Security Bulletins Released Today
From: Melissa Travers [MSFT] (mtravers_at_online.microsoft.com)
Date: Tue, 11 Oct 2005 13:49:51 -0400
October 11, 2005
Today Microsoft released the following Security Bulletin(s).
Note: www.microsoft.com/technet/security and www.microsoft.com/security are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the microsoft.com download center or Windows Update. See the
individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided.
Vulnerability in DirectShow Could Allow Remote Code Execution (904706)
Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)
Cumulative Security Update for Internet Explorer (896688)
Vulnerability in the Client Services for Netware Could Allow Remote Code
Vulnerability in Plug and Play Could Allow Remote Code Execution and Local
Elevation of Privilege (905749)
Vulnerability in the Microsoft Collaboration Objects Could Allow Remote Code
Vulnerabilities in Windows Shell Could Allow Remote Code Execution (900725)
Vulnerability in the Windows FTP Client Could Allow File Transfer Location
and Tampering (905495)
Vulnerability in Network Connection Manager Could Allow Denial of Service
This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins out
side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.
-- -- Melissa Travers, MCSE MVP Lead - Exchange Server, Security & Virtual Machine Please do not send email directly to this alias. This alias is for newsgroup purposes only. This posting is provided "AS IS" with no warranties, and confers no rights.