ada critical patch yang baru banget dirilis.

http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

TechNet Home <http://technet.microsoft.com/> > TechNet
Security<http://technet.microsoft.com/security/default.aspx>>
Bulletins <http://www.microsoft.com/technet/security/current.aspx>
Microsoft Security Bulletin MS08-067 – CriticalVulnerability in Server
Service Could Allow Remote Code Execution (958644) Published: October 23,
2008

*Version:* 1.0
General InformationExecutive Summary

This security update resolves a privately reported vulnerability in the
Server service. The vulnerability could allow remote code execution if an
affected system received a specially crafted RPC request. On Microsoft
Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could
exploit this vulnerability without authentication to run arbitrary code. It
is possible that this vulnerability could be used in the crafting of a
wormable exploit. Firewall best practices and standard default firewall
configurations can help protect network resources from attacks that
originate outside the enterprise perimeter.

This security update is rated Critical for all supported editions of
Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important
for all supported editions of Windows Vista and Windows Server 2008. For
more information, see the subsection, *Affected and Non-Affected Software*,
in this section.

The security update addresses the vulnerability by correcting the way that
the Server service handles RPC requests. For more information about the
vulnerability, see the Frequently Asked Questions (FAQ) subsection for the
specific vulnerability entry under the next section, *Vulnerability
Information*.

*Recommendation.* Microsoft recommends that customers apply the update
immediately.

*Known Issues.* None
[image: Top of 
section]<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB>Top
of section<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB>
Affected and Non-Affected Software

The following software have been tested to determine which versions or
editions are affected. Other versions or editions are either past their
support life cycle or are not affected. To determine the support life cycle
for your software version or edition, visit Microsoft Support
Lifecycle<http://go.microsoft.com/fwlink/?LinkId=21742>
.

*Affected Software*
Operating SystemMaximum Security ImpactAggregate Severity Rating Bulletins
Replaced by this Update

Microsoft Windows 2000 Service Pack
4<http://www.microsoft.com/downloads/details.aspx?familyid=E22EB3AE-1295-4FE2-9775-6F43C5C2AED3>

Remote Code Execution

Critical

MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299>

Windows XP Service Pack
2<http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03>

Remote Code Execution

Critical

MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299>

Windows XP Service Pack
3<http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03>

Remote Code Execution

Critical

None

Windows XP Professional x64
Edition<http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25>

Remote Code Execution

Critical

MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299>

Windows XP Professional x64 Edition Service Pack
2<http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25>

Remote Code Execution

Critical

None

Windows Server 2003 Service Pack
1<http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D>

Remote Code Execution

Critical

MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299>

Windows Server 2003 Service Pack
2<http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D>

Remote Code Execution

Critical

None

Windows Server 2003 x64
Edition<http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400>

Remote Code Execution

Critical

MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299>

Windows Server 2003 x64 Edition Service Pack
2<http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400>

Remote Code Execution

Critical

None

Windows Server 2003 with SP1 for Itanium-based
Systems<http://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF>

Remote Code Execution

Critical

MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299>

Windows Server 2003 with SP2 for Itanium-based
Systems<http://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF>

Remote Code Execution

Critical

None

Windows Vista and Windows Vista Service Pack
1<http://www.microsoft.com/downloads/details.aspx?familyid=18FDFF67-C723-42BD-AC5C-CAC7D8713B21>

Remote Code Execution

Important

None

Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack
1<http://www.microsoft.com/downloads/details.aspx?familyid=A976999D-264F-4E6A-9BD6-3AD9D214A4BD>

Remote Code Execution

Important

None

Windows Server 2008 for 32-bit
Systems<http://www.microsoft.com/downloads/details.aspx?familyid=25C17B07-1EFE-43D7-9B01-3DFDF1CE0BD7>
*

Remote Code Execution

Important

None

Windows Server 2008 for x64-based
Systems<http://www.microsoft.com/downloads/details.aspx?familyid=7B12018E-0CC1-4136-A68C-BE4E1633C8DF>
*

Remote Code Execution

Important

None

Windows Server 2008 for Itanium-based
Systems<http://www.microsoft.com/downloads/details.aspx?familyid=2BCF89EF-6446-406C-9C53-222E0F0BAF7A>

Remote Code Execution

Important

None

**Windows Server 2008 server core installation affected.* For supported
editions of Windows Server 2008, this update applies, with the same severity
rating, whether or not Windows Server 2008 was installed using the Server
Core installation option. For more information on this installation option,
see Server 
Core<http://msdn.microsoft.com/en-us/library/ms723891%28VS.85%29.aspx>.
Note that the Server Core installation option does not apply to certain
editions of Windows Server 2008; see Compare Server Core Installation
Options<http://www.microsoft.com/windowsserver2008/en/us/compare-core-installation.aspx>
.
[image: Top of 
section]<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECC>Top
of section<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECC>
 Frequently Asked Questions (FAQ) Related to This Security Update

*Where are the file information details?*
The file information details can be found in Microsoft Knowledge Base
Article 958644 <http://support.microsoft.com/kb/958644>.

