News

Wednesday, December 12, 2007

Alert: 7 Microsoft Security Bulletins for December 2007

Security UPDATE
December 12, 2007
Forums Articles Blogs Events Resources Our Publications
IN THIS ISSUE
    7 Microsoft Security Bulletins for December 2007
    New HTML Option


Alert




7 Microsoft Security Bulletins for December 2007

Microsoft released seven security updates for December, rating three of them as critical. A new version of the Microsoft Windows Malicious Software Removal Tool has also been released. Here's a brief description of each update; for more information, go to
www.microsoft.com/technet/security/bulletin/ms07-dec.mspx

MS07-063: Vulnerability in SMBv2 Could Allow Remote Code Execution

This exploit targets the signing of SMBv2 traffic transmitted across the network. If unpatched, this exploit could be leveraged to allow the execution of code with the privileges of the currently logged on user.

Applies to: Windows Vista and Windows Vista x64 Edition.

Recommendation: Microsoft rates this update as important and the vulnerability hasn't been publicly disclosed. Because SMBv2 signing isn't active by default in Vista and only becomes active when specifically requested, you can test and deploy this update as a part of your normal patch management cycle.

MS07-064: Vulnerabilities in DirectX Could Allow Remote Code Execution

The attack vector for this exploit is a specially crafted file used for streaming media in DirectX. If unpatched, this vulnerability could allow the execution of code that would let an attacker take complete control of an affected system.

Applies to: DirectX 7 through 10. All versions of Windows, both client and server.

Recommendation: Microsoft rates this vulnerability as critical. Given the number of attacks during the holiday season that leverage the "Hey, look at this cute holiday-related dancing character" theme, you should test and deploy this update as quickly as possible.

MS07-065: Vulnerability in Message Queuing Could Allow Remote Code Execution

The attack vector for this exploit is a specially crafted Microsoft Message Queuing Services (MSMQ) message. The exploit targets the MSMQ and, if unpatched on Windows 2000, could allow for remote code execution. If unpatched on Windows XP, the vulnerability could allow for privilege elevation. This bulletin replaces MS05-017 on Windows 2000 but doesn't replace any previous bulletins for XP.

Applies to: Windows 2000 and Windows XP.

Recommendation: It's important to note that an attacker must have valid logon credentials to exploit this vulnerability and the vulnerability was privately reported. You should test and deploy the update as a part of your normal patch management cycle.

MS07-066: Vulnerability in Windows Kernel Could Allow Elevation of Privilege

The attack vector for this exploit is the way Windows Advanced Local Procedure Call (ALPC) validates certain conditions in legacy reply paths. The exploit targets the Windows Vista kernel and, if unpatched, could allow the attacker to take complete control over the targeted system. The vulnerability can only be exploited if the attacker has valid logon credentials.

Applies to: Windows Vista.

Recommendation: Microsoft rates this bulletin as important and the details of the vulnerability have only been privately reported. You should test and deploy the update as part of your normal patch management cycle.

MS07-067: Vulnerability in Macrovision Driver Could Allow Local Elevation of Privilege

The attack vector for this exploit is the way that the Macrovision driver handles configuration parameters. The exploit targets the Macrovision driver and, if unpatched, could allow local elevation of privilege, letting an attacker take complete control of an affected system.

Applies to: Windows XP and Windows Server 2003.

Recommendation: Microsoft rates this bulletin as important, and the vulnerability details have been publicly disclosed.

MS07-068: Vulnerability in Windows Media File Format Could Allow Remote Code Execution

The attack vector for this exploit is a specially crafted file in Windows Media Format Runtime. The exploit targets Windows Media Player and, if unpatched, could allow for the execution of remote code.

Applies to: Windows Media Player on Windows 2000, Windows XP, Windows Server 2003, and Windows Vista.

Recommendation: Microsoft rates this security bulletin as critical. Given the number of attacks during the holiday season that leverage the "cute holiday-related picture or movie" theme, you should test and deploy this update as quickly as possible.

MS07-069: Cumulative Security Update for Internet Explorer

This update resolves four privately reported vulnerabilities, some of which could be exploited to allow for the execution of remote code. This update replaces the previously released MS07-057 update.

Applies to: Internet Explorer 5.0, 6.0, and 7.0 on all versions of Windows.

Recommendation: Test and deploy on an accelerated schedule.






Sponsor: CorasWorks

Using SharePoint 2007 as a Platform for Managing Information Across the Enterprise

Learn the basics of the content management process and understand how workflow and information management policies are implemented in Office SharePoint Server 2007 solutions. After listening to this podcast, you will know how to develop a tactical approach to your own automated processing solutions with ease of implementation and use as key components of that solution.

www.windowsitpro.com/go/podcast/corasworks/enterpriseinfo/?code=secalttop1212





New HTML Option

Security UPDATE and Security UPDATE Alert are now available in HTML format, as an alternative to text format. To change your preference to HTML, go to www.windowsitpro.com/email. Note that you'll need to log on or register on our Web site to change your format preference.

Security UPDATE is also now mailed from a different IP address range and has a different From address. Please adjust your email service provider and spam filter whitelists accordingly to avoid missing an issue.

The new IP address range from which the newsletter originates is:

204.92.180.[85-86]

The new From address is:

Security_UPDATE@email.windowsitpro.com





If you use a product that has made a tremendous impact in your organization and is a product that you can't live without, tell us about it at whatshot@windowsitpro.com and we'll feature your review in a future issue of the magazine, under the "What's Hot" section.

Contact Us

Security UDPATE is brought to you by the Windows IT Pro Web site's Security page (first URL below) and Security Pro VIP (second URL below).
http://www.windowsitpro.com/windowssecurity
http://www.securityprovip.com

Manage your Security UPDATE subscription at
www.windowsitpro.com/email

Be sure to add Security_UPDATE@email.windowsitpro.com to your spam filter's list of allowed senders.

To contact us:
About Security UPDATE content -- letters@windowsitpro.com
About technical questions -- www.windowsitpro.com/forums
About your product news -- products@windowsitpro.com
About your subscription -- windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at http://www.windowsitpro.com/aboutus/index.cfm?action=privacy



Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2007, Penton Media, Inc. All rights reserved.

No comments:

Blog Archive