Microsoft unveils four security updates

Posted on Wednesday, September 12 2007 @ 15:29 CEST by Thomas De Maesschalck
Microsoft launched four new security updates on Tuesday - one critical and three important ones:
  • Vulnerability in Microsoft Agent Could Allow Remote Code Execution (938827)
    This critical security update resolves a privately reported vulnerability. A remote code execution vulnerability exists in Microsoft Agent in the way that it handles certain specially crafted URLs. The vulnerability could allow an attacker to remotely execute code on the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

  • Vulnerability in Crystal Reports for Visual Studio Could Allow Remote Code Execution (941522)
    This important security update resolves a publicly disclosed vulnerability. This vulnerability could allow remote code execution if a user opens a specially crafted RPT file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

  • Vulnerability in Windows Services for UNIX Could Allow Elevation of Privilege (939778)
    This important security update resolves one publicly reported vulnerability. A vulnerability exists in Windows Services for UNIX 3.0, Windows Services for UNIX 3.5, and Subsystem for UNIX-based Applications where running certain setuid binary files could allow an attacker to gain elevation of privilege.

  • Vulnerability in MSN Messenger and Windows Live Messenger could allow Remote Code Execution (942099)
    This security update resolves a publicly disclosed vulnerability in MSN Messenger and Windows Live Messenger. The vulnerability could allow remote code execution when a user accepts a video chat invitation from an attacker. An attacker who successfully exploited this vulnerability could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.


  • About the Author

    Thomas De Maesschalck

    Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



    Loading Comments