J
Jerry Bryant [MSFT]
Follow up set to microsoft.public.security
July 12, 2005
Today Microsoft released the following Security Bulletin(s).
Note: www.microsoft.com/technet/security and www.microsoft.com/security are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the microsoft.com download center or Windows Update. See the
individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided.
Bulletin Summary:
http://www.microsoft.com/technet/security/Bulletin/ms05-Jul.mspx
Critical Bulletins:
Vulnerability in Microsoft Word Could Allow Remote Code Execution (903672)
http://www.microsoft.com/technet/security/Bulletin/ms05-035.mspx
Vulnerability in Microsoft Color Management Module Could Allow Remote Code
Execution (901214)
http://www.microsoft.com/technet/security/Bulletin/ms05-036.mspx
Vulnerability in JView Profiler Could Allow Remote Code Execution (903235)
http://www.microsoft.com/technet/security/Bulletin/ms05-037.mspx
Re-Released Bulletins:
Vulnerability in Telnet Client Could Allow Information Disclosure (896428)
http://www.microsoft.com/technet/security/Bulletin/ms05-033.mspx
This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins out
side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.
--
Regards,
Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities
Get Secure! www.microsoft.com/security
This posting is provided "AS IS" with no warranties, and confers no rights.
July 12, 2005
Today Microsoft released the following Security Bulletin(s).
Note: www.microsoft.com/technet/security and www.microsoft.com/security are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the microsoft.com download center or Windows Update. See the
individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided.
Bulletin Summary:
http://www.microsoft.com/technet/security/Bulletin/ms05-Jul.mspx
Critical Bulletins:
Vulnerability in Microsoft Word Could Allow Remote Code Execution (903672)
http://www.microsoft.com/technet/security/Bulletin/ms05-035.mspx
Vulnerability in Microsoft Color Management Module Could Allow Remote Code
Execution (901214)
http://www.microsoft.com/technet/security/Bulletin/ms05-036.mspx
Vulnerability in JView Profiler Could Allow Remote Code Execution (903235)
http://www.microsoft.com/technet/security/Bulletin/ms05-037.mspx
Re-Released Bulletins:
Vulnerability in Telnet Client Could Allow Information Disclosure (896428)
http://www.microsoft.com/technet/security/Bulletin/ms05-033.mspx
This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins out
side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.
--
Regards,
Jerry Bryant - MCSE, MCDBA
Microsoft IT Communities
Get Secure! www.microsoft.com/security
This posting is provided "AS IS" with no warranties, and confers no rights.