"For NASA, space is still a high priority." - Dan Quayle 


-----Original Message-----

From: Microsoft [mailto:micros...@newsletters.microsoft.com]

Sent: Tuesday, December 16, 2008 4:13 PM

Subject: Out-of Band Microsoft Security Bulletin Advance Notification
for December 2008

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

 

********************************************************************

Out-of Band Microsoft Security Bulletin Advance Notification for
December 2008

Issued: December 16, 2008

********************************************************************

 

This is an advance notification of an out-of-band security bulletin that
Microsoft is intending to release on December 17, 2008.

 

The full version of the Microsoft Security Bulletin Advance Notification
for December 2008 can be found at 
http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx.

 

This bulletin advance notification will be replaced with the revised
December bulletin summary on December 17, 2008. The revised bulletin
summary will include the out-of-band security bulletin as well as the
security bulletins already released on December 9, 2008.

 

For more information about the bulletin advance notification service,
see http://www.microsoft.com/technet/security/Bulletin/advance.mspx.

 

To receive automatic notifications whenever Microsoft Security Bulletins
are issued, subscribe to Microsoft Technical Security Notifications on 
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

 

Microsoft will host two webcasts to address customer questions on this
out-of-band security bulletin: on December 17, 2008, at 1:00 PM Pacific
Time (US & Canada) and December 18, 2008, at 11:00 AM Pacific Time.
Register for these out-of-band Security Bulletin Webcasts at 
http://www.microsoft.com/technet/security/bulletin/summary.mspx.

 

Microsoft also provides information to help customers prioritize monthly
security updates with any non-security, high-priority updates that are
being released on the same day as the monthly security updates. Please
see the section, Other Information.

 

This advance notification provides the software subject as the bulletin
identifier, because the official Microsoft Security Bulletin numbers are
not issued until release. The bulletin summary that replaces this
advance notification will have the proper Microsoft Security Bulletin
numbers (in the MSyy-xxx format) as the bulletin identifier. The
security bulletins for this month are as follows, in order of severity:

 

 

Critical Security Bulletin

============================

 

IE Bulletin

 

  - Affected Software: 

    - Internet Explorer 5.01 Service Pack 4 when installed on 

      Microsoft Windows 2000 Service Pack 4

    - Internet Explorer 6 Service Pack 1 when installed on 

      Microsoft Windows 2000 Service Pack 4

    - Internet Explorer 6 for 

      Windows XP Service Pack 2 and 

      Windows XP Service Pack 3

    - Internet Explorer 6 for 

      Windows XP Professional x64 Edition and 

      Windows XP Professional x64 Edition Service Pack 2

    - Internet Explorer 6 for 

      Windows Server 2003 Service Pack 1 and

      Windows Server 2003 Service Pack 2

    - Internet Explorer 6 for 

      Windows Server 2003 x64 Edition and

      Windows Server 2003 x64 Edition Service Pack 2

    - Internet Explorer 6 for 

      Windows Server 2003 with SP1 for Itanium-based Systems and

      Windows Server 2003 with SP2 for Itanium-based Systems

    - Internet Explorer 7 for 

      Windows XP Service Pack 2 and 

      Windows XP Service Pack 3

    - Internet Explorer 7 for 

      Windows XP Professional x64 Edition and

      Windows XP Professional x64 Edition Service Pack 2

    - Internet Explorer 7 for 

      Windows Server 2003 Service Pack 1 and

      Windows Server 2003 Service Pack 2

    - Internet Explorer 7 for 

      Windows Server 2003 x64 Edition and

      Windows Server 2003 x64 Edition Service Pack 2

    - Internet Explorer 7 for 

      Windows Server 2003 with SP1 for Itanium-based Systems and

      Windows Server 2003 with SP2 for Itanium-based Systems

    - Internet Explorer 7 in 

      Windows Vista and 

      Windows Vista Service Pack 1

    - Internet Explorer 7 in 

      Windows Vista x64 Edition and 

      Windows Vista x64 Edition Service Pack 1

    - Internet Explorer 7 in 

      Windows Server 2008 for 32-bit Systems

    - Internet Explorer 7 in 

      Windows Server 2008 for x64-based Systems

    - Internet Explorer 7 in 

      Windows Server 2008 for Itanium-based Systems

 

    - Note for Windows Internet Explorer 8 Beta 2

      This vulnerability was reported after the release of Windows

      Internet Explorer 8 Beta 2. Customers running Windows Internet

      Explorer 8 Beta 2 are encouraged to download and apply the

      update to their systems when the bulletin is published.

 

    - Impact: Remote Code Execution

    - Version Number: 1.0

 

 

Other Information

=================

 

Non-Security, High-Priority Updates on MU, WU, and WSUS:

========================================================

For information about non-security releases on Windows Update and
Microsoft update, please see:

* http://support.microsoft.com/kb/894199: Microsoft Knowledge Base

  Article 894199, Description of Software Update Services and

  Windows Server Update Services changes in content for 2008.

  Includes all Windows content.

* http://technet.microsoft.com/en-us/wsus/bb466214.aspx: New,

  Revised, and Released Updates for Microsoft Products Other Than

  Microsoft Windows

 

Microsoft Active Protections Program (MAPP)
===========================================

To improve security protections for customers, Microsoft provides
vulnerability information to major security software providers in
advance of each monthly security update release. Security software
providers can then use this vulnerability information to provide updated
protections to customers via their security software or devices, such as
antivirus, network-based intrusion detection systems, or host-based
intrusion prevention systems. To determine whether active protections
are available from security software providers, please visit the active
protections Web sites provided by program partners, listed at 
http://www.microsoft.com/security/msrc/mapp/partners.mspx.

 

Recognize and avoid fraudulent e-mail to Microsoft customers:

=============================================================

If you receive an e-mail message that claims to be distributing a
Microsoft security update, it is a hoax that may contain malware or
pointers to malicious Web sites. Microsoft does not distribute security
updates via e-mail.

 

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign
all security notifications. However, PGP is not required for reading
security notifications, reading security bulletins, or installing
security updates. You can obtain the MSRC public PGP key at 
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.

 

To receive automatic notifications whenever Microsoft Security Bulletins
are issued, subscribe to Microsoft Technical Security Notifications on 
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

 

 

 

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

              

 

_____

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<image003.jpg>>

Reply via email to