in this bulletin. Customers who have already applied
     the patch are protected against the vulnerability discussed in
     this bulletin.

    MS03-044 - Buffer Overflow in Windows Help and Support Center
               Could lead to System Compromise (825119)

             - Affected Software:
               - Windows Millennium Edition
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.1


** Important Security Bulletins

    MS03-045 - Buffer Overrun in the ListBox and in the ComboBox
               Control Could Allow Code Execution (824141)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 3.0

     Reason for Major Revision, V3.0 October 29, 2003:
     =================================================
     Microsoft re-issued this bulletin on October 29, 2003 to
     advise on the availability of an updated Windows XP
     patch.

     This revised patch corrects the Debug Programs
(SeDebugPrivilege)
     user right issue that some customers experienced with the
     original patch that is discussed in Knowledge Base Article
830846.

     This problem is unrelated to the security vulnerability
     discussed in this bulletin. Customers who have already applied
     the patch are protected against the vulnerability discussed in
     this bulletin.

Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Windows
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- Greg Jones of KPMG UK (http://www.kpmg.co.uk) and
     Cesar Cerrudo ([email protected])
     for reporting the issue described in MS03-042.

- The Last Stage of Delirium Research Group (http://lsd-pl.net)
     for reporting the issue in MS03-043.

- David Litchfield of Next Generation Security Software Ltd.
     (http://www.nextgenss.com)
     for reporting the issue in MS03-044.

- Brett Moore of Security-Assessment.com
     (http://www.security-assessment.com)
     for reporting the issue in MS03-045.

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.

Revisions:
==========
* V1.0 October 15, 2003: Bulletin Created.
* V2.0 October 22, 2003: Updated to include details of the
  major revisions in MS03-045.
* V3.0 October 29, 2003: Updated to include details of the
  major revisions in MS03-042, MS03-043, MS03-045.

********************************************************************
Protect your PC: Microsoft has provided information on how you
can help protect your PC at the following locations:
http://www.microsoft.com/technet/security/tips/pcprotec.asp
Mitigation Strategies: Additional mitigation strategies and
techniques for securing corporate infrastructures can be found
at: http://www.microsoft.com/technet/mitigation.asp

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------
Reply

Use magic Report

winzip This user has been deleted
Post time 13-11-2003 06:02 PM | Show all posts
panjangggg nyerrr...
Reply

Use magic Report

 Author| Post time 14-1-2004 08:14 PM | Show all posts
- --------------------------------------------------------------------
Title:  Microsoft Windows Security Bulletin Summary for
        January 2004
Issued: January 13, 2004
Version Number: 1.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winjan04.asp

- --------------------------------------------------------------------

Summary:
========
Included in this advisory is an update for a newly discovered
vulnerability in Microsoft Data Access Components (MDAC).
This vulnerability is rated Important.

   MS04-003 - Buffer Overrun in MDAC Function Could Allow Code
       Execution (832483)

             - Affected Software:
               - Microsoft Data Access Components 2.5 (included with
                    Microsoft Windows 2000)
               - Microsoft Data Access Components 2.6 (included with
                    Microsoft SQL Server 2000)
               - Microsoft Data Access Components 2.7 (included with
                    Microsoft Windows XP)
               - Microsoft Data Access Components 2.8 (included with
                    Microsoft Windows Server 2003)

              - Impact: Remote Code Execution
              - Version Number: 1.0


Update Availability:
===================
An update is available to fix this vulnerability.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Update
Deployment Information please read the Microsoft Windows Security
Bulletin Summary for January at:
http://www.microsoft.com/technet/security/bulletin/winjan04.asp

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.
International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews

* Join our Microsoft webcast for a live discussion of the technical
  details of the January security bulletins and steps you can take
  to protect your environment. Details can be found at:

  http://msevents.microsoft.com/CUI/EventDetail.aspx?
  EventID=1032241586&Culture=en-US

