Sunday, February 14, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Researchers Download "Game Of Thrones" In Just 1 Second!
Apple: Dr. Dre Starring In New TV Series; New iPhone, iPad Coming in March
Foxconn Seeks For Partner To Boost Bid For Sharp
Micron Outlines Tts First 3D NAND Products
AT&T To Start 5G Trials This Year
Uber Agrees to Settle Safety Lawsuits
Google To Expand Right-to-Be-Forgotten Removals Following Pressure From Europe
Apple And At&T Sued For Infringement of Touch Feedback Patents
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
 Home > News > General Computing > Microso...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, December 10, 2009
Microsoft Details Security December Security Patches


Microsoft released a summary of security bulletins for December 2009.

The company released 6 updates. Three of them are marked as "Critical". Here is Microsoft's information related to each security patch:

MS09-071 - Critical
Vulnerabilities in Internet Authentication Service Could Allow Remote Code Execution (974318)

This security update resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if messages received by the Internet Authentication Service server are copied incorrectly into memory when handling PEAP authentication attempts. On Windows Server 2008, the Internet Authentication Service is replaced by Network Policy Server (NPS). An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system. Servers using Internet Authentication Service or Network Policy Server are only affected when using PEAP with MS-CHAP v2 authentication.

MS09-074 - Critical
Vulnerability in Microsoft Office Project Could Allow Remote Code Execution (967183)

This security update resolves a privately reported vulnerability in Microsoft Office Project. The vulnerability could allow remote code execution if a user opens a specially crafted Project file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

MS09-072 - Critical
Cumulative Security Update for Internet Explorer (976325)

This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. An ActiveX control built with Microsoft Active Template Library (ATL) headers could also allow remote code execution;

MS09-069 - Important
Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service (974392)

This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow a denial of service if a remote, authenticated attacker, while communicating through Internet Protocol security (IPsec), sends a specially crafted ISAKMP message to the Local Security Authority Subsystem Service (LSASS) on an affected system.

MS09-070 - Important
Vulnerabilities in Active Directory Federation Services Could Allow Remote Code Execution (971726)

This security update resolves two privately reported vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow remote code execution if an attacker sent a specially crafted HTTP request to an ADFS-enabled Web server. An attacker would need to be an authenticated user in order to exploit either of these vulnerabilities.

MS09-073 - Important
Vulnerability in WordPad and Office Text Converters Could Allow Remote Code Execution (975539)

This security update resolves a privately reported vulnerability in Microsoft WordPad and Microsoft Office text converters. The vulnerability could allow remote code execution if a specially crafted Word 97 file is opened in WordPad or Microsoft Office Word. An attacker who successfully exploited this vulnerability could gain the same privileges as the user. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges.

For more information visit http://www.microsoft.com/technet/security/bulletin/ms09-dec.mspx


Previous
Next
Apple Rumored to Prepare For Tablet Spring Launch        All News        Windows 7 USB/DVD Download Tool Released
Panasonic Takes Control of Sanyo     General Computing News      Windows 7 USB/DVD Download Tool Released

Get RSS feed Easy Print E-Mail this Message

Related News
Microsoft Buys SwiftKey
Microsoft Wants To Take The Data Center Underwater
Microsoft Cloud And Server Business Help Company's Earnings
Microsoft releases CNTK Deep Learning Toolkit
Microsoft Recalls AC Power Cord for Surface Pro
Microsoft To Donate $1 billion in Cloud Computing Resources
Microsoft Turns Minecraft Into An Education Tool
Microsoft To Stop Supporting Internet Explorer 8, 9 And 10 On January 12
Microsoft Faces Antitrust Probe In China
Microsoft To Notify Users Of Suspected Hacking By Governments
Microsoft To Bring Windows 10 to Public Sector Customers in China
Microsoft Says SmartScreen Protects From Drive-by Attacks

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .