Security Bulletins Released Today

From: Melissa Travers [MSFT] (
Date: 10/11/05

Date: Tue, 11 Oct 2005 13:49:51 -0400

October 11, 2005

Today Microsoft released the following Security Bulletin(s).

Note: and are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the download center or Windows Update. See the
individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided.

Bulletin Summary:

Critical Bulletins:

Vulnerability in DirectShow Could Allow Remote Code Execution (904706)

Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)

Cumulative Security Update for Internet Explorer (896688)

Important Bulletins:

Vulnerability in the Client Services for Netware Could Allow Remote Code
Execution (899589)

Vulnerability in Plug and Play Could Allow Remote Code Execution and Local
Elevation of Privilege (905749)

Vulnerability in the Microsoft Collaboration Objects Could Allow Remote Code
Execution (907245)

Vulnerabilities in Windows Shell Could Allow Remote Code Execution (900725)

Moderate Bulletins:

Vulnerability in the Windows FTP Client Could Allow File Transfer Location
and Tampering (905495)

Vulnerability in Network Connection Manager Could Allow Denial of Service

This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins out
side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.

Melissa Travers, MCSE
MVP Lead - Exchange Server, Security & Virtual Machine
Please do not send email directly to this alias. This alias is for newsgroup
purposes only.
This posting is provided "AS IS" with no warranties, and confers no rights.

Relevant Pages

  • SecurityFocus Microsoft Newsletter #176
    ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
  • SecurityFocus Microsoft Newsletter #242
    ... MICROSOFT VULNERABILITY SUMMARY ... PostNuke Blocks Module Directory Traversal Vulnerability ... Groove Networks Groove Virtual Office COM Object Security By... ... The Microsoft Windows IPV6 TCP/IP stack is prone to a "loopback" condition initiated by sending a TCP packet with the "SYN" flag set and the source address and port spoofed to equal the destination source and port. ...
  • [NT] Cumulative Security Update for Internet Explorer (MS04-025)
    ... Get your security news from a reliable source. ... * Microsoft Windows NT Workstation 4.0 Service Pack 6a ... Navigation Method Cross-Domain Vulnerability ...
  • SecurityFocus Microsoft Newsletter # 87
    ... Meeting IT Security Benchmarks Through IT Audits ... MICROSOFT VULNERABILITY SUMMARY ... Bypassing Windows 2000 Domain Password settings ...
  • SecurityFocus Microsoft Newsletter #75
    ... Microsoft's Internet Security & Acceleration Server with fault-tolerance ... The Microsoft UPnP Vulnerability ... Relevant URL: ...