September 2007 Microsoft Security Bulletin Release
Microsoft has released the following security bulletins for newly discovered vulnerabilities:
Bulletin Number |
Maximum Severity |
Affected Products |
Impact |
MS07-051 |
Critical |
Microsoft Windows 2000 |
Remote Code Execution |
MS07-052 |
Important |
Microsoft Visual Studio |
Remote Code Execution |
MS07-053 |
Important |
Windows Services for UNIX, Subsystem for UNIX-based Applications |
Elevation of Privilege |
MS07-054 |
Important |
MSN Messenger, Windows Live Messenger |
Remote Code Execution |
Summaries for these new bulletins may be found at the following pages:
https://www.microsoft.com/technet/security/bulletin/ms07-Sep.mspx
Customers are advised to review the information in the bulletins, test and deploy the updates immediately in their environments, if applicable.
Microsoft Windows Malicious Software Removal Tool
Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU) and the Download Center. Information on the Microsoft Windows Malicious Software Removal Tool can be located here: https://go.microsoft.com/fwlink/?LinkId=40573
High-Priority Non-Security Updates
High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU) or Windows Server Update Services (WSUS) will be detailed in the following KB Article: https://support.microsoft.com/?id=894199
TechNet Webcast: Microsoft will host a Webcast to address customer questions on these bulletins:
Title: Information about Microsoft September Security Bulletins (Level 200)
Date: Wednesday, September 12, 2007 11:00 AM Pacific Time (US & Canada)
URL: https://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032344690
Replay: Available 24 hours after webcast - same URL
New Security Bulletin Technical Details
In the following tables of affected and non-affected software, software editions that are not listed are past their support lifecycle. To determine the support lifecycle for your product and edition, visit Microsoft Support Lifecycle.
Bulletin Identifier |
Microsoft Security Bulletin MS07-051 |
---|---|
Bulletin Title |
Vulnerability in Microsoft Agent Could Allow Remote Code Execution (938827) |
Executive Summary |
This critical security update resolves a privately reported vulnerability. A remote code execution vulnerability exists in Microsoft Agent in the way that it handles certain specially crafted URLs. The vulnerability could allow an attacker to remotely execute code on the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Maximum Severity Rating |
Critical |
Impact of Vulnerability |
Remote Code Execution |
Detection |
Microsoft Baseline Security Analyzer can detect whether your computer system requires this update. |
Affected Software |
Windows. For more information, see the Affected Software and Download Locations section of the bulletin at the link below. |
Restart Requirement |
You must restart your system after you apply this security update. |
Removal Information |
Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility. |
Full Details: |
https://www.microsoft.com/technet/security/bulletin/MS07-051.mspx |
Bulletin Identifier |
Microsoft Security Bulletin MS07-052 |
---|---|
Bulletin Title |
Vulnerability in Crystal Reports for Visual Studio Could Allow Remote Code Execution (941522) |
Executive Summary |
This important security update resolves a publicly disclosed vulnerability. This vulnerability could allow remote code execution if a user opens a specially crafted RPT file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Maximum Severity Rating |
Important |
Impact of Vulnerability |
Remote Code Execution |
Detection |
Microsoft Baseline Security Analyzer and Enterprise Update Scan Tool can detect whether your computer system requires this update. |
Affected Software |
Visual Studio. For more information, see the Affected Software and Download Locations section of the bulletin at the link below. |
Restart Requirement |
In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012. |
Removal Information |
Use Add or Remove Program tool in Control Panel. |
Full Details: |
https://www.microsoft.com/technet/security/bulletin/MS07-052.mspx |
Bulletin Identifier |
Microsoft Security Bulletin MS07-053 |
---|---|
Bulletin Title |
Vulnerability in Windows Services for UNIX Could Allow Elevation of Privilege (939778) |
Executive Summary |
This important security update resolves one publicly reported vulnerability. A vulnerability exists in Windows Services for UNIX 3.0, Windows Services for UNIX 3.5, and Subsystem for UNIX-based Applications where running certain setuid binary files could allow an attacker to gain elevation of privilege. |
Maximum Severity Rating |
Important |
Impact of Vulnerability |
Elevation of Privilege |
Detection |
Microsoft Baseline Security Analyzer and Enterprise Update Scan Tool can detect whether your computer system requires this update. |
Affected Software |
Windows Services for UNIX, Subsystem for UNIX-based Applications. For more information, see the Affected Software and Download Locations section of the bulletin at the link below. |
Restart Requirement |
The update will require a restart. |
Removal Information |
Varies depending on which component is installed. For more details see the “Security Update Deployment” section within the bulletin at the link below. |
Full Details: |
https://www.microsoft.com/technet/security/bulletin/MS07-053.mspx |
Bulletin Identifier |
Microsoft Security Bulletin MS07-054 |
---|---|
Bulletin Title |
Vulnerability in MSN Messenger and Windows Live Messenger could allow Remote Code Execution (942099) |
Executive Summary |
This security update resolves a publicly disclosed vulnerability in MSN Messenger and Windows Live Messenger. The vulnerability could allow remote code execution when a user accepts a video chat invitation from an attacker. An attacker who successfully exploited this vulnerability could take complete control of the affected system. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Maximum Severity Rating |
Important |
Impact of Vulnerability |
Remote Code Execution |
Detection |
These products provide built-in mechanisms for automatic detection and deployment of updates. |
Affected Software |
MSN Messenger, Windows Live Messenger. For more information, see the Affected Software and Download Locations section of the bulletin at the link below. |
Restart Requirement |
You may need to restart your system after upgrading if, during the upgrade, you have users with multiple MSN Messenger or Windows Live Messenger sessions active on the system. |
Removal Information |
Use Add or Remove Programs tool in Control Panel. |
Full Details: |
https://www.microsoft.com/technet/security/bulletin/MS07-054.mspx |