Microsoft Security Bulletin(s) for 2/14/2006



February 14, 2006

Today Microsoft released the following Security Bulletin(s).

Note: www.microsoft.com/technet/security and www.microsoft.com/security are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the microsoft.com download center or Windows Update. See the
individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided.

Bulletin Summary:



http://www.microsoft.com/technet/security/Bulletin/ms06-Feb.mspx



Critical Bulletins:



Cumulative Security Update for Internet Explorer (910620)

http://www.microsoft.com/technet/security/Bulletin/ms06-004.mspx



Vulnerability in Windows Media Player Could Allow Remote Code Execution
(911565)
http://www.microsoft.com/technet/security/Bulletin/ms06-005.mspx







Important Bulletins:



Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet
Browsers Could Allow Remote Code Execution (911564)
http://www.microsoft.com/technet/security/Bulletin/ms06-006.mspx



Vulnerability in TCP/IP Could Allow Denial of Service (913446)
http://www.microsoft.com/technet/security/Bulletin/ms06-007.mspx



Vulnerability in Web Client Service Could Allow Remote Code Execution
(911927)
http://www.microsoft.com/technet/security/Bulletin/ms06-008.mspx



Vulnerability in the Korean Input Method Editor Could Allow Elevation of
Privilege (901190)
http://www.microsoft.com/technet/security/Bulletin/ms06-009.mspx



Vulnerability in PowerPoint 2000 Could Allow Information Disclosure (889167)
http://www.microsoft.com/technet/security/Bulletin/ms06-010.mspx





This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins out
side of this schedule if we determine the need to do so.



If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.




--


--
Melissa Travers, MCSE
MVP Lead - Exchange Server, Security & Virtual Machine

Please do not send email directly to this alias. This alias is for newsgroup
purposes only.

This posting is provided "AS IS" with no warranties, and confers no rights.


.



Relevant Pages

  • SecurityFocus Microsoft Newsletter #176
    ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #242
    ... MICROSOFT VULNERABILITY SUMMARY ... PostNuke Blocks Module Directory Traversal Vulnerability ... Groove Networks Groove Virtual Office COM Object Security By... ... The Microsoft Windows IPV6 TCP/IP stack is prone to a "loopback" condition initiated by sending a TCP packet with the "SYN" flag set and the source address and port spoofed to equal the destination source and port. ...
    (Focus-Microsoft)
  • [NT] Cumulative Security Update for Internet Explorer (MS04-025)
    ... Get your security news from a reliable source. ... * Microsoft Windows NT Workstation 4.0 Service Pack 6a ... Navigation Method Cross-Domain Vulnerability ...
    (Securiteam)
  • SecurityFocus Microsoft Newsletter # 87
    ... Meeting IT Security Benchmarks Through IT Audits ... MICROSOFT VULNERABILITY SUMMARY ... Bypassing Windows 2000 Domain Password settings ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #75
    ... Microsoft's Internet Security & Acceleration Server with fault-tolerance ... The Microsoft UPnP Vulnerability ... Relevant URL: ...
    (Focus-Microsoft)