Baru tahu ada update critical ini. Tambah mantab nih milis ini. Thx y Bung Ryo.
Kalau orang pakai bajakan ngga bs update dong y :D. Katanya Microsoft lagi gencar-gencarnya inspeksi software mereka langsung ke user melalui internet. So yang pake bajakan jangan kaget klo tiba2 nge blank kompienya. Best Regards Buyung Bahari ****************************** http://www.bakhosting.com http://support.bakhosting.com ****************************** --------------------------------------------------------------------- Miliki toko online hanya 50rb/bln (1 GB Space, 10GB Bandwidth, 1 Free Domain), dan dapatkan hosting termurah dengan hanya Rp750/bln. Kunjungi hanya http://bakhosting.com. Bisa lihat demo toko. Bisa langsung pesan, semua otomatis, akun anda langsung di buat hanya dengan beberapa menit. Garansi Uang Kembali. --------------------------------------------------------------------- --- In ITCENTER@yahoogroups.com, "êÓðâ² (Ryo Saeba)" <[EMAIL PROTECTED]> wrote: > > ada critical patch yang baru banget dirilis. > > http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx > > TechNet Home <http://technet.microsoft.com/> > TechNet > Security<http://technet.microsoft.com/security/default.aspx>> > Bulletins <http://www.microsoft.com/technet/security/current.aspx> > Microsoft Security Bulletin MS08-067 CriticalVulnerability in Server > Service Could Allow Remote Code Execution (958644) Published: October 23, > 2008 > > *Version:* 1.0 > General InformationExecutive Summary > > This security update resolves a privately reported vulnerability in the > Server service. The vulnerability could allow remote code execution if an > affected system received a specially crafted RPC request. On Microsoft > Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could > exploit this vulnerability without authentication to run arbitrary code. It > is possible that this vulnerability could be used in the crafting of a > wormable exploit. Firewall best practices and standard default firewall > configurations can help protect network resources from attacks that > originate outside the enterprise perimeter. > > This security update is rated Critical for all supported editions of > Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important > for all supported editions of Windows Vista and Windows Server 2008. For > more information, see the subsection, *Affected and Non-Affected Software*, > in this section. > > The security update addresses the vulnerability by correcting the way that > the Server service handles RPC requests. For more information about the > vulnerability, see the Frequently Asked Questions (FAQ) subsection for the > specific vulnerability entry under the next section, *Vulnerability > Information*. > > *Recommendation.* Microsoft recommends that customers apply the update > immediately. > > *Known Issues.* None > [image: Top of section]<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB>Top > of section<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB> > Affected and Non-Affected Software > > The following software have been tested to determine which versions or > editions are affected. Other versions or editions are either past their > support life cycle or are not affected. To determine the support life cycle > for your software version or edition, visit Microsoft Support > Lifecycle<http://go.microsoft.com/fwlink/?LinkId=21742> > . > > *Affected Software* > Operating SystemMaximum Security ImpactAggregate Severity Rating Bulletins > Replaced by this Update > > Microsoft Windows 2000 Service Pack > 4<http://www.microsoft.com/downloads/details.aspx?familyid=E22EB3AE-1295-4FE2-9775-6F43C5C2AED3> > > Remote Code Execution > > Critical > > MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299> > > Windows XP Service Pack > 2<http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03> > > Remote Code Execution > > Critical > > MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299> > > Windows XP Service Pack > 3<http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03> > > Remote Code Execution > > Critical > > None > > Windows XP Professional x64 > Edition<http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25> > > Remote Code Execution > > Critical > > MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299> > > Windows XP Professional x64 Edition Service Pack > 2<http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25> > > Remote Code Execution > > Critical > > None > > Windows Server 2003 Service Pack > 1<http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D> > > Remote Code Execution > > Critical > > MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299> > > Windows Server 2003 Service Pack > 2<http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D> > > Remote Code Execution > > Critical > > None > > Windows Server 2003 x64 > Edition<http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400> > > Remote Code Execution > > Critical > > MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299> > > Windows Server 2003 x64 Edition Service Pack > 2<http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400> > > Remote Code Execution > > Critical > > None > > Windows Server 2003 with SP1 for Itanium-based > Systems<http://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF> > > Remote Code Execution > > Critical > > MS06-040 <http://go.microsoft.com/fwlink/?LinkId=70299> > > Windows Server 2003 with SP2 for Itanium-based > Systems<http://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF> > > Remote Code Execution > > Critical > > None > > Windows Vista and Windows Vista Service Pack > 1<http://www.microsoft.com/downloads/details.aspx?familyid=18FDFF67-C723-42BD-AC5C-CAC7D8713B21> > > Remote Code Execution > > Important > > None > > Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack > 1<http://www.microsoft.com/downloads/details.aspx?familyid=A976999D-264F-4E6A-9BD6-3AD9D214A4BD> > > Remote Code Execution > > Important > > None > > Windows Server 2008 for 32-bit > Systems<http://www.microsoft.com/downloads/details.aspx?familyid=25C17B07-1EFE-43D7-9B01-3DFDF1CE0BD7> > * > > Remote Code Execution > > Important > > None > > Windows Server 2008 for x64-based > Systems<http://www.microsoft.com/downloads/details.aspx?familyid=7B12018E-0CC1-4136-A68C-BE4E1633C8DF> > * > > Remote Code Execution > > Important > > None > > Windows Server 2008 for Itanium-based > Systems<http://www.microsoft.com/downloads/details.aspx?familyid=2BCF89EF-6446-406C-9C53-222E0F0BAF7A> > > Remote Code Execution > > Important > > None > > **Windows Server 2008 server core installation affected.