As is custom over at Microsoft, today for Patch Tuesday the MSRC (Microsoft Security Research Center) released it’s August 2009 Microsoft Security Patches. 9 Security updates in total.
Although a few of the updates fix the standard issues (IE: Go to an infected website and possibly get infected with Malicious code/virus), there are a few I feel are worth a mention to you groovyReaders. Here’s a quick summary of what I found interesting this month:
- MS09-044 – This is a new type of exploit involving the Popular Remote Desktop Client. Not very interesting however because you would need to visit an infected server in order for the exploit to take advantage of a hole in the RDP client.
- MS09-038 – Ok now were getting more interesting. In MS09-038 all you need to do is open a malicious AVI file. Much more likely being that you can email and share .AVI files with friends and family.
- MS09-041 – Now things are getting scary. MS09-041 should scare corporate IT teams. This patch fixes an issue where an attacker could send a malicious network packet to a PC or Server and take complete control of the system. Very bad since the payload could be delivered VIA email or some other method then spread quickly throughout the environment like a worm. Very nasty. Hopefully, your Corporate IT guys have firewalls enabled for all their desktops, and their servers are segmented off the “Standard” user network. The good news is it would have to be an internal attack. However, like I said, these days it’s not impossible to get something executed internally.
- MS09-036 – Another bad one. If you have Windows Server 2008 running IIS 7 on the Internet, your website MIGHT be vulnerable to a Denial of Service attack (DOS.) Best to have your web guys take a look at the bulletin and determine your vulnerability level.
All the details regarding ALL the security updates can be found here: http://www.microsoft.com/technet/security/bulletin/MS09-aug.mspx
Bulletin ID | Bulletin Title | Max Severity Rating | Vulnerability Impact | Restart Requirement | Affected Software* |
MS09-036 | Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service (970957) | Important | Denial of Service | Does not require restart | Microsoft .NET Framework on Windows Vista and Windows Server 2008. |
MS09-037 | Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution (973908) | Critical | Remote Code Execution | Requires restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-038 | Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (971557) | Critical | Remote Code Execution | Requires restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-039 | Vulnerabilities in WINS Could Allow Remote Code Execution (969883) | Critical | Remote Code Execution | Requires restart | Microsoft Windows 2000 Server and Windows Server 2003 |
MS09-040 | Vulnerability in Message Queuing Could Allow Elevation of Privilege (971032) | Important | Elevation of Privilege | Requires restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, and Windows Vista. |
MS09-041 | Vulnerability in Workstation Service Could Allow Elevation of Privilege (971657) | Important | Elevation of Privilege | Requires restart | Microsoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-042 | Vulnerability in Telnet Could Allow Remote Code Execution (960859) | Important | Remote Code Execution | Requires restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. |
MS09-043 | Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (957638) | Critical | Remote Code Execution | May require restart | Microsoft Office, Microsoft Visual Studio, Microsoft ISA Server, and Microsoft BizTalk Server. |
MS09-044 | Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (970927) | Critical | Remote Code Execution | Requires restart | Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Remote Desktop Connection Client for Mac. |
* The list of affected software in the summary table is an abstract. To see the full list of affected components please open the bulletin under consideration and review the “Affected Software” section. |
Thank fully, Microsoft is responsible and still releases Security updates for all these old operating systems.
Leave a Reply
Leave a Reply
