what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2009-195A

Technical Cyber Security Alert 2009-195A
Posted Jul 15, 2009
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA09-195A - Microsoft has released updates that address vulnerabilities in Microsoft Windows, Windows Server, DirectShow, Virtual PC and Server, Office Publisher, and ISA Server.

tags | advisory, vulnerability
systems | windows
advisories | CVE-2009-1537, CVE-2008-0015
SHA-256 | 34c3f3faa5532e86a2446534a8f05af1708a404420d5f24395b8c29f9aeda3cb

Technical Cyber Security Alert 2009-195A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


National Cyber Alert System

Technical Cyber Security Alert TA09-195A


Microsoft Updates for Multiple Vulnerabilities

Original release date: July 14, 2009
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows and Windows Server
* Microsoft DirectShow
* Microsoft Virtual PC and Server
* Microsoft Office Publisher
* Microsoft Internet Security and Acceleration (ISA) Server


Overview

Microsoft has released updates that address vulnerabilities in
Microsoft Windows, Windows Server, DirectShow, Virtual PC and
Server, Office Publisher, and ISA Server.


I. Description

As part of the Microsoft Security Bulletin Summary for July 2009,
Microsoft has released updates that address several vulnerabilities
in Microsoft Windows, Windows Server, DirectShow, Windows Virtual
PC and Server, Office Publisher, and ISA Server. Microsoft
indicates that two of these vulnerabilities, CVE-2009-1537 and
CVE-2008-0015, are being actively exploited.


II. Impact

A remote, unauthenticated attacker could execute arbitrary code,
gain elevated privileges, or cause a vulnerable application to
crash.


III. Solution

Microsoft has provided updates for these vulnerabilities in the
Microsoft Security Bulletin Summary for July 2009. The security
bulletin describes any known issues related to the updates.
Administrators are encouraged to note these issues and test for any
potentially adverse effects. Administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS).


IV. References

* Microsoft Security Bulletin Summary for July 2009 -
<http://www.microsoft.com/technet/security/bulletin/ms09-jul.mspx>

* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>

* New vulnerability in quartz.dll Quicktime parsing -
<http://blogs.technet.com/srd/archive/2009/05/28/new-vulnerability-in-quicktime-parsing.aspx>

* CVE-2009-1537 -
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1537>

* VU#180513 - Microsoft Video ActiveX control stack buffer overflow -
<http://www.kb.cert.org/vuls/id/180513>

* TA09-187A - Microsoft Video ActiveX Control Vulnerability -
<http://www.us-cert.gov/cas/techalerts/TA09-187A.html>

* CVE-2008-0015 -
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0015>

____________________________________________________________________

The most recent version of this document can be found at:

<http://www.us-cert.gov/cas/techalerts/TA09-195A.html>
____________________________________________________________________

Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA09-195A Feedback VU#631820" in
the subject.
____________________________________________________________________

For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

Produced 2009 by US-CERT, a government organization.

Terms of use:

<http://www.us-cert.gov/legal.html>
____________________________________________________________________

Revision History

July 14, 2009: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSlz5hHIHljM+H4irAQJAAQf/alOhtn6chnXPtgR7M4oI32H3UWHWj0B3
9GKVVMVcg4gR7g/C14hYk4E42djFDTG2t2I/0MjfkaIfMW0olvrGnzxNOh6b8koB
0Orp/BwoMeNNg5xQzSynH4jvU565HDbmPznedJ5h7GxJOqhpO5V2UiHqpRh/A3BS
bz2Kxs2v87Hek+2+K/Y6VE80cvx3zk55c/J4gD4HsYXvTKpFh/isZ2bV6VvkZZRO
FmJF7N1t9La7xuY1bQB7eIrmKcHBTVV1j/cpWnRPse1cQ1B9R0pB+IykSCxIIw7W
9ZEyPoigjYX1MJUfVj/OkI0pUTDF+6iCEcwvTQu+QnM8BJGpIbyC5A==
=xm9M
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close