Microsoft Security Bulletins - Important News For All

Discussion in 'Serious' started by quack, 20 Aug 2003.

  1. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    -----------------------------------------------------------------
    Title: Unchecked Buffer in MDAC Function Could Enable System Compromise (823718)
    Date: 20 August 2003
    Software:
    - Microsoft Data Access Components 2.5
    - Microsoft Data Access Components 2.6
    - Microsoft Data Access Components 2.7

    Impact: Run code of the attacker's choice
    Max Risk: Important
    Bulletin: MS03-033

    Microsoft encourages customers to review the Security Bulletins
    at:
    http://www.microsoft.com/technet/security/bulletin/MS03-033.asp
    http://www.microsoft.com/security/security_bulletins/ms03-033.asp
    -----------------------------------------------------------------

    Risk Rating:
    ============
    - Important

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read
    the Security Bulletins at:
    http://www.microsoft.com/technet/security/bulletin/ms03-033.asp
    http://www.microsoft.com/security/security_bulletins/ms03-033.asp
    for information on obtaining this patch.
     
    Last edited: 21 Aug 2003
  2. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    -----------------------------------------------------------------
    Title: Cumulative Patch for Internet Explorer (822925)
    Date: 20 August 2003
    Software:

    - Microsoft Internet Explorer 5.01
    - Microsoft Internet Explorer 5.5
    - Microsoft Internet Explorer 6.0
    - Microsoft Internet Explorer 6.0 for Windows Server 2003

    Impact: Run code of the attacker's choice
    Max Risk: Critical
    Bulletin: MS03-032

    Microsoft encourages customers to review the Security Bulletins
    at:
    http://www.microsoft.com/technet/security/bulletin/MS03-032.asp
    http://www.microsoft.com/security/security_bulletins/ms03-032.asp
    -----------------------------------------------------------------

    Risk Rating:
    ============
    - Critical

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read
    the Security Bulletins at:
    http://www.microsoft.com/technet/security/bulletin/ms03-032.asp
    http://www.microsoft.com/security/security_bulletins/ms03-032.asp
    for information on obtaining this patch.
     
    Last edited: 21 Aug 2003
  3. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    ----------------------------------------------------------------------
    Title: Unchecked Buffer in DirectX Could Enable System Compromise (819696)
    Released: 23 July 2003
    Revised: 20 August 2003 (version 2.0)

    Software: Microsoft DirectX(r) 5.2 on Windows 98
    Microsoft DirectX 6.1 on Windows 98 SE
    Microsoft DirectX 7.1 on Windows Millennium Edition
    Microsoft DirectX 7.0 on Windows 2000
    Microsoft DirectX 8.0, 8.0a, 8.1, 8.1a, and 8.1b when
    installed on Windows 98, Windows 98 SE, Windows
    Millennium Edition or Windows 2000
    Microsoft DirectX 8.1 on Windows XP or
    Windows Server 2003
    Microsoft DirectX 9.0a when installed on Windows 98,
    Windows 98 SE, Windows Millennium Edition (Windows Me),
    Windows 2000, Windows XP, or Windows Server 2003
    Microsoft Windows NT 4.0 Server with either Windows
    Media Player 6.4 or Internet Explorer 6 Service Pack 1
    installed.
    Microsoft Windows NT 4.0, Terminal Server Edition with
    either Windows Media Player 6.4 or Internet Explorer 6
    Service Pack 1 installed.

    Impact: Allow an attacker to execute code on a user's system
    Max Risk: Critical
    Bulletin: MS03-030

    Microsoft encourages customers to review the Security Bulletin at:
    http://www.microsoft.com/technet/security/bulletin/MS03-030.asp
    http://www.microsoft.com/security/security_bulletins/MS03-030.asp
    ----------------------------------------------------------------------

    Reason for Revision:
    ====================
    Subsequent to the original release of this bulletin, customers
    requested that we support additional versions of DirectX that were
    not covered by the original patches. This bulletin has been updated
    to provide information about this new patch.

