Microsoft

Microsoft August Patch Tuesday – Looking Critical

As is custom over at Microsoft, today for Patch Tuesday the MSRC (Microsoft Security Research Center) released it’s August 2009 Microsoft Security Patches.  9 Security updates in total.

Although a few of the updates fix the standard issues (IE: Go to an infected website and possibly get infected with Malicious code/virus), there are a few I feel are worth a mention to you groovyReaders.  Here’s a quick summary of what I found interesting this month:

 

  • MS09-044 – This is a new type of exploit involving the Popular Remote Desktop Client.  Not very interesting however because you would need to visit an infected server in order for the exploit to take advantage of a hole in the RDP client.
  • MS09-038 – Ok now were getting more interesting.  In MS09-038 all you need to do is open a malicious AVI file.  Much more likely being that you can email and share .AVI files with friends and family.
  • MS09-041 – Now things are getting scary.  MS09-041 should scare corporate IT teams.  This patch fixes an issue where an attacker could send a malicious network packet to a PC or Server and take complete control of the system.  Very bad since the payload could be delivered VIA email or some other method then spread quickly throughout the environment like a worm.  Very nasty.  Hopefully, your Corporate IT guys have firewalls enabled for all their desktops, and their servers are segmented off the “Standard” user network.  The good news is it would have to be an internal attack. However, like I said, these days it’s not impossible to get something executed internally.
  • MS09-036 – Another bad one.  If you have Windows Server 2008 running IIS 7 on the Internet, your website MIGHT be vulnerable to a Denial of Service attack (DOS.)  Best to have your web guys take a look at the bulletin and determine your vulnerability level.

 

All the details regarding ALL the security updates can be found here: http://www.microsoft.com/technet/security/bulletin/MS09-aug.mspx

 

Bulletin IDBulletin TitleMax Severity RatingVulnerability ImpactRestart RequirementAffected Software*
MS09-036Vulnerability in ASP.NET in Microsoft Windows Could Allow Denial of Service (970957)ImportantDenial of ServiceDoes not require restartMicrosoft .NET Framework on Windows Vista and Windows Server 2008.
MS09-037Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution (973908)CriticalRemote Code ExecutionRequires restartMicrosoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
MS09-038Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (971557)CriticalRemote Code ExecutionRequires restartMicrosoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
MS09-039Vulnerabilities in WINS Could Allow Remote Code Execution (969883)CriticalRemote Code ExecutionRequires restartMicrosoft Windows 2000 Server and Windows Server 2003
MS09-040Vulnerability in Message Queuing Could Allow Elevation of Privilege (971032)ImportantElevation of PrivilegeRequires restartMicrosoft Windows 2000, Windows XP, Windows Server 2003, and Windows Vista.
MS09-041Vulnerability in Workstation Service Could Allow Elevation of Privilege (971657)ImportantElevation of PrivilegeRequires restartMicrosoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
MS09-042Vulnerability in Telnet Could Allow Remote Code Execution (960859)ImportantRemote Code ExecutionRequires restartMicrosoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
MS09-043Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (957638)CriticalRemote Code ExecutionMay require restartMicrosoft Office, Microsoft Visual Studio, Microsoft ISA Server, and Microsoft BizTalk Server.
MS09-044Vulnerabilities in Remote Desktop Connection Could Allow Remote Code Execution (970927)CriticalRemote Code ExecutionRequires restartMicrosoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Remote Desktop Connection Client for Mac.
* The list of affected software in the summary table is an abstract. To see the full list of affected components

please open the bulletin under consideration and review the “Affected Software” section.

 

 

Thank fully, Microsoft is responsible and still releases Security updates for all these old operating systems.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

 

To Top