M
MEB
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Cyber Security Alert SA07-191A
Microsoft Updates for Multiple Vulnerabilities
Original release date: July 12, 2007
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Office
Overview
Vulnerabilities in Microsoft Windows and Office could allow an
attacker to gain control of your computer.
Solution
Install updates
Microsoft has released updates to remedy vulnerabilities in Microsoft
Windows and Office. To obtain these updates, visit the Microsoft
Update web site. We also recommend enabling Automatic Updates.
Description
Vulnerabilities in Microsoft Windows and Office may allow an attacker
to access your computer, install and run malicious software on your
computer, or cause it to crash.
More technical information is available in US-CERT Technical Cyber
Security Alert TA07-191A.
References
* US-CERT Technical Cyber Security Alert TA07-191A -
<http://www.us-cert.gov/cas/techalerts/TA07-191A.html>
* Vulnerability Notes for Microsoft July 2007 updates -
<http://www.kb.cert.org/vuls/byid?searchview&query=ms07-Jul>
* Microsoft security updates for July 2007 -
<http://www.microsoft.com/protect/computer/updates/bulletins/200707.mspx>
* Microsoft Security at Home - <http://www.microsoft.com/protect/>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Microsoft Automatic Updates -
<http://www.microsoft.com/athome/security/update/msupdate_keep_current.mspx#
EZB>
* Microsoft Security at Home - <http://www.microsoft.com/protect/>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Microsoft Automatic Updates -
<http://www.microsoft.com/athome/security/update/msupdate_keep_current.mspx#
EZB>
_________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/alerts/SA07-191A.html>
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "SA07-191A Feedback VU#487905" in the
subject.
________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
________________________________________________________________
Produced 2007 by US-CERT, a government organization. Terms of use
Terms of use:
<http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
July 10, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpPqPvRFkHkM87XOAQIR7Qf/dB6eCYQn5pxrAHCEXP5edkpi3ZZiqdC0
omCvDyVgmDVfrs/ZE1yk0qLgQxR8TU9J4hnBdbIRNhsP+cRmr//fj8qvvU4IlI/X
S/tY/o0pP8GEsJrFfpcSXuh0TMme4Vyw+V6mOwBzHiHS1LEmclQ954dgrmbsJEER
35rtshZCSlKj98X0QXUT5Ev31F9ELcn1qcg5rv8a3tfefzzF5iRshmhd8d06W2GL
c7okyBZapeOYhjlaGjkVlex8kF75e+F3CcLplj551awCwRM0WjiHWKIuePcYEES1
BIpAaVmsVWEdvvq7ybBq2MMXDFNxNPKSaMrQcVjCqQ1zCR3lmkXMcw==
=Fg+7
-----END PGP SIGNATURE-----
*******
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-191A
Microsoft Updates for Multiple Vulnerabilities
Original release date: July 10, 2007
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Excel
* Microsoft Publisher
* Microsoft .NET Framework
* Microsoft Internet Information Services (IIS)
* Microsoft Windows Vista Firewall
Overview
Microsoft has released updates that address critical vulnerabilities
in Microsoft Windows, Excel, Publisher, .NET Framework, Internet
Information Services, and Windows Vista Firewall. Exploitation of
these vulnerabilities could allow a remote, unauthenticated attacker
to execute arbitrary code or cause a denial of service on a vulnerable
system.
I. Description
Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Excel, Publisher, .NET Framework, Internet
Information Services, and Windows Vista Firewall as part of the
Microsoft Security Bulletin Summary for July 2007. The most severe
vulnerabilities could allow a remote, unauthenticated attacker to
execute arbitrary code or cause a denial of service on a vulnerable
system.
Further information about the vulnerabilities addressed by these
updates is available in the Vulnerability Notes Database
II. Impact
A remote, unauthenticated attacker could execute arbitrary code on a
vulnerable system. An attacker may also be able to cause a denial of
service.
III. Solution
Apply updates from Microsoft
Microsoft has provided updates for these vulnerabilities in the July
2007 Security Bulletins. The Security Bulletins describe any known
issues related to the updates. Administrators are encouraged to note
any known issues that are described in the Bulletins and test for any
potentially adverse effects.
System administrators may wish to consider using an automated patch
distribution system such as Windows Server Update Services (WSUS).
IV. References
* US-CERT Vulnerability Notes for Microsoft July 2007 updates -
<http://www.kb.cert.org/vuls/byid?searchview&query=ms07-jul>
* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/>
* Microsoft Security Bulletin Summary for July 2007 -
<http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Microsoft Office Update - <http://officeupdate.microsoft.com/>
* Windows Server Update Services -
<http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-191A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA07-191A Feedback VU#487905" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
July 10, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpPwhvRFkHkM87XOAQKWiQf/XFpYurcCFZ1qG700NatqdY7wL6pO4qbv
hGzdzUJH+aRN7b6XaEE/ZLprWnyj2H8HbH+HAHOuKDOxBI7N6PQ4WPaeZ14tDsNP
pNFg81LjE5Hlj6h5N2p8XML3t/4X7a7wk5YB7nhiBdisxAJ7iNjQ1BawjTlA9/kl
dTaIRW2njHpupGLWuin60U/di12jI3JirgJHfiRK6Ruiqnv56rM7LS9IOT1HV5RR
0otIr1Dttdnmgveb0YOiz7A36nwMiCEUzcUu2rKzARpZ4gMBIrSbfkAJpyUE0w3K
WMh1tgEt3fooTgvBUhpDjfxbMNka85wGbpizcsKnw6VVzIQAlr0y3Q==
=FRhW
-----END PGP SIGNATURE-----
*****
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-192A
Adobe Flash Player Updates for Multiple Vulnerabilities
Original release date: July 11, 2007
Last revised: --
Source: US-CERT
Systems Affected
Microsoft Windows, Apple Mac OS X, Linux, Solaris, or other operating
systems with any of the following Adobe products installed:
* Flash Player 9.0.45.0
* Flash Player 9.0.45.0 and earlier network distribution
* Flash Basic
* Flash CS3 Professional
* Flash Professional 8, Flash Basic
* Flex 2.0
* Flash Player 7.070.0 for Linux or Solaris
For more complete information, refer to Adobe Security Bulletin
APSB07-12.
Overview
There are critical vulnerabilities in Adobe Flash player and related
software. Exploitation of these vulnerabilities could allow a remote,
unauthenticated attacker to execute arbitrary code or cause a denial
of service on a vulnerable system.
I. Description
Adobe Security Bulletin APSB07-12 addresses vulnerabilities in Adobe
Flash Player and related software. Further information is available in
the US-CERT Vulnerability Notes database.
Several operating systems, including Microsoft Windows and Apple OS X,
have vulnerable versions of Flash installed by default. Systems with
Flash-enabled web browsers are vulnerable. To exploit these
vulnerabilities, an attacker could host a specially crafted Flash file
on a web site and convince a user to visit the site.
II. Impact
A remote, unauthenticated attacker could execute arbitrary code with
the privileges of the user, steal credentials, or create a
denial-of-service condition. If the user is logged on with
administrative privileges, the attacker could take complete control of
an affected system.
III. Solution
Apply Updates
Check with your vendor for patches or updates. For information about a
specific vendor, please see the Systems Affected section in the
vulnerability notes or contact your vendor directly. If you get the
flash player from Adobe, see the Adobe Get Flash page for information
about updates.
Disable Flash
Users who are unable to apply the patch should disable Flash. Contact
your vendor or see the US-CERT Vulnerability Notes VU#110297,
VU#730785, or VU#138457 for more details.
Appendix A. References
* Adobe - APSB07-12: Flash Player update available to address
security vulnerabilities -
<http://www.adobe.com/support/security/bulletins/apsb07-12.html>
* US-CERT Vulnerability Notes Database -
<http://www.kb.cert.org/vuls/byid?searchview&query=VU#138457,VU#23110297
,VU%23730785>
_________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-192A.html>
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA07-192A Feedback VU#730785" in the
subject.
_________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
_________________________________________________________________
Produced 2007 by US-CERT, a government organization. Terms of use
Terms of use:
<http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
July 11, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpU9ffRFkHkM87XOAQKltggAm5ZRfQ8tfM+0WGcNtMPCxjHyWfX3VNNt
8Q6rkAkft8LcP0ek7dRs4kxfvEz4RHWmT+6J/tUeG/X8DoBZKcjbe/c/Vh0gLQYN
xKlAUXGjThWuTeoUmKwZkDQTdlwR1Y3E/LpjUKxoErANuLsgsHQkyvM8lDw+qBY6
TzynZFOSR0ZNjS7IpP945dkaFEbxY5gYGYi19/0FbgRMfcMLEkSmOrWIc5n58U1U
IOQ/1gtZIWsNBR50Xrjs6avfSHNR7kTYXSMoSupZkuBGoapwwmYp/cVh1KPYJRjt
jc0IaQbcGA80o22TJ1yyYroF8x5oUVpzLqJBcZSJLHWUMSXxB4Bv3g==
=yQt6
-----END PGP SIGNATURE-----
Hash: SHA1
National Cyber Alert System
Cyber Security Alert SA07-191A
Microsoft Updates for Multiple Vulnerabilities
Original release date: July 12, 2007
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Office
Overview
Vulnerabilities in Microsoft Windows and Office could allow an
attacker to gain control of your computer.
