I've patched a dozen servers and no problem here. (Server must reboot after patch)
Markus > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Travis Rabe > Sent: Wednesday, July 14, 2004 1:23 AM > To: Imail User Forum > Subject: [IMail Forum] OT: Microsoft Security Bulletin > Summary for July 2004 > > > > -----Original Message----- > From: Microsoft > [mailto:[EMAIL PROTECTED] > tters.Microsof > t.com] > Sent: Tuesday, July 13, 2004 1:40 PM > To: [EMAIL PROTECTED] > Subject: Microsoft Security Bulletin Summary for July 2004 > > -----BEGIN PGP SIGNED MESSAGE----- > > ******************************************************************** > Title: Microsoft Security Bulletin Summary for July 2004 > Issued: July 13, 2004 > Version Number: 1.0 > Bulletin: http://go.microsoft.com/fwlink/?LinkId=32567 > ******************************************************************** > > Summary: > ======== > This advisory contains information about all security updates > released this month. It is broken down by security bulletin severity. > > Critical Security Bulletins > =========================== > > MS04-022 - Vulnerability in Task Scheduler Could Allow Code > Execution (841873) > > - Affected Software: > - Windows 2000 Service Pack 2 > - Windows 2000 Service Pack 3 > - Windows 2000 Service Pack 4 > - Windows XP and Windows XP Service Pack 1 > - Windows XP 64-Bit Edition Service Pack 1 > > - Affected Components: > - Internet Explorer 6 when installed on Windows > NT 4.0 SP6a (Workstation, Server, or Terminal > Server Edition) > > - Impact: Remote Code Execution > - Version Number: 1.0 > > MS04-023 - Vulnerability in HTML Help Could Allow Code > Execution (840315) > > - Affected Software: > - Windows 2000 Service Pack 2 > - Windows 2000 Service Pack 3 > - Windows 2000 Service Pack 4 > - Windows XP and Windows XP Service Pack 1 > - Windows XP 64-Bit Edition Service Pack 1 > - Windows XP 64-Bit Edition Version 2003 > - Windows Server 2003 > - Windows Server 2003 64-Bit Edition > > - Affected Components: > - Internet Explorer 6 when installed on Windows > NT 4.0 SP6a (Workstation, Server, or Terminal > Server Edition) > > - Review the FAQ section of bulletin MS04-O23 for > information about these operating systems: > - Microsoft Windows 98 > - Microsoft Windows 98 Second Edition (SE) > - Microsoft Windows Millennium Edition (ME) > > - Impact: Remote Code Execution > - Version Number: 1.0 > > Important Security Bulletins > ============================ > > MS04-019 - Vulnerability in Utility Manager Could Allow Code > Execution (842526) > > - Affected Software: > - Windows 2000 Service Pack 2 > - Windows 2000 Service Pack 3 > - Windows 2000 Service Pack 4 > > - Impact: Remote Code Execution > - Version Number: 1.0 > > MS04-020 - Vulnerability in POSIX Could Allow Code > Execution (841872) > > - Affected Software: > - Windows NT Workstation 4.0 Service Pack 6a > - Windows NT Server 4.0 Service Pack 6a > - Windows NT Server 4.0 Terminal Server Edition > Service Pack 6 > - Windows 2000 Service Pack 2 > - Windows 2000 Service Pack 3 > - Windows 2000 Service Pack 4 > > - Impact: Remote Code Execution > - Version Number: 1.0 > > MS04-021 - Security Update for IIS 4.0 (841373) > > - Affected Software: > - Windows NT Workstation 4.0 Service Pack 6a > - Windows NT Server 4.0 Service Pack 6a > > - Impact: Remote Code Execution > - Version Number: 1.0 > > MS04-024 - Vulnerability in Windows Shell Could Allow Remote > Code Execution (839645) > > - Affected Software: > - Windows NT Workstation 4.0 Service Pack 6a > - Windows NT Server 4.0 Service Pack 6a > - Windows NT Server 4.0 Terminal Server Edition > Service Pack 6 > - Windows 2000 Service Pack 2 > - Windows 2000 Service Pack 3 > - Windows 2000 Service Pack 4 > - Windows XP and Windows XP Service Pack 1 > - Windows XP 64-Bit Edition Service Pack 1 > - Windows XP 64-Bit Edition Version 2003 > - Windows Server 2003 > - Windows Server 2003 64-Bit Edition > > - Review the FAQ section of bulletin MS04-O24 for > information about these operating systems: > - Microsoft Windows 98 > - Microsoft Windows 98 Second Edition (SE) > - Microsoft Windows Millennium Edition (ME) > > - Impact: Remote Code Execution > - Version Number: 1.0 > > Moderate Security Bulletins > =========================== > > MS04-018 - Cumulative Security Update for Outlook Express > (823353) > > - Affected Software: > - Windows NT Workstation 4.0 Service Pack 6a > - Windows NT Server 4.0 Service Pack 6a > - Windows NT Server 4.0 Terminal Server Edition > Service Pack 6 > - Windows 2000 Service Pack 2 > - Windows 2000 Service Pack 3 > - Windows 2000 Service Pack 4 > - Windows XP and Windows XP Service Pack 1 > - Windows XP 64-Bit Edition Service Pack 1 > - Windows XP 64-Bit Edition Version 2003 > - Windows Server 2003 > - Windows Server 2003 64-Bit Edition > > - Review the FAQ section of bulletin MS04-O18 for > information about these operating systems: > - Microsoft Windows 98 > - Microsoft Windows 98 Second Edition (SE) > - Microsoft Windows Millennium Edition (ME) > > - Impact: Denial of Service > - Version Number: 1.0 > > > Update Availability: > =================== > Updates are available to address these issues. > For additional information, including Technical Details, > Workarounds, answers to Frequently Asked Questions, and > Update Deployment Information please read the Microsoft > Security Bulletin Summary for this month at: > http://go.microsoft.com/fwlink/?LinkId=32567 > > Support: > ======== > Technical support is available from Microsoft Product Support > Services at 1-866-PC SAFETY (1-866-727-2338). There is no > charge for support calls associated with security updates. > International customers can get support from their local > Microsoft