* For supported > editions of Windows Server 2008, this update applies, with the same severity > rating, whether or not Windows Server 2008 was installed using the Server > Core installation option. For more information on this installation option, > see Server Core<http://msdn.microsoft.com/en-us/library/ms723891%28VS.85%29.aspx>. > Note that the Server Core installation option does not apply to certain > editions of Windows Server 2008; see Compare Server Core Installation > Options<http://www.microsoft.com/windowsserver2008/en/us/compare-core-installation.aspx> > . > [image: Top of section]<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECC>Top > of section<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECC> > Frequently Asked Questions (FAQ) Related to This Security Update > > *Where are the file information details?* > The file information details can be found in Microsoft Knowledge Base > Article 958644 <http://support.microsoft.com/kb/958644>. > > *Is the Windows 7 Pre-Beta release affected by this vulnerability?* > Yes. This vulnerability was reported after the release of Windows 7 > Pre-Beta. Customers running Windows 7 Pre-Beta are encouraged to download > and apply the update to their systems. On Windows 7 Pre-Beta systems, the > vulnerable code path is only accessible to authenticated users. This > vulnerability is not liable to be triggered if the attacker is not > authenticated, and therefore would be rated Important. > > Security updates are available from Microsoft > Update<http://go.microsoft.com/fwlink/?LinkID=40747>, > Windows Update <http://go.microsoft.com/fwlink/?LinkId=21130>, and Office > Update <http://go.microsoft.com/fwlink/?LinkId=21135>. Security updates are > also available from the Microsoft Download > Center<http://go.microsoft.com/fwlink/?LinkId=21129>. > You can find them most easily by doing a keyword search for "security > update." > > *I am using an older release of the software discussed in this security > bulletin. What should I do?* > The affected software listed in this bulletin have been tested to determine > which releases are affected. Other releases are past their support life > cycle. To determine the support life cycle for your software release, > visit Microsoft > Support Lifecycle <http://go.microsoft.com/fwlink/?LinkId=21742>. > > It should be a priority for customers who have older releases of the > software to migrate to supported releases to prevent potential exposure to > vulnerabilities. For more information about the Windows Product Lifecycle, > visit Microsoft Support > Lifecycle<http://go.microsoft.com/fwlink/?LinkId=21742>. > For more information about the extended security update support period for > these software versions or editions, visit Microsoft Product Support > Services <http://go.microsoft.com/fwlink/?LinkId=33328>. > > Customers who require custom support for older releases must contact their > Microsoft account team representative, their Technical Account Manager, or > the appropriate Microsoft partner representative for custom support options. > Customers without an Alliance, Premier, or Authorized Contract can contact > their local Microsoft sales office. For contact information, visit Microsoft > Worldwide Information <http://go.microsoft.com/fwlink/?LinkId=33329>, select > the country, and then click *Go* to see a list of telephone numbers. When > you call, ask to speak with the local Premier Support sales manager. For > more information, see the Windows Operating System Product Support Lifecycle > FAQ <http://go.microsoft.com/fwlink/?LinkId=33330>. > [image: Top of section]<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECCAC>Top > of section<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ECCAC> > Vulnerability Information Severity Ratings and Vulnerability > Identifiers Vulnerability > Severity Rating and Maximum Security Impact by Affected Software Affected > SoftwareServer Service Vulnerability - CVE-2008-4250Aggregate Severity > Rating > > Microsoft Windows 2000 Service Pack 4 > > *Critical* > Remote Code Execution > > *Critical* > > Windows XP Service Pack 2 and Windows XP Service Pack 3 > > *Critical* > Remote Code Execution > > *Critical* > > Windows XP Professional x64 Edition and Windows XP Professional x64 Edition > Service Pack 2 > > *Critical* > Remote Code Execution > > *Critical* > > Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 > > *Critical* > Remote Code Execution > > *Critical* > > Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service > Pack 2 > > *Critical* > Remote Code Execution > > *Critical* > > Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server > 2003 with SP2 for Itanium-based Systems > > *Critical* > Remote Code Execution > > *Critical* > > Windows Vista and Windows Vista Service Pack 1 > > *Important* > Remote Code Execution > > *Important* > > Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1 > > *Important* > Remote Code Execution > > *Important* > > Windows Server 2008 for 32-bit Systems* > > *Important* > Remote Code Execution > > *Important* > > Windows Server 2008 for x64-based Systems* > > *Important* > Remote Code Execution > > *Important* > > Windows Server 2008 for Itanium-based Systems > > *Important* > Remote Code Execution > > *Important* > > **Windows Server 2008 server core installation affected.* For supported > editions of Windows Server 2008, this update applies, with the same severity > rating, whether or not Windows Server 2008 was installed using the Server > Core installation option. For more information on this installation option, > see Server Core<http://msdn.microsoft.com/en-us/library/ms723891%28VS.85%29.aspx>. > Note that the Server Core installation option does not apply to certain > editions of Windows Server 2008; see Compare Server Core Installation > Options<http://www.microsoft.com/windowsserver2008/en/us/compare-core-installation.aspx> > . > > -- > things left unsaid, http://ryosaeba.wordpress.com > maxgain scams, http://maxgain.wordpress.com > > > [Non-text portions of this message have been removed] > ------------------------------------ -- www.itcenter.or.id - Komunitas Teknologi Informasi Indonesia Gabung, Keluar, Mode Kirim : [EMAIL PROTECTED] Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/ITCENTER/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/ITCENTER/join (Yahoo! ID required) <*> To change settings via email: mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/