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security patch, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security patches via e-mail.
  You can learn more about Microsoft's software distribution
  policies here:

  http://www.microsoft.com/technet/security/policy/swdist.asp


Revisions:
==========
* V1.0 January 13, 2004: Bulletin Created.
********************************************************************
Protect your PC: Microsoft has provided information on how you
can help protect your PC at the following locations:
http://www.microsoft.com/security/protect/

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
- --------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
- --------------------------------------------------------------------
Reply

Use magic Report

 Author| Post time 14-1-2004 08:14 PM | Show all posts
********* *BEGIN ENCRYPTED or SIGNED PART* *********

--------------------------------------------------------------------
Title:  Microsoft Exchange Server Security Bulletin Summary for
        January 2004
Issued: January 13, 2004
Version Number: 1.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/excjan04.asp

--------------------------------------------------------------------

Summary:
========
Included in this advisory is an update for a newly discovered
Vulnerability in Microsoft Exchange Server 2003.
This vulnerability is rated Moderate.

   MS04-002 - Vulnerability in Exchange Server 2003 Could Lead to
       Privilege Escalation (832759)

             - Affected Software:
               - Microsoft Exchange Server 2003

             - Impact: Elevation of Privilege
             - Version Number: 1.0


Update Availability:
===================
An update is available to fix this vulnerability.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Update
Deployment Information please read the Microsoft Exchange Server
2003 Security Bulletin Summary for January at:
http://www.microsoft.com/technet/security/bulletin/excjan04.asp

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.
International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at:
http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews

* Join our Microsoft webcast for a live discussion of the technical
  details of the January security bulletins and steps you can take
  to protect your environment. Details can be found at:

  http://msevents.microsoft.com/CUI/EventDetail.aspx?
  EventID=1032241586&Culture=en-US

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security patch, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security patches via e-mail.
  You can learn more about Microsoft's software distribution
  policies here:

  http://www.microsoft.com/technet/security/policy/swdist.asp


Revisions:
==========
* V1.0 January 13, 2004: Bulletin Created.
********************************************************************
Protect your PC: Microsoft has provided information on how you
can help protect your PC at the following locations:
http://www.microsoft.com/security/protect/

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------




********** *END ENCRYPTED or SIGNED PART* **********
Reply

Use magic Report

 Author| Post time 14-1-2004 08:14 PM | Show all posts
********* *BEGIN ENCRYPTED or SIGNED PART* *********

--------------------------------------------------------------------
Title:  Microsoft ISA Server Security Bulletin Summary for
        January 2004
Issued: January 13, 2004
Version Number: 1.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/isajan04.asp

--------------------------------------------------------------------

Summary:
========
Included in this advisory is an update for a newly discovered
vulnerability in Microsoft Internet Security and Acceleration
Server 2000. This vulnerability is rated Critical.

   MS04-001 - Vulnerability in ISA Server H.323 Filter Could
              Allow Remote Code Execution (816458)

             - Affected Software:
               - Microsoft Internet Security and
                 Acceleration Server 2000
               - Microsoft Small Business Server 2000 (which
                     includes Microsoft Internet Security and
                     Acceleration Server 2000)
               - Microsoft Small Business Server 2003 (which
                     includes Microsoft Internet Security and
                     Acceleration Server 2000)

             - Impact: Remote Code Execution
             - Version Number: 1.0


Update Availability:
===================
An update is available to fix this vulnerability.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Update
Deployment Information please read the Microsoft ISA Server
Security Bulletin Summary for January at:
http://www.microsoft.com/technet/security/bulletin/isajan04.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- The UK National Infrastructure Security Co-ordination Centre
(NISCC) (http://www.niscc.gov.uk) for reporting the issue described
in MS04-001.

