Contact information for Microsoft Security Response Center [tf]

From: Microsoft Security Response Center (secure_at_MICROSOFT.COM)
Date: 07/03/03

  • Next message: Darryl J Roberts: "Disabling Autoupdate"
    Date:         Thu, 3 Jul 2003 14:08:50 -0700
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    Periodically we hear people say they tried to contact Microsoft about
    a product or service vulnerability and that Microsoft didn't respond.
     We are concerned that people may not know how to report security
    vulnerabilities to Microsoft.
     
    The Microsoft Security Response Center investigates all reports of
    security vulnerabilities affecting Microsoft products. If you believe
    you have found a security vulnerability affecting a Microsoft
    product, we'd like to work with you to investigate it.
     
    You can contact the Microsoft Security Response Center by emailing
    secure@microsoft.com directly, or you can submit your report via our
    web-based vulnerability reporting form located at
    https://www.microsoft.com/technet/treeview/default.asp?url=/technet/se
    curity/bulletin/alertus.asp.

    Sincerely,
    Microsoft Security Response Center

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 7.1

    iQEVAwUBPwSbDI0ZSRQxA/UrAQH63Af/b+QJk1jCTiTBkNIpphqSOlA5tFgqYkBf
    Iip5FnEXF/2QJsW8YVbmupnLnnH2ig8HxzpVqzGZ69QhYttpNmmf8v35NcGQAdcU
    fYEKDl2SJxLxPiUPo6kAcO0yh/b37o/yqT/dfySn1gI2JDVCmhcOD/UM0eYEayIQ
    yH24oxAJVNGy88SZXd41zU3BSz61hyAmeQOLOuHkUIG9FWSMUaT0MA7dr6wdyI7Q
    ofCyhx+hmIC2RIShyhNu9Nt2xl+f8iJajzn9VorpsqrYCx/Pf8CixfL5di2HZUaN
    kqWBimMETruC0P16quVzFZcKxCaPi+qJg4qt30oc1R1B+votptMlAA==
    =PkAX
    -----END PGP SIGNATURE-----

    oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
    Are You "Certifiable"? Summer's Hottest Certification Just Got HOTTER!

    With a growth rate exceeding 110%, the TICSA security practitioner
    certification is one of the hottest IT credentials available. And now, for
    a limited time, you can save 33% off of the TICSA certification exam! To
    learn more about the TICSA certification, and to register as a TICSA
    candidate online, just go to

    http://www.trusecure.com/offer/s0100/

    oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo


  • Next message: Darryl J Roberts: "Disabling Autoupdate"

    Relevant Pages

    • SecurityFocus Microsoft Newsletter #176
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #83
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability ... Microsoft Internet Explorer History List Script Injection ... Microsoft Windows 2000 Lanman Denial of Service Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #81
      ... MICROSOFT VULNERABILITY SUMMARY ... WWWIsis Remote Command Execution Vulnerability ... Windows NT 4.0 Print Spooler Security ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #336
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows Unspecified Remote Code Execution Vulnerability ... Microsoft Windows Explorer BMP Image Denial of Service Vulnerability ... An attacker could leverage this issue to have arbitrary code execute with kernel level privileges. ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #185
      ... NEW MICROSOFT VULNERABILITIES - Audit Your Network Security ... SurgeLDAP User.CGI Directory Traversal Vulnerability ... Microsoft Windows H.323 Remote Buffer Overflow Vulnerability ... Microsoft Jet Database Engine Remote Code Execution Vulnerab... ...
      (Focus-Microsoft)