Microsoft Security Bulletin: August 2009 Update
Please see details below of the August 2009 security bulletin. The bulletins are being released on August 11th 2009 PST. Please click each bulletin ID for more details on the update
Bulletin ID | Bulletin Title | Max Severity Rating | Vulnerability Impact | Restart Requirement | Affected Software |
MS09-036 | Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service. | Important | Denial of Service | Does not require restart | Microsoft .NET Framework on Windows Vista and Windows Server 2008. |
MS09-037 | Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution. | Critical | Remote Code Execution | Requires Restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-038 | Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution. | Critical | Remote Code Execution | Requires Restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-039 | Vulnerabilities in WINS Could Allow Remote Code Execution. | Critical | Remote Code Execution | Requires Restart | Microsoft Windows 2000 Server and Windows Server 2003 |
MS09-040 | Vulnerability in Message Queuing Could Allow Elevation of Privilege. | Important | Elevation of Privilege | Requires Restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, and Windows Vista. |
MS09-041 | Vulnerability in Workstation Service Could Allow Elevation of Privilege. | Important | Elevation of Privilege | Requires Restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-042 | Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution. | Important | Remote Code Execution | Requires Restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-043 | Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution. | Critical | Remote Code Execution | May require restart | Microsoft Office, Microsoft Visual Studio, Microsoft ISA Server, and Microsoft BizTalk Server. |
MS09-044 | Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution. | Critical | Remote Code Execution | Requires Restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Remote Desktop Connection Client for Mac. |
You can get summaries of these bulletins here.
Microsoft Windows Malicious Software Removal Tool
We are also releasing an updated version of the Windows Malicious Software Removal Tool. You can get more details at the MSRT Website.
New Security Advisory
In addition to the new security bulletins outlined above we are also releasing on new security advisory. Below is an overview.
Identifier | Security Advisory 973811 - Extended Protection for Authentication |
Summary | Microsoft is announcing the availability of a new feature, Extended Protection for Authentication, on the Windows platform. This feature enhances the protection and handling of credentials when authenticating network connections using Integrated Windows Authentication (IWA). The update itself does not directly provide protection against specific attacks such as credential forwarding, but allows applications to “opt-in” to Extended Protection for Authentication. This advisory briefs developers and system administrators on this new functionality and how it can be deployed to help protect authentication credentials. |
Mitigating Factors |
|
Recommendations | Review Microsoft Security Advisory 973811 for an overview of the issue, details on affected components, mitigating factors, suggested actions, frequently asked questions (FAQs), and links to additional resources. |
Additional Information | Q: Is this a security vulnerability that requires Microsoft to issue a security update? A: No, this is not a security vulnerability that requires Microsoft to issue a security update. This feature requires optional configuration that some customers may choose to deploy. Enabling this feature is not appropriate for all customers. For more information about this feature and how to appropriately configure it, see Microsoft Knowledge Base Article 973811. This feature is already included in Windows 7 and Windows Server 2008 R2. |
More Resources | Microsoft Security Advisory 973811 - Extended Protection for Authentication: https://www.microsoft.com/technet/security/advisory/973811.mspx Microsoft KB Article 973811: https://support.microsoft.com/kb/973811 Microsoft Security Response Center (MSRC) Blog: https://blogs.technet.com/msrc/ Microsoft Malware Protection Center (MMPC) Blog: https://blogs.technet.com/mmpc/ Security Research & Defense (SRD) Blog: https://blogs.technet.com/srd/ |
Technorati Tags: Computer Security,Patching,Updates
Jeffa
Comments
- Anonymous
August 12, 2009
The comment has been removed