12 Microsoft Security Bulletins for August 2006

MS06-040—Vulnerability in Server Service Could Allow Remote Code Execution

A buffer overrun vulnerability in the Server service allows for complete control of an affected system.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: Test patch and install immediately.

MS06-041—Vulnerability in DNS Resolution Could Allow Remote Code Execution.

A remote code execution vulnerability in Winsock could be used to take control of a system. A successful attack would occur after a user opens a file or visits a Web site that calls the affected Winsock API. Also, a DNS client buffer overrun vulnerability could allow an attacker to gain complete control of a system.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: Test patch and install immediately.

MS06-042—Cumulative Security Update for Internet Explorer

This update addresses a significant number of vulnerabilities in Internet Explorer (IE). If a user running IE with administrative privileges visits a Web site that uses one of the exploits patched by this update, his or her system could be completely compromised. The attacks will be less damaging if the user is running an account with restricted rights.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: Organizations that use IE should test the update and install it immediately. For organizations that use an alternative browser, this update is important but not critical.

MS06-043—Vulnerability in Microsoft Windows Could Allow Remote Code Execution.

This vulnerability relates to the parsing of MHTML in Outlook Express. If a user with administrative privileges is running Outlook Express and opens an appropriately formatted email, the attacker could gain control of the user's system.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 SP1

Recommendation: Organizations that use Outlook Express as their mail client should test and install the patch immediately. The patch is important but not critical for organizations that use alternative mail clients.

MS06-044—Vulnerability in Microsoft Management Console Could Allow Remote Code Execution

The version of MMC in Win2K SP4 is vulnerable to a cross-site scripting attack that could be used to take control of a computer. As MMC is used primarily by administrators, such an attack could quickly compromise a system.

Recommendation: Test patch and install immediately on Win2K SP4 computers.

MS06-045—Vulnerability in Windows Explorer Could Allow Remote Code Execution

This update deals with a remote code execution vulnerability in all versions of Windows Explorer related to drag and drop events.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: The update should be tested and installed as soon as possible but isn't as high a priority as some of the other bulletins this month.

MS06-046—Vulnerability in HTML Help Could Allow Remote Code Execution

This bulletin replaces a previous security update (MS05-001). This update repairs a vulnerability in the HTML Help ActiveX control that might allow remote code execution.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: Test patch and install immediately.

MS06-047—Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution

This update addresses a remote code execution vulnerability in Microsoft Visual Basic for Applications. It applies to most versions of Microsoft Office and Microsoft Works as well as the Visual Basic for Applications SDK, versions 6.0 through 6.4. Office 2003 SP1 and SP2 aren't vulnerable to this exploit.

Recommendation: If your organization uses versions of Office prior to and including Office XP, you should test and apply this update immediately.

MS06-048—Vulnerabilities in Microsoft Office Could Allow Remote Code Execution

This update applies to all versions of PowerPoint and replaces a previous update (MS06-038). If a PowerPoint file with a malformed shape container is parsed by PowerPoint, remote code can be executed on the system.

Recommendation: Organizations that use PowerPoint should test the patch and apply it immediately.

MS06-049—Vulnerability in Windows Kernel Could Result in Elevation of Privilege

This bulletin replaces the MS05-055 bulletin. It applies only to Win2K SP4. An attacker who exploits this vulnerability could take control of an affected system.

Recommendation: If your organization is still using Win2K, you should test and apply this update as soon as possible. The update is not as critical as others this month.

MS06-050—Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution

This bulletin replaces MS05-015. It deals with a hyperlink object buffer overflow and object function vulnerability. If exploited, an attacker could take control of an affected system.

Applies to: Windows 2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: The update should be tested and installed as soon as possible but isn't as high a priority as some of the other bulletins this month.

MS06-051—Vulnerability in Windows Kernel Could Result in Remote Code Execution

This update resolves a user privilege vulnerability and an "unhandled exception vulnerability" that could allow remote code execution.

Applies to: Win2K SP4, XP SP1 and SP2, Windows 2003 and SP1

Recommendation: Test patch and install immediately.

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish