US-CERT Technical Cyber Security Alert TA08-071A -- Microsoft Updates for Multiple Vulnerabilities

12/03/08, US-CERT Technical Cyber Security Alert TA08-071A -- Microsoft Updates for Multiple Vulnerabilities
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: US-CERT Technical Cyber Security Alert TA08-071A -- Microsoft Updates for Multiple Vulnerabilities
From: CERT Advisory <cert-advisory@cert.org>
Date: Tue, 11 Mar 2008 17:08:10 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


	 National Cyber Alert System

   Technical Cyber Security Alert TA08-071A

Microsoft Updates for Multiple Vulnerabilities

   Original release date: March 11, 2008
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Office
     * Microsoft Outlook
     * Microsoft Excel
     * Microsoft Excel Viewer
     * Microsoft Office for Mac
     * Microsoft Office Web Componenets

Overview

   Microsoft   has  released  updates  that  address  vulnerabilities  in
   Microsoft  Office,  Outlook,  Excel, Excel Viewer, Office for Mac, and
   Office Web Components.

I. Description

   Microsoft  has released updates to address vulnerabilities that affect
   Microsoft  Office,  Outlook,  Excel, Excel Viewer, Office for Mac, and
   Office  Web  Components  as  part  of  the Microsoft Security Bulletin
   Summary  for March 2008. The most severe vulnerabilities could allow a
   remote,  unauthenticated  attacker to execute arbitrary code. For more
   information, see the US-CERT Vulnerability Notes Database.

II. Impact

   A  remote, unauthenticated attacker could execute arbitrary code, gain
   elevated privileges, or cause a denial of service.

III. Solution

Apply updates from Microsoft

   Microsoft  has provided updates for these vulnerabilities in the March
   2008  security  bulletin.  The  security  bulletin  describe any known
   issues  related  to the updates. Administrators are encouraged to note
   these   issues   and   test   for  any  potentially  adverse  effects.
   Administrators  should consider using an automated update distribution
   system such as Windows Server Update Services (WSUS).

IV. References

 * US-CERT  Vulnerability  Notes  for  Microsoft March 2008 updates
   - <http://www.kb.cert.org/vuls/byid?searchview&query=ms08-mar>

 * Microsoft Security Bulletin Summary for March 2008
   - <http://www.microsoft.com/technet/security/bulletin/ms08-mar.mspx>

 * Microsoft Update - <https://www.update.microsoft.com/microsoftupdate/>

 * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

 _________________________________________________________________

  The most recent version of this document can be found at:

    <http://www.us-cert.gov/cas/techalerts/TA08-071A.html>
 _________________________________________________________________

  Feedback can be directed to US-CERT Technical Staff. Please send
  email to <cert@cert.org> with "TA08-071A Feedback VU#393305" in the
  subject.
 _________________________________________________________________

  For instructions on subscribing to or unsubscribing from this
  mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 _________________________________________________________________

  Produced 2008 by US-CERT, a government organization.

  Terms of use:

    <http://www.us-cert.gov/legal.html>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBR9b0APRFkHkM87XOAQLTUwf9HHlM9vQfwMpmCv77RuJKdZgdn5bNTPQA
HjsABoxmVZzE4XnArclHPyMivO8x/oel6UFvZgG/h2oGFarK7h1WpvCFQKE/cNO8
c5o0tRhxMx+ri7w7DnkhmhbWTLQ8coqKjzAioKoc2mboNz+PamQO22INjS3ktOyL
dRA+qwxSsPN3Bi7NDS2DOdUeAA+VdMn0cQTDLHJ7ZPhzy7JOiVXwQwyO3CwNDeOl
C6+FGSk8o1BsMjdP6kRaGnQkgivBi1ID4dcAQA8h0K2IGDPkCBIYiGTvj9pNnpwZ
lrP6DdHyd2idzGEXr2R0VlTQPrhabs+YpZq+qzVh6f2tg+Lc9xBwHg==
=aCnE
-----END PGP SIGNATURE-----

Previous message sorted by date: US-CERT Technical Cyber Security Alert TA08-066A -- Sun Updates for Multiple Vulnerabilities in Java
Next message sorted by date: US-CERT Technical Cyber Security Alert TA08-079B -- MIT Kerberos Updates for Multiple Vulnerabilities
Previous message sorted by thread: US-CERT Technical Cyber Security Alert TA08-066A -- Sun Updates for Multiple Vulnerabilities in Java
Next message by thread: US-CERT Technical Cyber Security Alert TA08-079B -- MIT Kerberos Updates for Multiple Vulnerabilities
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Mar 2008