    Risk Rating:
    ============
    - Critical

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read the
    Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/MS03-030.asp
    http://www.microsoft.com/security/security_bulletins/MS03-30.asp
    for information on obtaining this patch.
     
    Last edited: 21 Aug 2003
  4. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    ----------------------------------------------------------------------
    Title: Unchecked Buffer in MDAC Function Could Enable System Compromise (Q326573)
    Released: 31 July 2003
    Revised: 20 August 2003 (version 2.0)
    Software: Microsoft Data Access Components 2.5
    Microsoft Data Access Components 2.6
    Microsoft Data Access Components 2.7
    Impact: Run code of the attacker's choice.
    Max Risk: Critical

    Bulletin: MS02-040

    Microsoft encourages customers to review the Security Bulletin at:
    http://www.microsoft.com/technet/security/bulletin/MS02-040.asp
    http://www.microsoft.com/security/security_bulletins/MS02-040.asp
    ----------------------------------------------------------------------

    Reason for Revision:
    ====================
    Subsequent to the release of this bulletin, it was determined that
    the vulnerability addressed is not with the OpenRowSet command
    (which is a Microsoft SQL Server command) but rather that the
    vulnerability is with the underlying MDAC component Open Database
    Connectivity (ODBC), which is present in all versions of Windows.
    Additionally, the original patch released with this did not install
    correctly on some systems because of a flaw in the way that
    Microsoft Windows Installer updated the System File Protection
    cache. The bulletin has been updated to include this additional
    information and to direct users to an updated patch.

    Note: The patch for this security bulletin has been superceded by
    the patch in MS03-033. Customers who are seeking the patch for
    MS02-040 should instead install the patch for MS03-033.

    Risk Rating:
    ============
    - Critical

    Patch Availability:
    ===================
    A patch is available to fix this vulnerability. Please read the
    Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/ms02-040.asp
    http://www.microsoft.com/security/security_bulletins/MS02-040.asp
    for information on obtaining this patch. Please note that this
    patch is superceded by the patch available with
    http://www.microsoft.com/technet/security/bulletin/ms03-033.asp
     
    Last edited: 21 Aug 2003
  5. Mr. Roboto

    Mr. Roboto xBurningMikex

    Joined:
    3 Dec 2002
    Posts:
    968
    Likes Received:
    0
    holy moly! :eeek: :eeek:
     
  6. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    LOL, I wouldn't panic. I was just informing those who aren't subscribed to the Security Bulletin mailing list of 4 emails that came in today.

    I found 2 new critical updates on WU because of them - I may have already been patched against whatever exploits they were warning against in the other 2 emails.

    If no one objects, I'll keep updating this thread with the emails as I receive them - they're good for informing people when a new update has been released for their OS - I had one about the RPC exploit Blaster attacked on the 16th of July and got my home PC patched almost immediately. :)

    edit: PS - Of course you could just keep visiting WindowsUpdate once a week (at least!), sign up to the mailing lists yourself, or just bury your head in the sand and hope you'll be safe from all the evil/nasty people out there.

    PPS - Before anyone complains about my 4 posts in a row - I wanted to merge the emails into 2 posts, but they were just too long for the message length limit - and I really don't care about my postcount. I've got more than enough for an avatar and a custom user-title, I have no need to inflate it on purpose. :thumb:
     
  7. RTT

    RTT #parp

    Joined:
    12 Mar 2001
    Posts:
    14,120
    Likes Received:
    74
    Bugger windows, linux owns :geek:

    I think the second one is of most importance
     
  8. Ubermich

    Ubermich He did it!

    Joined:
    21 Jun 2002
    Posts:
    4,389
    Likes Received:
    1
    HERE HERE! :rock:

    but I think updating this thread would be a good idea. Some people don't want to leave for a week and come back to find their inboxes full of mail from microsoft, I'm sure :p

    Would help if they would just give a basic rundown though. Who reads the whole thing? The jist is, "We screwed up, here's the fix." A list of OSes effected and linkage would be plenty. "Microsoft we spend more money on our writers than our programmers, and you wonder why our OS looks like swiss cheese to hackers!"
     
