[ITCENTER] buat para pemakai windows

2008-10-24 Terurut Topik �暧疴� (Ryo Saeba)
ada critical patch yang baru banget dirilis.

http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

TechNet Home http://technet.microsoft.com/  TechNet
Securityhttp://technet.microsoft.com/security/default.aspx
Bulletins http://www.microsoft.com/technet/security/current.aspx
Microsoft Security Bulletin MS08-067 – CriticalVulnerability in Server
Service Could Allow Remote Code Execution (958644) Published: October 23,
2008

*Version:* 1.0
General InformationExecutive Summary

This security update resolves a privately reported vulnerability in the
Server service. The vulnerability could allow remote code execution if an
affected system received a specially crafted RPC request. On Microsoft
Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could
exploit this vulnerability without authentication to run arbitrary code. It
is possible that this vulnerability could be used in the crafting of a
wormable exploit. Firewall best practices and standard default firewall
configurations can help protect network resources from attacks that
originate outside the enterprise perimeter.

This security update is rated Critical for all supported editions of
Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important
for all supported editions of Windows Vista and Windows Server 2008. For
more information, see the subsection, *Affected and Non-Affected Software*,
in this section.

The security update addresses the vulnerability by correcting the way that
the Server service handles RPC requests. For more information about the
vulnerability, see the Frequently Asked Questions (FAQ) subsection for the
specific vulnerability entry under the next section, *Vulnerability
Information*.

*Recommendation.* Microsoft recommends that customers apply the update
immediately.

*Known Issues.* None
[image: Top of 
section]http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENBTop
of sectionhttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB
Affected and Non-Affected Software

The following software have been tested to determine which versions or
editions are affected. Other versions or editions are either past their
support life cycle or are not affected. To determine the support life cycle
for your software version or edition, visit Microsoft Support
Lifecyclehttp://go.microsoft.com/fwlink/?LinkId=21742
.

*Affected Software*
Operating SystemMaximum Security ImpactAggregate Severity Rating Bulletins
Replaced by this Update

Microsoft Windows 2000 Service Pack
4http://www.microsoft.com/downloads/details.aspx?familyid=E22EB3AE-1295-4FE2-9775-6F43C5C2AED3

Remote Code Execution

Critical

MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

Windows XP Service Pack
2http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03

Remote Code Execution

Critical

MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

Windows XP Service Pack
3http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03

Remote Code Execution

Critical

None

Windows XP Professional x64
Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25

Remote Code Execution

Critical

MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

Windows XP Professional x64 Edition Service Pack
2http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25

Remote Code Execution

Critical

None

Windows Server 2003 Service Pack
1http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D

Remote Code Execution

Critical

MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

Windows Server 2003 Service Pack
2http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D

Remote Code Execution

Critical

None

Windows Server 2003 x64
Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400

Remote Code Execution

Critical

MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

Windows Server 2003 x64 Edition Service Pack
2http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400

Remote Code Execution

Critical

None

Windows Server 2003 with SP1 for Itanium-based
Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF

Remote Code Execution

Critical

MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

Windows Server 2003 with SP2 for Itanium-based
Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF

Remote Code Execution

Critical

None

Windows Vista and Windows Vista Service Pack
1http://www.microsoft.com/downloads/details.aspx?familyid=18FDFF67-C723-42BD-AC5C-CAC7D8713B21

Remote Code Execution

Important

None

Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack

Re: [ITCENTER] buat para pemakai windows

2008-10-24 Terurut Topik mc-iroel
wow makasih pak atas infonya, sangat bermanfaat.

On 10/24/08, �暧疴� (Ryo Saeba) [EMAIL PROTECTED] wrote:
 ada critical patch yang baru banget dirilis.

 http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

 TechNet Home http://technet.microsoft.com/  TechNet
 Securityhttp://technet.microsoft.com/security/default.aspx
 Bulletins http://www.microsoft.com/technet/security/current.aspx
 Microsoft Security Bulletin MS08-067 �C CriticalVulnerability in Server
 Service Could Allow Remote Code Execution (958644) Published: October 23,
 2008

 *Version:* 1.0
 General InformationExecutive Summary

 This security update resolves a privately reported vulnerability in the
 Server service. The vulnerability could allow remote code execution if an
 affected system received a specially crafted RPC request. On Microsoft
 Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could
 exploit this vulnerability without authentication to run arbitrary code. It
 is possible that this vulnerability could be used in the crafting of a
 wormable exploit. Firewall best practices and standard default firewall
 configurations can help protect network resources from attacks that
 originate outside the enterprise perimeter.

 This security update is rated Critical for all supported editions of
 Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important
 for all supported editions of Windows Vista and Windows Server 2008. For
 more information, see the subsection, *Affected and Non-Affected Software*,
 in this section.

 The security update addresses the vulnerability by correcting the way that
 the Server service handles RPC requests. For more information about the
 vulnerability, see the Frequently Asked Questions (FAQ) subsection for the
 specific vulnerability entry under the next section, *Vulnerability
 Information*.

 *Recommendation.* Microsoft recommends that customers apply the update
 immediately.

 *Known Issues.* None
 [image: Top of 
 section]http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENBTop
 of 
 sectionhttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB
 Affected and Non-Affected Software

 The following software have been tested to determine which versions or
 editions are affected. Other versions or editions are either past their
 support life cycle or are not affected. To determine the support life cycle
 for your software version or edition, visit Microsoft Support
 Lifecyclehttp://go.microsoft.com/fwlink/?LinkId=21742
 .

 *Affected Software*
 Operating SystemMaximum Security ImpactAggregate Severity Rating Bulletins
 Replaced by this Update

 Microsoft Windows 2000 Service Pack
 4http://www.microsoft.com/downloads/details.aspx?familyid=E22EB3AE-1295-4FE2-9775-6F43C5C2AED3

 Remote Code Execution

 Critical

 MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

 Windows XP Service Pack
 2http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03

 Remote Code Execution

 Critical

 MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

 Windows XP Service Pack
 3http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03

 Remote Code Execution

 Critical

 None

 Windows XP Professional x64
 Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25

 Remote Code Execution

 Critical

 MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

 Windows XP Professional x64 Edition Service Pack
 2http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25

 Remote Code Execution

 Critical

 None

 Windows Server 2003 Service Pack
 1http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D

 Remote Code Execution

 Critical

 MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

 Windows Server 2003 Service Pack
 2http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D

 Remote Code Execution

 Critical

 None

 Windows Server 2003 x64
 Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400

 Remote Code Execution

 Critical

 MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

 Windows Server 2003 x64 Edition Service Pack
 2http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400

 Remote Code Execution

 Critical

 None

 Windows Server 2003 with SP1 for Itanium-based
 Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF

 Remote Code Execution

 Critical

 MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299

 Windows Server 2003 with SP2 for Itanium-based
 Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF

 Remote Code Execution

 Critical

 None

 Windows Vista and Windows Vista Service Pack