*Is the Windows 7 Pre-Beta release affected by this vulnerability?*
Yes. This vulnerability was reported after the release of Windows 7
Pre-Beta. Customers running Windows 7 Pre-Beta are encouraged to download
and apply the update to their systems. On Windows 7 Pre-Beta systems, the
vulnerable code path is only accessible to authenticated users. This
vulnerability is not liable to be triggered if the attacker is not
authenticated, and therefore would be rated Important.

Security updates are available from Microsoft
Update<http://go.microsoft.com/fwlink/?LinkID=40747>,
Windows Update <http://go.microsoft.com/fwlink/?LinkId=21130>, and Office
Update <http://go.microsoft.com/fwlink/?LinkId=21135>. Security updates are
also available from the Microsoft Download
Center<http://go.microsoft.com/fwlink/?LinkId=21129>.
You can find them most easily by doing a keyword search for "security
update."

*I am using an older release of the software discussed in this security
bulletin. What should I do?*
The affected software listed in this bulletin have been tested to determine
which releases are affected. Other releases are past their support life
cycle. To determine the support life cycle for your software release,
visit Microsoft
Support Lifecycle <http://go.microsoft.com/fwlink/?LinkId=21742>.

It should be a priority for customers who have older releases of the
software to migrate to supported releases to prevent potential exposure to
vulnerabilities. For more information about the Windows Product Lifecycle,
visit Microsoft Support
Lifecycle<http://go.microsoft.com/fwlink/?LinkId=21742>.
For more information about the extended security update support period for
these software versions or editions, visit Microsoft Product Support
Services <http://go.microsoft.com/fwlink/?LinkId=33328>.

Customers who require custom support for older releases must contact their
Microsoft account team representative, their Technical Account Manager, or
the appropriate Microsoft partner representative for custom support options.
Customers without an Alliance, Premier, or Authorized Contract can contact
their local Microsoft sales office. For contact information, visit Microsoft
Worldwide Information <http://go.microsoft.com/fwlink/?LinkId=33329>, select
the country, and then click *Go* to see a list of telephone numbers. When
you call, ask to speak with the local Premier Support sales manager. For
more information, see the Windows Operating System Product Support Lifecycle
FAQ <http://go.microsoft.com/fwlink/?LinkId=33330>.
[image: Top of 
section]<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECCAC>Top
of 
section<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECCAC>
Vulnerability Information Severity Ratings and Vulnerability
Identifiers Vulnerability
Severity Rating and Maximum Security Impact by Affected Software Affected
SoftwareServer Service Vulnerability - CVE-2008-4250Aggregate Severity
Rating

Microsoft Windows 2000 Service Pack 4

*Critical*
Remote Code Execution

*Critical*

Windows XP Service Pack 2 and Windows XP Service Pack 3

*Critical*
Remote Code Execution

*Critical*

Windows XP Professional x64 Edition and Windows XP Professional x64 Edition
Service Pack 2

*Critical*
Remote Code Execution

*Critical*

Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2

*Critical*
Remote Code Execution

*Critical*

Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service
Pack 2

*Critical*
Remote Code Execution

*Critical*

Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server
2003 with SP2 for Itanium-based Systems

*Critical*
Remote Code Execution

*Critical*

Windows Vista and Windows Vista Service Pack 1

*Important*
Remote Code Execution

*Important*

Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1

*Important*
Remote Code Execution

*Important*

Windows Server 2008 for 32-bit Systems*

*Important*
Remote Code Execution

*Important*

Windows Server 2008 for x64-based Systems*

*Important*
Remote Code Execution

*Important*

Windows Server 2008 for Itanium-based Systems

*Important*
Remote Code Execution

*Important*

**Windows Server 2008 server core installation affected.* For supported
editions of Windows Server 2008, this update applies, with the same severity
rating, whether or not Windows Server 2008 was installed using the Server
Core installation option. For more information on this installation option,
see Server 
Core<http://msdn.microsoft.com/en-us/library/ms723891%28VS.85%29.aspx>.
Note that the Server Core installation option does not apply to certain
editions of Windows Server 2008; see Compare Server Core Installation
Options<http://www.microsoft.com/windowsserver2008/en/us/compare-core-installation.aspx>
.

-- 
things left unsaid, http://ryosaeba.wordpress.com
maxgain scams, http://maxgain.wordpress.com


[Non-text portions of this message have been removed]


------------------------------------

-- 
www.itcenter.or.id - Komunitas Teknologi Informasi Indonesia 
Gabung, Keluar, Mode Kirim : [EMAIL PROTECTED] 

Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/ITCENTER/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/ITCENTER/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Kirim email ke