![]() |
|
AU-2009.0023 -- AusCERT Update - [Win] - Microsoft Security Bulletin (MS09-003) Major Revision |
|
Date: 28 May 2009 Original URL: http://www.auscert.org.au/render.html?cid=1979&it=11056 References: AL-2009.0013 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
AusCERT Update AU-2009.0023 - [Win]
Microsoft Security Bulletin (MS09-003) Major Revision
28 May 2009
AusCERT Update Summary
----------------------
Product: Exchange Server 2003
Publisher: Microsoft
Operating System: Windows
CVE Names: CVE-2009-0099 CVE-2009-0098
Ref: AL-2009.0013
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Title: Microsoft Security Bulletin Major Revision
Issued: May 26, 2009
********************************************************************
Summary
=======
The following bulletins have undergone a major revision increment.
Please see the appropriate bulletin for more details.
* MS09-003 - Critical
Bulletin Information:
=====================
* MS09-003 - Critical
- http://www.microsoft.com/technet/security/bulletin/ms09-003.mspx
- Reason for Revision: V3.0 (May 26, 2009): Added an entry in the
section, Frequently Asked Questions (FAQ) Related to This
Security Update, to announce a detection change to the update
for Microsoft Exchange Server 2003 Service Pack 2 (KB959897).
This is a detection change only. There were no changes to the
security update files in this bulletin. Customers who have
already installed the KB959897 update successfully do not
need to reinstall.
- Originally posted: February 10, 2009
- Updated: May 26, 2009
- Bulletin Severity Rating: Critical
- Version: 3.0
Other Information
=================
Recognize and avoid fraudulent e-mail to Microsoft customers:
=============================================================
If you receive an e-mail message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious Web sites. Microsoft does
not distribute security updates via e-mail.
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.
To receive automatic notifications whenever Microsoft Security
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.
********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************
- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.9.0 (Build 397)
Charset: utf-8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=zo4o
- -----END PGP SIGNATURE-----
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFKHd9wNVH5XJJInbgRAlafAJ0VIHBhzZcM7xpRjwsLTcTRMQqLLgCfRg3A
6ys+32/Ui2GrO1Y1bgfF5Ec=
=hxeE
-----END PGP SIGNATURE-----
|