subsidiaries. Phone numbers for international > support can be found > at: http://support.microsoft.com/common/international.aspx > > Additional Resources: > ===================== > * Microsoft has created a free monthly e-mail newsletter containing > valuable information to help you protect your network. This > newsletter provides practical security tips, topical security > guidance, useful resources and links, pointers to helpful > community resources, and a forum for you to provide feedback > and ask security-related questions. > You can sign up for the newsletter at: > > http://www.microsoft.com/technet/security/secnews/default.mspx > > * Microsoft has created a free e-mail notification service that > serves as a supplement to the Security Notification Service > (this e-mail). It provides timely notification of any minor > changes or revisions to previously released Microsoft Security > Bulletins. This new service provides notifications that are > written for IT professionals and contain technical information > about the revisions to security bulletins. > Visit http://www.microsoft.com to subscribe to this service: > > - Click on Subscribe at the top of the page. > - This will direct you via Passport to the Subscription center. > - Under Newsletter Subscriptions you can sign up for the > "Microsoft Security Notification Service: Comprehensive Version". > > * Join Microsoft's webcast for a live discussion of the technical > details of these security bulletins and steps you can take > to protect your environment. Details about the live webcast > can be found at: http://go.microsoft.com/fwlink/?LinkId=30865 > > The on-demand version of the webcast will be available 24 hours > after the live webcast at: > > http://go.microsoft.com/fwlink/?LinkId=30865 > > * Protect your PC: Microsoft has provided information on how you > can help protect your PC at the following locations: > > http://www.microsoft.com/security/protect/ > > If you receive an e-mail that claims to be distributing a > Microsoft security update, it is a hoax that may be distributing a > virus. Microsoft does not distribute security updates through > e-mail. You can learn more about Microsoft's software distribution > policies here: > > http://www.microsoft.com/technet/security/topics/policy/swdist.mspx > > Acknowledgments: > ================ > Microsoft thanks the following for working with us to protect > customers: > > Cesar Cerrudo of Application Security Inc. for reporting an > issue described in MS04-019. (http://www.appsecinc.com) > > Rafal Wojtczuk working with McAfee for reporting an issue > described in MS04-020. (http://www.mcafee.com) > > Brett Moore of Security-Assessment.com for reporting an issue > described in MS04-022. (http://www.security-assessment.com) > > Dustin Schneider for reporting an issue described in MS04-022. > (mailto://[EMAIL PROTECTED]) > > Peter Winter-Smith of Next Generation Security Software Ltd. > for reporting an issue described in MS04-022. > (http://www.nextgenss.com) > > Brett Moore of Security-Assessment.com for reporting an issue > described in MS04-023. (http://www.security-assessment.com) > > ******************************************************************** > THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS > PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT > DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, > INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A > PARTICULAR PURPOSE. > IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE > LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, > INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR > SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS > SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. > SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF > LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE > FOREGOING LIMITATION MAY NOT APPLY. > ******************************************************************** > > > -----BEGIN PGP SIGNATURE----- > Version: PGP 8.1 > > iQEVAwUBQPQrso0ZSRQxA/UrAQFPdwgAif9ch3t8TJADL43IuYvhZ64TLc4hlhou > 7gGPP1twOQJv9PM+oDIw2zIsap+2ETUbzluUThZ2WYak8HjlgtbIdyjRKIoK6FfD > 3qe3RdCmRGqWkBQnytP6xwngFqQDeeeN9SBnDvFeETcrsXB7UR2KkrPg8iP9wlTP > Ciq0IYak9/L8YB+r2fA3rR1ZZX5zSNDZ0oihJfP0jAA7c/IAhx1vD3INmss0DDxJ > n+jIk7OVTIkp0iXjpCrbm/5N8Y9yaJ3ymc8FEU/K6WSfR+iKIJQpLNFTCnIdxBLy > n/e/+e32ezh5i7wWZhT4oY6g7UEuDEeglF+ze6VnSuP1OP9ICn5HxA== > =/TTr > -----END PGP SIGNATURE----- > > > > ******************************************************************* > > You have received this e-mail bulletin because of your > subscription to the Microsoft Product Security Notification > Service. For more information on this service, please visit > http://www.microsoft.com/technet/security/notify.asp. > > To verify the digital signature on this bulletin, please > download our PGP key at > http://www.microsoft.com/technet/security/notify.asp. > > To unsubscribe from the Microsoft Security Notification > Service, please visit the Microsoft Profile Center at > http://register.microsoft.com/regsys/pic.asp > > If you do not wish to use Microsoft Passport, you can > unsubscribe from the Microsoft Security Notification Service > via email as described below: > Reply to this message with the word UNSUBSCRIBE in the Subject line. > > For security-related information about Microsoft products, > please visit the Microsoft Security Advisor web site at > http://www.microsoft.com/security. > > > > To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html > List Archive: > http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ > Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/ > To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/