Solution
Install updates
Microsoft has released updates to remedy vulnerabilities in Microsoft
Windows and Office. To obtain these updates, visit the Microsoft
Update web site. We also recommend enabling Automatic Updates.
Description
Vulnerabilities in Microsoft Windows and Office may allow an attacker
to access your computer, install and run malicious software on your
computer, or cause it to crash.
More technical information is available in US-CERT Technical Cyber
Security Alert TA07-191A.
References
* US-CERT Technical Cyber Security Alert TA07-191A -
<http://www.us-cert.gov/cas/techalerts/TA07-191A.html>
* Vulnerability Notes for Microsoft July 2007 updates -
<http://www.kb.cert.org/vuls/byid?searchview&query=ms07-Jul>
* Microsoft security updates for July 2007 -
<http://www.microsoft.com/protect/computer/updates/bulletins/200707.mspx>
* Microsoft Security at Home - <http://www.microsoft.com/protect/>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Microsoft Automatic Updates -
<http://www.microsoft.com/athome/security/update/msupdate_keep_current.mspx#
EZB>
* Microsoft Security at Home - <http://www.microsoft.com/protect/>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Microsoft Automatic Updates -
<http://www.microsoft.com/athome/security/update/msupdate_keep_current.mspx#
EZB>
_________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/alerts/SA07-191A.html>
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "SA07-191A Feedback VU#487905" in the
subject.
________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
________________________________________________________________
Produced 2007 by US-CERT, a government organization. Terms of use
Terms of use:
<http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
July 10, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpPqPvRFkHkM87XOAQIR7Qf/dB6eCYQn5pxrAHCEXP5edkpi3ZZiqdC0
omCvDyVgmDVfrs/ZE1yk0qLgQxR8TU9J4hnBdbIRNhsP+cRmr//fj8qvvU4IlI/X
S/tY/o0pP8GEsJrFfpcSXuh0TMme4Vyw+V6mOwBzHiHS1LEmclQ954dgrmbsJEER
35rtshZCSlKj98X0QXUT5Ev31F9ELcn1qcg5rv8a3tfefzzF5iRshmhd8d06W2GL
c7okyBZapeOYhjlaGjkVlex8kF75e+F3CcLplj551awCwRM0WjiHWKIuePcYEES1
BIpAaVmsVWEdvvq7ybBq2MMXDFNxNPKSaMrQcVjCqQ1zCR3lmkXMcw==
=Fg+7
-----END PGP SIGNATURE-----
*******
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-191A
Microsoft Updates for Multiple Vulnerabilities
Original release date: July 10, 2007
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows
* Microsoft Excel
* Microsoft Publisher
* Microsoft .NET Framework
* Microsoft Internet Information Services (IIS)
* Microsoft Windows Vista Firewall
Overview
Microsoft has released updates that address critical vulnerabilities
in Microsoft Windows, Excel, Publisher, .NET Framework, Internet
Information Services, and Windows Vista Firewall. Exploitation of
these vulnerabilities could allow a remote, unauthenticated attacker
to execute arbitrary code or cause a denial of service on a vulnerable
system.
I. Description
Microsoft has released updates to address vulnerabilities that affect
Microsoft Windows, Excel, Publisher, .NET Framework, Internet
Information Services, and Windows Vista Firewall as part of the
Microsoft Security Bulletin Summary for July 2007. The most severe
vulnerabilities could allow a remote, unauthenticated attacker to
execute arbitrary code or cause a denial of service on a vulnerable
system.
Further information about the vulnerabilities addressed by these
updates is available in the Vulnerability Notes Database
II. Impact
A remote, unauthenticated attacker could execute arbitrary code on a
vulnerable system. An attacker may also be able to cause a denial of
service.
III. Solution
Apply updates from Microsoft
Microsoft has provided updates for these vulnerabilities in the July
2007 Security Bulletins. The Security Bulletins describe any known
issues related to the updates. Administrators are encouraged to note
any known issues that are described in the Bulletins and test for any
potentially adverse effects.
System administrators may wish to consider using an automated patch
distribution system such as Windows Server Update Services (WSUS).