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.
International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews

* Join our Microsoft webcast for a live discussion of the technical
  details of the January security bulletins and steps you can take
  to protect your environment. Details can be found at:

  http://msevents.microsoft.com/CUI/EventDetail.aspx?
  EventID=1032241586&Culture=en-US

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security patch, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security patches via e-mail.
  You can learn more about Microsoft's software distribution
  policies here:

  http://www.microsoft.com/technet/security/policy/swdist.asp


Revisions:
==========
* V1.0 January 13, 2004: Bulletin Created.
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------




********** *END ENCRYPTED or SIGNED PART* **********
Reply

Use magic Report

Post time 15-1-2004 12:44 AM | Show all posts
dah takde kerja Sarah?
Reply

Use magic Report

Post time 24-1-2004 02:15 AM | Show all posts
itu kira kerja lah tu, bagi kesedaran kepada para pengguna produk microsoft.. kira kerja amal lah tu kan.. ker ko ada syer kat microsoft tu??? ko kerja sana yer???
Reply

Use magic Report


ADVERTISEMENT


Post time 28-1-2004 07:06 PM | Show all posts
kalau nak bandingkan la..
patch windows paling slow kluar berbanding os lain...
even kalau LINUX/BSD/*NIX patch tuh kadang2 hari2 kluar.. tapi tgk untuk apa la.. ada yg minor2 bugs.. ada yg security punye... tuh kene patch terus la... nanti nayaaaa.. pastikan takde backdoor dan daemon2 / background process yg "haram"
Reply

Use magic Report

 Author| Post time 3-2-2004 05:28 PM | Show all posts
********* *BEGIN ENCRYPTED or SIGNED PART* *********

--------------------------------------------------------------------
Title: Microsoft Windows Security Bulletin Summary for
       February 2004
Issued: February 2, 2004
Version Number: 1.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winfeb04.asp

--------------------------------------------------------------------

Summary:
========
Included in this advisory is an update for newly discovered
vulnerabilities in Microsoft Windows.

This bulletin is rated Critical.


   MS04-004 - Cumulative Security Update for Internet Explorer
(832894)

             - Affected Software:
               - Microsoft Windows 98
               - Microsoft Windows 98 Second Edition
               - Microsoft Windows Millennium Edition
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP,
               - Windows XP, Service Pack 1
               - Windows XP 64-bit Edition,
               - Windows XP 64-bit Edition, Service Pack 1
               - Windows XP 64-bit Edition, Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition


             - Impact: Remote Code Execution
             - Version Number: 1.0


Update Availability:
===================
An update is available to fix this vulnerability.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Update
Deployment Information please read the Microsoft Windows Security
Bulletin Summary for February at:
http://www.microsoft.com/technet/security/bulletin/winfeb04.asp

Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.
International customers can get support from their local Microsoft
subsidiaries. Phone numbers for international support can be found
at: http://support.microsoft.com/common/international.aspx

Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews

* Join our Microsoft webcast for a live discussion of the technical
  details of the February security bulletin release and steps you can
take to protect your environment.  Details can be found at:

  http://go.microsoft.com/fwlink/?LinkId=22796

* Protect your PC: Microsoft has provided information on how you
  can help protect your PC at the following locations:

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a
  Microsoft security patch, it is a hoax that may be distributing a
  virus. Microsoft does not distribute security patches via e-mail.
  You can learn more about Microsoft's software distribution
  policies here:

  http://www.microsoft.com/technet/security/policy/swdist.asp

Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:

- Andreas Sandblad ([email protected])
     for reporting the Travel Log Cross Domain Vulnerability
described in MS04-004.


Revisions:
==========
* V1.0 February 2004: Bulletin Created.
********************************************************************
Protect your PC: Microsoft has provided information on how you
can help protect your PC at the following locations:
http://www.microsoft.com/security/protect/

If you receive an e-mail that claims to be distributing a
Microsoft security patch, it is a hoax that may be distributing a
virus. Microsoft does not distribute security patches via e-mail.
You can learn more about Microsoft's software distribution
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
--------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
--------------------------------------------------------------------



********** *END ENCRYPTED or SIGNED PART* **********
Reply

Use magic Report

12
Return to list New
You have to log in before you can reply Login | Register

Points Rules

 

ADVERTISEMENT



 

ADVERTISEMENT


 


ADVERTISEMENT
Follow Us

ADVERTISEMENT


Mobile|Archiver|Mobile*default|About Us|CariDotMy

23-11-2024 06:44 AM GMT+8 , Processed in 0.426190 second(s), 31 queries , Gzip On, Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

Quick Reply To Top Return to the list