D
Donna Buenaventura
The Microsoft Security Bulletins for February, 2007 has been released.
6 Critical
.. MS07-008 - Vulnerability in HTML Help ActiveX Control Could Allow Remote
Code Execution (928843)
.. MS07-009 - Vulnerability in Microsoft Data Access Components Could Allow
Remote Code Execution(927779)
.. MS07-010 - Vulnerability in Microsoft Malware Protection Engine Could
Allow Remote Code Execution (932135)
.. MS07-014 - Vulnerabilities in Microsoft Word Could Allow Remote Code
Execution (929434)
.. MS07-015 - Vulnerabilities in Microsoft Office Could Allow Remote Code
Execution (932554)
.. MS07-016 - Cumulative Security Update for Internet Explorer (928090)
6 Updates
.. MS07-005 - Vulnerability in Step-by-Step Interactive Training Could Allow
Remote Code Execution (923723)
.. MS07-006 - Vulnerability in Windows Shell Could Allow Elevation of
Privilege (928255)
.. MS07-007 - Vulnerability in Windows Image Acquisition Service Could Allow
Elevation of Privilege (927802)
.. MS07-011 - Vulnerability in Microsoft OLE Dialog Could Allow Remote Code
Execution (926436)
.. MS07-012 - Vulnerability in Microsoft MFC Could Allow Remote Code
Execution (924667)
.. MS07-013 - Vulnerability in Microsoft RichEdit Could Allow Remote Code
Execution (918118)
The Microsoft Security Bulletin Summary for February, 2007 is at
http://www.microsoft.com/technet/security/bulletin/ms07-feb.mspx. An
end-user version of this information is available at
http://www.microsoft.com/athome/security/update/bulletins/200702.mspx
Security Updates Support: If you have any questions regarding the patch or
its implementation, you should contact Product Support Services in the
United States at 1-866-PCSAFETY. International customers should contact
their local subsidiary.
Update sources: As always, download the updates only from the vendors'
website - visit Windows Update and Office Update or Microsoft Update. You
may also get the updates thru Automatic Updates functionality in Windows.
Note: Don't be a victim of spoofed emails. Read "How to tell whether a
security e-mail message is really from Microsoft"
http://www.microsoft.com/athome/security/email/ms_genuine_mail.mspx
Recommendations: Microsoft advises customers to install the latest product
releases, security updates, and service packs to remain as secure as
possible. Older products, such as Microsoft Windows NT 4.0, may not meet
today's more demanding security requirements. It may not be possible for
Microsoft to provide security updates for older products. More info at
Support Lifecycle website.
http://support.microsoft.com/lifecycle/
Webcast: Microsoft will host a webcast tomorrow. The webcast focuses on
addressing your questions and concerns about the security bulletins.
Therefore, most of the live webcast is aimed at giving you the opportunity
to ask questions and get answers from their security experts.
http://msevents.microsoft.com/CUI/W...&EventCategory=4&culture=en-US&CountryCode=US
Security Tool: Find out if you are missing important security updates by
using MBSA.
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
--
Regards,
Donna Buenaventura
Windows Security MVP
w: http://cou.dozleng.com
b: http://msmvps.com/donna
6 Critical
.. MS07-008 - Vulnerability in HTML Help ActiveX Control Could Allow Remote
Code Execution (928843)
.. MS07-009 - Vulnerability in Microsoft Data Access Components Could Allow
Remote Code Execution(927779)
.. MS07-010 - Vulnerability in Microsoft Malware Protection Engine Could
Allow Remote Code Execution (932135)
.. MS07-014 - Vulnerabilities in Microsoft Word Could Allow Remote Code
Execution (929434)
.. MS07-015 - Vulnerabilities in Microsoft Office Could Allow Remote Code
Execution (932554)
.. MS07-016 - Cumulative Security Update for Internet Explorer (928090)
6 Updates
.. MS07-005 - Vulnerability in Step-by-Step Interactive Training Could Allow
Remote Code Execution (923723)
.. MS07-006 - Vulnerability in Windows Shell Could Allow Elevation of
Privilege (928255)
.. MS07-007 - Vulnerability in Windows Image Acquisition Service Could Allow
Elevation of Privilege (927802)
.. MS07-011 - Vulnerability in Microsoft OLE Dialog Could Allow Remote Code
Execution (926436)
.. MS07-012 - Vulnerability in Microsoft MFC Could Allow Remote Code
Execution (924667)
.. MS07-013 - Vulnerability in Microsoft RichEdit Could Allow Remote Code
Execution (918118)
The Microsoft Security Bulletin Summary for February, 2007 is at
http://www.microsoft.com/technet/security/bulletin/ms07-feb.mspx. An
end-user version of this information is available at
http://www.microsoft.com/athome/security/update/bulletins/200702.mspx
Security Updates Support: If you have any questions regarding the patch or
its implementation, you should contact Product Support Services in the
United States at 1-866-PCSAFETY. International customers should contact
their local subsidiary.
Update sources: As always, download the updates only from the vendors'
website - visit Windows Update and Office Update or Microsoft Update. You
may also get the updates thru Automatic Updates functionality in Windows.
Note: Don't be a victim of spoofed emails. Read "How to tell whether a
security e-mail message is really from Microsoft"
http://www.microsoft.com/athome/security/email/ms_genuine_mail.mspx
Recommendations: Microsoft advises customers to install the latest product
releases, security updates, and service packs to remain as secure as
possible. Older products, such as Microsoft Windows NT 4.0, may not meet
today's more demanding security requirements. It may not be possible for
Microsoft to provide security updates for older products. More info at
Support Lifecycle website.
http://support.microsoft.com/lifecycle/
Webcast: Microsoft will host a webcast tomorrow. The webcast focuses on
addressing your questions and concerns about the security bulletins.
Therefore, most of the live webcast is aimed at giving you the opportunity
to ask questions and get answers from their security experts.
http://msevents.microsoft.com/CUI/W...&EventCategory=4&culture=en-US&CountryCode=US
Security Tool: Find out if you are missing important security updates by
using MBSA.
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
--
Regards,
Donna Buenaventura
Windows Security MVP
w: http://cou.dozleng.com
b: http://msmvps.com/donna