Joerg´s IT-Tech Blog

Microsoft Technologien und über den Tellerrand hinaus, Aber vorher das TESTEN nicht vergessen!

Microsoft Patchday November 2009

Posted by JoergS - 10. November 2009

Hi,

heute war wieder Microsoft Patchday! 6 Updates schließen damit die 15 Sicherheitslücken. Betroffen sind folgende Applikationen:

  • Windows 2000 Service Pack 4
  • Windows XP Service Pack 2 & 3 *
  • Windows Vista Service Pack 1 & 2 *
  • Windows Server 2003 Service Pack 2 *
  • Windows Server 2008 Service Pack 2 *
  • Microsoft Office XP
  • Microsoft Office 2003
  • Microsoft Office 2007
  • Microsoft Office 2004 (Mac)
  • Microsoft Office 2008 (Mac)
    * 32bit and 64bit Architektur

Windows 7 & Server 2008 R2 sind nicht betroffen!

Microsoft Security Bulletin Summary für November 2009

KB973565: Vulnerability in Web Services on Devices API Could Allow Remote Code Execution
This security update resolves a privately reported vulnerability in the Web Services on Devices Application Programming Interface (WSDAPI) on the Windows operating system. The vulnerability could allow remote code execution if an affected Windows system receives a specially crafted packet. Only attackers on the local subnet would be able to exploit this vulnerability.

KB974783: Vulnerability in License Logging Server Could Allow Remote Code Execution
This security update resolves a privately reported vulnerability in Microsoft Windows 2000. The vulnerability could allow remote code execution if an attacker sent a specially crafted network message to a computer running the License Logging Server. An attacker who successfully exploited this vulnerability could take complete control of the system. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter.

KB969947: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
This security update resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow remote code execution if a user viewed content rendered in a specially crafted Embedded OpenType (EOT) font. In a Web-based attack scenario, an attacker would have to host a Web site that contains specially crafted embedded fonts that are used to attempt to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability. An attacker would have no way to force users to visit a specially crafted Web site. Instead, an attacker would have to convince the user to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes the user to the attacker’s site.

KB973309: Vulnerability in Active Directory Could Allow Denial of Service
This security update resolves a privately reported vulnerability in Active Directory directory service, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability could allow denial of service if stack space was exhausted during execution of certain types of LDAP or LDAPS requests. This vulnerability only affects domain controllers and systems configured to run ADAM or AD LDS.

KB972652: Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution
This security update resolves several privately reported vulnerabilities in Microsoft Office Excel. The vulnerabilities could allow remote code execution if a user opens a specially crafted Excel file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

KB976307: Vulnerability in Microsoft Office Word Could Allow Remote Code Execution
This security update resolves a privately reported vulnerability that could allow remote code execution if a user opens a specially crafted Word file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Natürlich wurden auch die Junk-E-Mail-Filter von Outlook und Windows Mail und das Tool zum Entfernen bösartiger Software aktualisiert.

Microsoft Patchday November 2009 anzeigen

Na dann, Viel Spass beim selber Testen!
CU

Schreibe einen Kommentar

Trage deine Daten unten ein oder klicke ein Icon um dich einzuloggen:

WordPress.com-Logo

Du kommentierst mit Deinem WordPress.com-Konto. Abmelden / Ändern )

Twitter-Bild

Du kommentierst mit Deinem Twitter-Konto. Abmelden / Ändern )

Facebook-Foto

Du kommentierst mit Deinem Facebook-Konto. Abmelden / Ändern )

Google+ Foto

Du kommentierst mit Deinem Google+-Konto. Abmelden / Ändern )

Verbinde mit %s

 
%d Bloggern gefällt das: