copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
By Operating...
»
Windows (all)
» AU-2008.0006 -- AusCERT Update - [Win] - Microsoft S...
AU-2008.0006 -- AusCERT Update - [Win] - Microsoft Security Bulletin Revisions - MS07-040
Date:
26 March 2008
References
:
ESB-2007.0505
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 AusCERT Update AU-2008.0006 - [Win] Microsoft Security Bulletin Revisions - MS07-040 26 March 2008 AusCERT Update Summary ---------------------- Product: Microsoft .NET Framework 1.0 Microsoft .NET Framework 1.1 Publisher: Microsoft Operating System: Windows Vista Windows Server 2008 Impact: Execute Arbitrary Code/Commands Read-only Data Access Access: Remote/Unauthenticated CVE Names: CVE-2007-0041 CVE-2007-0042 CVE-2007-0043 Ref: ESB-2007.0505 Original Bulletin: http://www.microsoft.com/technet/security/bulletin/ms07-040.mspx - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ******************************************************************** Title: Microsoft Security Bulletin Revisions Issued: March 25, 2008 ******************************************************************** Summary ======= The following bulletins have undergone a major revision increment. Please see the appropriate bulletin for more details. * MS07-040 - Critical Bulletin Information: ===================== * MS07-040 - Critical - http://www.microsoft.com/technet/security/bulletin/ms07-040.mspx - Reason for Revision: Bulletin Updated: Added .NET Framework 1.0 (KB928367) and .NET Framework 1.1 (KB929729) as affected components for Windows Vista Service Pack 1 and Windows Server 2008. - Originally posted: July 10, 2007 - Updated: March 25, 2008 - Bulletin Severity Rating: Critical - Version: 2.0 Other Information ================= Recognize and avoid fraudulent e-mail to Microsoft customers: ============================================================= If you receive an e-mail message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious Web sites. Microsoft does not distribute security updates via e-mail. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, it is not required to read security notifications, security bulletins, security advisories, or install security updates. You can obtain the MSRC public PGP key at https://www.microsoft.com/technet/security/bulletin/pgp.mspx. To receive automatic notifications whenever Microsoft Security Bulletins and Microsoft Security Advisories are issued or revised, subscribe to Microsoft Technical Security Notifications on http://www.microsoft.com/technet/security/bulletin/notify.mspx. ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** - -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQIVAwUBR+l7CFKuubOIpnsTAQIZShAAme4WwcT+4SW6prB20G5S5U9DHzQVhVQF ftb7uNgyk+1PdTdiGLBA3hRVBExPg055SNzJhV+lNb7iqvvT+BwKJWzRZu43OTRP Zv2rSd+RUZ/TYipjNQrm7kvUG88vkG+iw9P54Pcm5X6XMe4p7TgjeY+sn5lXKQLu J5JESqPCVvgX3mTJkrgCYld/NptOl1lOLtEPr7H4oYZf0g9q57Cru2xMQCF1QJ82 KnyX5fVFj2t8tnLmXINTYjuaifZewk73Tw1ef+tkOZT2ywTNLs0se73CJ1mWS8US GDJ2pIrlFdTEbdsP5w46ULCXHzELQZQlOzKtHb4bn8WR1+V60J05KomdL+wB3Xl7 4TUkdmFCYRL61ci4VWC6+USEQRgNAhB7vrJgrPB7Har8ETtB1yJuS7Aexi9XWKGK hMjLpKWsiPdrOTTBXn7VzkMMby+y+2OSo61bGP3DdSmx+0NZoMQTZEQIWL199qpn fxxb38+KuQn8Vn+MnRiBR5tgdXbUHeRWTZDdxUXgx162NG9obUuOvAIpo61amOdr LhtpZA+WEBQZRcHJmI2InLzG7/nJex8t8urknYyHnHUFI9Ji+1GMm/Q0ruetomyl /3EZncUj8DxM90VApRsLJmky5CW1PZDrBkbdzHmWo7Ht6v9gxTjX8jR06Lmlaad/ riApdjF/its= =uShH - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBR+myUih9+71yA2DNAQLGXAP+PP+cq/MAwtRzlrbm1991csS7GA53Y+Z+ MSM5et1XwL8B1/rmCVr1UPpWsnp1uOVKgYXskHJSHZAlWqb5AjTb9Pw9QfrkoawW m4r6uYMnPSTnPM3ffJAkHhZEgn4da629GEdFYJBFGtC5+kZqu1apFbaDmzepUXmo /wq409v+PbA= =fAxv -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=21&it=9011