Windows Updates For August 2009

Microsoft released a series of security updates for Windows and Office on August 11th 2009.

The following is a summary of these security updates.

If you have not already received these updates on your computer via Automatic Updates then manually install them by visiting the Microsoft Update website using Internet Explorer.

August 2009 Windows and Office Security Updates

Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (KB957638)

Maximum Severity Rating: Critical

This security update resolves several privately reported vulnerabilities in Microsoft Office Web Components that could allow remote code execution if a user viewed a specially crafted Web page. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Software: Microsoft Office XP & 2003, Microsoft Visual Studio 2003 SP1, Microsoft ISA Server 2004 & 2006, Microsoft BizTalk Server 2002, Small Business Accounting 2006

—-

Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (KB970927)

Maximum Severity Rating: Critical

This security update resolves two privately reported vulnerabilities in Microsoft Remote Desktop Connection. The vulnerabilities could allow remote code execution if an attacker successfully convinced a user of Terminal Services to connect to a malicious RDP server or if a user visits a specially crafted Web site that exploits this vulnerability. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Software: Microsoft Windows (All Versions), Microsoft Server 2008, Remote Desktop Connection Client for Mac

—-

Vulnerabilities in WINS Could Allow Remote Code Execution (KB969883)

Maximum Severity Rating: Critical

This security update resolves two privately reported vulnerabilities in the Windows Internet Name Service (WINS). Either vulnerability could allow remote code execution if a user received a specially crafted WINS replication packet on an affected system running the WINS service. By default, WINS is not installed on any affected operating system version. Only customers who manually install this component are affected by this issue.

Affected Software: Microsoft Windows 2000 SP4, Windows Server 2003 SP2

—-

Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (KB971557)

Maximum Severity Rating: Critical

This security update resolves two privately reported vulnerabilities in Windows Media file processing. Either vulnerability could allow remote code execution if a user opened a specially crafted AVI file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Software: Microsoft Windows 2000 SP4, Windows Server 2003 SP2

—-

Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution (KB973908)

Maximum Severity Rating: Critical

This security update resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Software: Microsoft Windows 200 SP4, Windows XP SP2 & SP3, Windows Vista SP1 & SP2, Windows Server 2003 SP2 & 2008

—-

Vulnerability in Workstation Service Could Allow Elevation of Privilege (KB971657)

Maximum Severity Rating: Important

This security update resolves a privately reported vulnerability in the Windows Workstation Service. The vulnerability could allow elevation of privilege if an attacker created a specially crafted RPC message and sent the message to an affected system. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials to a vulnerable system in order to exploit this vulnerability. The vulnerability could not be exploited by anonymous users.

Affected Software: Windows XP SP2 & SP3, Windows Vista SP1 & SP2, Windows Server 2003 SP2 & 2008

—-

Vulnerability in Message Queuing Could Allow Elevation of Privilege (KB971032)

Maximum Severity Rating: Important

This security update resolves a privately reported vulnerability in the Windows Message Queuing Service (MSMQ). The vulnerability could allow elevation of privilege if a user received a specially crafted request to an affected MSMQ service. By default, the Message Queuing component is not installed on any affected operating system edition and can only be enabled by a user with administrative privileges. Only customers who manually install the Message Queuing component are likely to be vulnerable to this issue.

Affected Software: Windows XP SP2, Windows Vista, Windows Server 2003 SP2

—-

Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service (KB970957)

Maximum Severity Rating: Important

This security update addresses a privately reported Denial of Service vulnerability in the Microsoft .NET Framework component of Microsoft Windows. This vulnerability can be exploited only when Internet Information Services (IIS) 7.0 is installed and ASP.NET is configured to use integrated mode on affected versions of Microsoft Windows. An attacker could create specially crafted anonymous HTTP requests that could cause the affected Web server to become non-responsive until the associated application pool is restarted. Customers who are running IIS 7.0 application pools in classic mode are not affected by this vulnerability.

Affected Software: Windows Vista and Vista SP1, Windows Server 2008

* Because IIS 7.0 does not run on Windows Vista Starter and Windows Vista Home Basic, the following editions are not affected: Windows Vista Starter (32-bit), Windows Vista Home Basic (32-bit), and Windows Vista Home Basic (64-bit).

—-

Vulnerability in Telnet Could Allow Remote Code Execution (KB960859)

Maximum Severity Rating: Important

This security update resolves a publicly disclosed vulnerability in the Microsoft Telnet service. The vulnerability could allow an attacker to obtain credentials and then use them to log back into affected systems. The attacker would then acquire user rights on a system identical to the user rights of the logged-on user. This scenario could ultimately result in remote code execution on affected systems. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Affected Software: Microsoft Windows 200 SP4, Windows XP SP2 & XP SP3, Windows Vista and Vista SP1, Windows Server 2003 SP2, Windows Server 2008

—-

Leave a Reply