IV. References
* US-CERT Vulnerability Notes for Microsoft July 2007 updates -
<http://www.kb.cert.org/vuls/byid?searchview&query=ms07-jul>
* Securing Your Web Browser -
<http://www.us-cert.gov/reading_room/securing_browser/>
* Microsoft Security Bulletin Summary for July 2007 -
<http://www.microsoft.com/technet/security/bulletin/ms07-jul.mspx>
* Microsoft Update - <https://update.microsoft.com/microsoftupdate/>
* Microsoft Office Update - <http://officeupdate.microsoft.com/>
* Windows Server Update Services -
<http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-191A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA07-191A Feedback VU#487905" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
July 10, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpPwhvRFkHkM87XOAQKWiQf/XFpYurcCFZ1qG700NatqdY7wL6pO4qbv
hGzdzUJH+aRN7b6XaEE/ZLprWnyj2H8HbH+HAHOuKDOxBI7N6PQ4WPaeZ14tDsNP
pNFg81LjE5Hlj6h5N2p8XML3t/4X7a7wk5YB7nhiBdisxAJ7iNjQ1BawjTlA9/kl
dTaIRW2njHpupGLWuin60U/di12jI3JirgJHfiRK6Ruiqnv56rM7LS9IOT1HV5RR
0otIr1Dttdnmgveb0YOiz7A36nwMiCEUzcUu2rKzARpZ4gMBIrSbfkAJpyUE0w3K
WMh1tgEt3fooTgvBUhpDjfxbMNka85wGbpizcsKnw6VVzIQAlr0y3Q==
=FRhW
-----END PGP SIGNATURE-----
*****
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-192A
Adobe Flash Player Updates for Multiple Vulnerabilities
Original release date: July 11, 2007
Last revised: --
Source: US-CERT
Systems Affected
Microsoft Windows, Apple Mac OS X, Linux, Solaris, or other operating
systems with any of the following Adobe products installed:
* Flash Player 9.0.45.0
* Flash Player 9.0.45.0 and earlier network distribution
* Flash Basic
* Flash CS3 Professional
* Flash Professional 8, Flash Basic
* Flex 2.0
* Flash Player 7.070.0 for Linux or Solaris
For more complete information, refer to Adobe Security Bulletin
APSB07-12.
Overview
There are critical vulnerabilities in Adobe Flash player and related
software. Exploitation of these vulnerabilities could allow a remote,
unauthenticated attacker to execute arbitrary code or cause a denial
of service on a vulnerable system.
I. Description
Adobe Security Bulletin APSB07-12 addresses vulnerabilities in Adobe
Flash Player and related software. Further information is available in
the US-CERT Vulnerability Notes database.
Several operating systems, including Microsoft Windows and Apple OS X,
have vulnerable versions of Flash installed by default. Systems with
Flash-enabled web browsers are vulnerable. To exploit these
vulnerabilities, an attacker could host a specially crafted Flash file
on a web site and convince a user to visit the site.
II. Impact
A remote, unauthenticated attacker could execute arbitrary code with
the privileges of the user, steal credentials, or create a
denial-of-service condition. If the user is logged on with
administrative privileges, the attacker could take complete control of
an affected system.
III. Solution
Apply Updates
Check with your vendor for patches or updates. For information about a
specific vendor, please see the Systems Affected section in the
vulnerability notes or contact your vendor directly. If you get the
flash player from Adobe, see the Adobe Get Flash page for information
about updates.
Disable Flash
Users who are unable to apply the patch should disable Flash. Contact
your vendor or see the US-CERT Vulnerability Notes VU#110297,
VU#730785, or VU#138457 for more details.
Appendix A. References
* Adobe - APSB07-12: Flash Player update available to address
security vulnerabilities -
<http://www.adobe.com/support/security/bulletins/apsb07-12.html>
* US-CERT Vulnerability Notes Database -
<http://www.kb.cert.org/vuls/byid?searchview&query=VU#138457,VU#23110297
,VU%23730785>
_________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-192A.html>
_________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA07-192A Feedback VU#730785" in the
subject.
_________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
_________________________________________________________________
Produced 2007 by US-CERT, a government organization. Terms of use
Terms of use:
<http://www.us-cert.gov/legal.html>
_________________________________________________________________
Revision History
July 11, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpU9ffRFkHkM87XOAQKltggAm5ZRfQ8tfM+0WGcNtMPCxjHyWfX3VNNt
8Q6rkAkft8LcP0ek7dRs4kxfvEz4RHWmT+6J/tUeG/X8DoBZKcjbe/c/Vh0gLQYN
xKlAUXGjThWuTeoUmKwZkDQTdlwR1Y3E/LpjUKxoErANuLsgsHQkyvM8lDw+qBY6
TzynZFOSR0ZNjS7IpP945dkaFEbxY5gYGYi19/0FbgRMfcMLEkSmOrWIc5n58U1U
IOQ/1gtZIWsNBR50Xrjs6avfSHNR7kTYXSMoSupZkuBGoapwwmYp/cVh1KPYJRjt
jc0IaQbcGA80o22TJ1yyYroF8x5oUVpzLqJBcZSJLHWUMSXxB4Bv3g==
=yQt6
-----END PGP SIGNATURE-----