CDRInfo Forum CDRInfo Forum

Forums  Register  Login  My Profile  Inbox  Address Book  My Subscription  My Forums 

Photo Gallery  Member List  Search  Calendars  FAQ  Ticket List  Log Out

Microsoft Patches Six Security Flaws   Logged in as: Guest
Viewers: 645 You can click here to see Today's Posts | Most Active Topics | Posts Since Last Visit
  Printable Version
All Forums >> [News Around The Web] >> Security News >> Microsoft Patches Six Security Flaws Page: [1]
Login
Message << Older Topic   Newer Topic >>
Microsoft Patches Six Security Flaws - 6/13/2007 7:28:19 PM   
icube001


Posts: 5429
Joined: 11/6/2006
Status: offline
Microsoft released a series of security patches on Tuesday, including four which were rated critical, and three that affected Windows Vista.

The four critical updates cover vulnerabilities in the Windows Channel Security Package and in Win32 API that could allow remote code execution, a Security update for internet Explorer and an update for Outlook Express and Windows Mail.

Vulnerabilities in the Windows Channel Security Package

This critical security update resolves a privately reported vulnerability in the Secure Channel (Schannel) security package in Windows. The Schannel security package implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. This vulnerability could allow remote code execution if a user viewed a specially crafted Web page using an Internet Web browser or used an application that makes use of SSL/TLS. However, attempts to exploit this vulnerability would most likely result in the Internet Web browser or application exiting. The affected software could be Windows 2000, Windows XP and Windows 2003.

Vulnerability in Win32 API

This critical security update resolves a privately reported vulnerability in a Win32 API. This vulnerability could allow remote code execution or elevation of privilege if the affected API is used locally by a specially crafted application. Therefore, applications that use this component of the Win32 API could be used as a vector for this vulnerability. For example, Internet Explorer uses this Win32 API function when parsing specially crafted Web pages. The affected software could be Windows 2000, Windows XP and Windows 2003.

Cumulative Security Update for Internet Explorer

This critical security update resolves five privately reported vulnerabilities and one publicly disclosed vulnerability. All but one of these vulnerabilities could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. One vulnerability could allow spoofing, and also involves a specially crafted Web page. In all remote code execution cases, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. For the spoofing case, exploitation requires user interaction. The affected software is IE 6 SP1, and IE7 running under Windows XP, Server 2003 or Vista operating systems.

Cumulative Security Update for Outlook Express and Windows Mail

This critical security update resolves two privately reported and two publicly disclosed vulnerabilities. One of these vulnerabilities could allow remote code execution if a user viewed a specially crafted e-mail using Windows Mail in Windows Vista. The other vulnerabilities could allow information disclosure if a user visits a specially crafted Web page using Internet Explorer and cannot be exploited directly in Outlook Express. For the information disclosure vulnerabilities, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The affected software is Microsoft outlook Express 6 under Windows XP, and Server 2003. Vista owners should also install the update for Windows Mail.

Vulnerabilities in Microsoft Visio

This important security update resolves two privately discovered and responsibly reported vulnerabilities in addition to other security issues identified during the course of the investigation. The privately reported vulnerabilities could allow remote code execution if a user opened a specially crafted Visio file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. User interaction is required to exploit these vulnerabilities. The affected software is Microsoft Visio 2002 Service Pack 2 and Visio 2003 Service Pack 2.

Vulnerability in Windows Vista Could Allow Information Disclosure

This moderate security update resolves a privately reported vulnerability. This vulnerability could allow non-privileged users to access local user information data stores including administrative passwords contained within the registry and local file system.

For more information and downloads visit http://www.microsoft.com/technet/security/bulletin/ms07-jun.mspx.
Post #: 1
Page:   [1]
All Forums >> [News Around The Web] >> Security News >> Microsoft Patches Six Security Flaws Page: [1]
Jump to:





New Messages No New Messages
Hot Topic w/ New Messages Hot Topic w/o New Messages
Locked w/ New Messages Locked w/o New Messages
 Post New Thread
 Reply to Message
 Post New Poll
 Submit Vote
 Delete My Own Post
 Delete My Own Thread
 Rate Posts




Forum Software © ASPPlayground.NET Advanced Edition 2.4.5 ANSI

0.031