1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

The list goes on

Discussion in 'Computer Security' started by SimonV, Nov 11, 2003.

  1. SimonV

    SimonV Petabyte Poster Administrator

    Buffer Overrun in Microsoft FrontPage Server Extensions
    A security issue has been identified that could allow an attacker to cause a computer running Microsoft® Frontpage Server Extensions to become temporarily unresponsive. Microsoft Frontpage Server Extensions are enabled by default on Microsoft Windows® 2000 and can be added to Windows XP. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.

    View: Microsoft Security Bulletin MS03-051

    Certificate Validation Flaw Could Enable Identity Spoofing

    The original version of this bulletin was released on 05 September 2002. The vulnerability identified in the original version of the bulletin could enable an attacker who had a valid end-entity certificate to issue a subordinate certificate that, although bogus, would nevertheless pass validation. Because CryptoAPI is used by a wide range of applications, this could enable a variety of identity spoofing attacks.

    Microsoft re-issued this security bulletin on November 11, 2003 to advise on the availability of an updated Microsoft Windows 2000 Service Pack 4 (SP4) security patch. This revised security patch corrects a regression that may occur during the installation of Microsoft Internet Explorer 6.0 Service Pack 1 on Windows 2000 SP4. This regression removes the update that is discussed in this bulletin and that is provided as part of Windows 2000 SP4. Customers who are using Windows 2000 SP4 and then installed Internet Explorer 6.0 Service Pack 1 should apply the updated Windows 2000 SP4 security patch to help protect from this vulnerability.

    View: Microsoft Security Bulletin MS02-050

    Buffer Overrun in the Workstation Service

    A security vulnerability exists in the Workstation service that could allow remote code execution on an affected system. This vulnerability results because of an unchecked buffer in the Workstation service. If exploited, an attacker could gain System privileges on an affected system, or could cause the Workstation service to fail. An attacker could take any action on the system, including installing programs, viewing data, changing data, or deleting data, or creating new accounts with full privileges.

    Note: Only Windows 2000 and Window XP are affected. Other operating systems are not vulnerable to this attack.

    View: Security Bulletin

    Nov. Cumulative Security Update for Internet Explorer 6 SP1
    Security issues identified in Microsoft Internet Explorer could allow an attacker to compromise systems with Internet Explorer installed (even if Internet Explorer is not used as the Web browser). For example, an attacker could run programs on a computer used to view the attacker's Web site. Download this update from Microsoft to help protect your computer. After installation, you may have to restart your computer.

    View: Microsoft Security Bulletin MS03-048
    Certifications: MOS Master 2003, CompTIA A+, MCSA:M, MCSE
    WIP: Keeping CF Alive...
  2. Jakamoko
    Honorary Member

    Jakamoko On the move again ...

    $hooting them$elve$ in the foot ?
    Certifications: MCP, A+, Network+
    WIP: Clarity
  3. flex22

    flex22 Gigabyte Poster

    Show me an OS that doesn't have flaws.

    It's the nature of programs.It'll always happen using current methods.

Share This Page