[ITCENTER] buat para pemakai windows
ada critical patch yang baru banget dirilis. http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx TechNet Home http://technet.microsoft.com/ TechNet Securityhttp://technet.microsoft.com/security/default.aspx Bulletins http://www.microsoft.com/technet/security/current.aspx Microsoft Security Bulletin MS08-067 CriticalVulnerability in Server Service Could Allow Remote Code Execution (958644) Published: October 23, 2008 *Version:* 1.0 General InformationExecutive Summary This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008. For more information, see the subsection, *Affected and Non-Affected Software*, in this section. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, *Vulnerability Information*. *Recommendation.* Microsoft recommends that customers apply the update immediately. *Known Issues.* None [image: Top of section]http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENBTop of sectionhttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB Affected and Non-Affected Software The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecyclehttp://go.microsoft.com/fwlink/?LinkId=21742 . *Affected Software* Operating SystemMaximum Security ImpactAggregate Severity Rating Bulletins Replaced by this Update Microsoft Windows 2000 Service Pack 4http://www.microsoft.com/downloads/details.aspx?familyid=E22EB3AE-1295-4FE2-9775-6F43C5C2AED3 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows XP Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows XP Service Pack 3http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03 Remote Code Execution Critical None Windows XP Professional x64 Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows XP Professional x64 Edition Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25 Remote Code Execution Critical None Windows Server 2003 Service Pack 1http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows Server 2003 Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D Remote Code Execution Critical None Windows Server 2003 x64 Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows Server 2003 x64 Edition Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400 Remote Code Execution Critical None Windows Server 2003 with SP1 for Itanium-based Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows Server 2003 with SP2 for Itanium-based Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF Remote Code Execution Critical None Windows Vista and Windows Vista Service Pack 1http://www.microsoft.com/downloads/details.aspx?familyid=18FDFF67-C723-42BD-AC5C-CAC7D8713B21 Remote Code Execution Important None Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack
Re: [ITCENTER] buat para pemakai windows
wow makasih pak atas infonya, sangat bermanfaat. On 10/24/08, �暧疴� (Ryo Saeba) [EMAIL PROTECTED] wrote: ada critical patch yang baru banget dirilis. http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx TechNet Home http://technet.microsoft.com/ TechNet Securityhttp://technet.microsoft.com/security/default.aspx Bulletins http://www.microsoft.com/technet/security/current.aspx Microsoft Security Bulletin MS08-067 �C CriticalVulnerability in Server Service Could Allow Remote Code Execution (958644) Published: October 23, 2008 *Version:* 1.0 General InformationExecutive Summary This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008. For more information, see the subsection, *Affected and Non-Affected Software*, in this section. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, *Vulnerability Information*. *Recommendation.* Microsoft recommends that customers apply the update immediately. *Known Issues.* None [image: Top of section]http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENBTop of sectionhttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx#ENB Affected and Non-Affected Software The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecyclehttp://go.microsoft.com/fwlink/?LinkId=21742 . *Affected Software* Operating SystemMaximum Security ImpactAggregate Severity Rating Bulletins Replaced by this Update Microsoft Windows 2000 Service Pack 4http://www.microsoft.com/downloads/details.aspx?familyid=E22EB3AE-1295-4FE2-9775-6F43C5C2AED3 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows XP Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows XP Service Pack 3http://www.microsoft.com/downloads/details.aspx?familyid=0D5F9B6E-9265-44B9-A376-2067B73D6A03 Remote Code Execution Critical None Windows XP Professional x64 Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows XP Professional x64 Edition Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=4C16A372-7BF8-4571-B982-DAC6B2992B25 Remote Code Execution Critical None Windows Server 2003 Service Pack 1http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows Server 2003 Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=F26D395D-2459-4E40-8C92-3DE1C52C390D Remote Code Execution Critical None Windows Server 2003 x64 Editionhttp://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400 Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows Server 2003 x64 Edition Service Pack 2http://www.microsoft.com/downloads/details.aspx?familyid=C04D2AFB-F9D0-4E42-9E1F-4B944A2DE400 Remote Code Execution Critical None Windows Server 2003 with SP1 for Itanium-based Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF Remote Code Execution Critical MS06-040 http://go.microsoft.com/fwlink/?LinkId=70299 Windows Server 2003 with SP2 for Itanium-based Systemshttp://www.microsoft.com/downloads/details.aspx?familyid=AB590756-F11F-43C9-9DCC-A85A43077ACF Remote Code Execution Critical None Windows Vista and Windows Vista Service Pack