exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2008-99A

Technical Cyber Security Alert 2008-99A
Posted Apr 9, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-099A - Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, and Office as part of the Microsoft Security Bulletin Summary for April 2008. The most severe vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
systems | windows
SHA-256 | 376425dd8c50ca785b4ad78bfa54a40de33fb20f150f041556a95cec6cb2f69d

Technical Cyber Security Alert 2008-99A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA08-099A


Microsoft Updates for Multiple Vulnerabilities

Original release date: April 8, 2008
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows
* Microsoft Internet Explorer
* Microsoft Office


Overview

Microsoft has released updates that address vulnerabilities in
Microsoft Windows, Internet Explorer, and Office.


I. Description

Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Internet Explorer, and Office as part of the
Microsoft Security Bulletin Summary for April 2008. The most severe
vulnerabilities could allow a remote, unauthenticated attacker to
execute arbitrary code. For more information, see the US-CERT
Vulnerability Notes Database.


II. Impact

A remote, unauthenticated attacker could execute arbitrary code, gain
elevated privileges, or cause a denial of service.


III. Solution

Apply updates from Microsoft

Microsoft has provided updates for these vulnerabilities in the April
2008 security bulletin. The security bulletin describes any known
issues related to the updates. Administrators are encouraged to note
these issues and test for any potentially adverse effects.
Administrators should consider using an automated update distribution
system such as Windows Server Update Services (WSUS).


IV. References

* US-CERT Vulnerability Notes for Microsoft April 2008 updates -
<http://www.kb.cert.org/vuls/byid?searchview&query=ms08-apr>

* Microsoft Security Bulletin Summary for April 2008 -
<http://www.microsoft.com/technet/security/bulletin/ms08-apr.mspx>

* Microsoft Update -
<https://www.update.microsoft.com/microsoftupdate/>

* Windows Server Update Services -
<http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA08-099A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA08-099A Feedback VU#155563" in the
subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2008 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________


Revision History

April 8, 2008: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBR/u+e/RFkHkM87XOAQLyOAf/ZXYKdLFP8Rukf+SxCdIIAmWnyQMrbPNA
4bEXLy33ExdNe3hCcO4i8AvlxPm6dvzrWR7GDnxr4lwV9jly5QKJ17+cpQpZ5pBt
5lYYOgoRC60IhagH2qYSEieLbMIvlecnUq0DJGWJuD+MBRVEVPDGKqJCsMt7CORS
FgxUQdfFMmv6kZ/JrJ2+x95eUAKBI8vwnggncsZ3z4zYbBuFWWZa6xbNL0O4G+VQ
RcSzpTbi8V7Z2QBkHRJ4PmMQX0zA2VC9/t5kzdaCmmj3lByILFsQxIITq7BHJ3wp
PbPkCcuxw5lcmDaEP0KUSZqPzsYgc1w0euHNmcNv7foUxrpWe42zXw==
=cDS2
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close