  9. DeX

    DeX Mube Codder

    Joined:
    22 Jul 2002
    Posts:
    4,152
    Likes Received:
    3
    Um what the hell is wrong with the windows update site?

    http://windowsupdate.microsoft.com just gives you a page about how windowsupdates supports windows users. No actual useful info at all. Is this because it's now running through linux or because these new exploits have already been, um, exploited?

    edit: Nevermind, it's working now - got scared for a second there.
     
  10. Guest-16

    Guest-16 Guest


    :rolleyes:
     
  11. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    Good point. I've updated the posts so far to reflect only the most important info - what's affected and where to get the patches. :D
     
    Last edited: 21 Aug 2003
  12. pranks7er

    pranks7er mange tout

    Joined:
    25 Dec 2002
    Posts:
    3,515
    Likes Received:
    0
    hackers and viruss have been quite active it seems lately
     
  13. Guest-16

    Guest-16 Guest

    Until SCO ends up sueing end users for $700 a pop. :blush: :p
     
  14. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    ----------------------------------------------------------------------
    Title: Flaw in Visual Basic for Applications Could Allow
    Arbitrary Code Execution (822715)
    Date: 03 September 2003

    Affected Software:
    Microsoft Visual Basic for Applications SDK 5.0
    Microsoft Visual Basic for Applications SDK 6.0
    Microsoft Visual Basic for Applications SDK 6.2
    Microsoft Visual Basic for Applications SDK 6.3

    Products which include the affected software:
    Microsoft Access 97
    Microsoft Access 2000
    Microsoft Access 2002
    Microsoft Excel 97
    Microsoft Excel 2000
    Microsoft Excel 2002
    Microsoft PowerPoint 97
    Microsoft PowerPoint 2000
    Microsoft PowerPoint 2002
    Microsoft Project 2000
    Microsoft Project 2002
    Microsoft Publisher 2002
    Microsoft Visio 2000
    Microsoft Visio 2002
    Microsoft Word 97
    Microsoft Word 98(J)
    Microsoft Word 2000
    Microsoft Word 2002
    Microsoft Works Suite 2001
    Microsoft Works Suite 2002
    Microsoft Works Suite 2003
    Microsoft Business Solutions Great Plains 7.5
    Microsoft Business Solutions Dynamics 6.0
    Microsoft Business Solutions Dynamics 7.0
    Microsoft Business Solutions eEnterprise 6.0
    Microsoft Business Solutions eEnterprise 7.0
    Microsoft Business Solutions Solomon 4.5
    Microsoft Business Solutions Solomon 5.0
    Microsoft Business Solutions Solomon 5.5

    Impact: Run code of attackers choice
    Max Risk: Critical
    Bulletin: MS03-037

    Microsoft encourages customers to review the Security Bulletins
    at:
    http://www.microsoft.com/technet/security/bulletin/MS03-037.asp
    http://www.microsoft.com/security/security_bulletins/ms03-037.asp
    ----------------------------------------------------------------------

    Risk Rating:
    ============
    - Critical

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read
    the Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/ms03-037.asp
    http://www.microsoft.com/security/security_bulletins/ms03-037.asp
    for information on obtaining this patch.
     
  15. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    ----------------------------------------------------------------------
    Title: Flaw in NetBIOS Could Lead to Information Disclosure
    (824105)
    Date: 03 September 2003
    Software:

    - Microsoft Windows NT 4.0 Server
    - Microsoft Windows NT 4.0, Terminal Server Edition
    - Microsoft Windows 2000
    - Microsoft Windows XP
    - Microsoft Windows Server 2003

    Impact: Information Disclosure
    Max Risk: Low
    Bulletin: MS03-034

    Microsoft encourages customers to review the Security Bulletins at:
    http://www.microsoft.com/technet/security/bulletin/MS03-034.asp
    http://www.microsoft.com/security/security_bulletins/ms03-034.asp
    ----------------------------------------------------------------------

    Risk Rating:
    ============
    - Low

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read
    the Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/ms03-034.asp
    http://www.microsoft.com/security/security_bulletins/ms03-034.asp
    for information on obtaining this patch.
     
  16. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    -------------------------------------------------------------------
    Title: Flaw in Microsoft Word Could Enable Macros to Run Automatically (827653)
    Date: September 3, 2003
    Software: Microsoft Word 97
    Microsoft Word 98 (J)
    Microsoft Word 2000
    Microsoft Word 2002
    Microsoft Works Suite 2001
    Microsoft Works Suite 2002
    Microsoft Works Suite 2003
    Impact: Run macros without warning
    Max Risk: Important
    Bulletin: MS03-035

    Microsoft encourages customers to review the Security Bulletins at:

    http://www.microsoft.com/technet/security/bulletin/MS03-035.asp
    http://www.microsoft.com/security/security_bulletins/MS03-035.asp
    -------------------------------------------------------------------

    Risk Rating:
    ============
    -Important

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read the
    Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/MS03-035.asp
    http://www.microsoft.com/security/security_bulletins/MS03-035.asp
    for information on obtaining this patch.
     
  17. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    --------------------------------------------------------------------
    Title: Unchecked buffer in Microsoft Access Snapshot Viewer Could Allow Code Execution (827104)
    Date: September 3, 2003
    Software: Microsoft Access 97
    Microsoft Access 2000
    Microsoft Access 2002
    Impact: Elevation of Privilege
    Max Risk: Moderate
    Bulletin: MS03-038

    Microsoft encourages customers to review the Security Bulletins at:
    http://www.microsoft.com/technet/security/bulletin/MS03-038.asp
    http://www.microsoft.com/security/security_bulletins/MS03-038.asp
    --------------------------------------------------------------------

    Risk Rating:
    ============
    -Moderate

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read the
    Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/MS03-038.asp
    http://www.microsoft.com/security/security_bulletins/MS03-
    038.asp
    for information on obtaining this patch.
     
  18. quack

    quack Minimodder

    Joined:
    6 Mar 2002
    Posts:
    5,240
    Likes Received:
    9
    ----------------------------------------------------------------------
    Title: Buffer Overrun in WordPerfect Converter Could Allow Code Execution (827103)
    Date: 03 September 2003
    Software: Microsoft Office 97
    Microsoft Office 2000
    Microsoft Office XP
    Microsoft Word 98 (J)
    Microsoft FrontPage 2000
    Microsoft FrontPage 2002
    Microsoft Publisher 2000
    Microsoft Publisher 2002
    Microsoft Works Suite 2001
    Microsoft Works Suite 2002
    Microsoft Works Suite 2003
    Impact: Run code of attacker's choice
    Max Risk: Important
    Bulletin: MS03-036

    Microsoft encourages customers to review the Security Bulletins at:
    http://www.microsoft.com/technet/security/bulletin/MS03-036.asp
    http://www.microsoft.com/security/security_bulletins/ms03-036.asp
    ----------------------------------------------------------------------

    Risk Rating:
    ============
    - Important

    Patch Availability:
    ===================
    - A patch is available to fix this vulnerability. Please read
    the Security Bulletins at
    http://www.microsoft.com/technet/security/bulletin/ms03-036.asp
    http://www.microsoft.com/security/security_bulletins/ms03-036.asp
    for information on obtaining this patch.

    :worried: 5 reports in a day? Geez!!
     
  19. maki43

    maki43 I can touch my toes 1,2,3

    Joined:
    8 Nov 2002
    Posts:
    1,327
    Likes Received:
    1
    The microsoft bods obviously had a lot of time on thier hands so decided to look for potential security threats
     
  20. Dad

    Dad You talkin to me?

    Joined:
    15 Apr 2003
    Posts:
    5,375
    Likes Received:
    8
    I FULLY agree. I just wish that more of the developers would get off their high horse and realize that if they want Linux to compete on the desktop, they have to start developing apps, software install routines and so on targeting people who don't want to go into a console, untar an app, make sure the libraries needed are installed, config, make and make install their app.

    I'm only 1 piece of software away from being able to switch totally to Linux... If Macromedia released a working port of Dreamweaver, I'd be a happy happy man!

    /me kicks the thread back on topic. Sorry about the little rant there...
     

Share This Page