• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

The Patch day!

Myantispyware team April 12, 2006    

Microsoft released the following Security patches:

Critical:


Cumulative Security Update for Internet Explorer

This patch should be applied as fast as possible, but due to a change in ActiveX functionality requires extra careful testing. Microsoft bundled all but one of this months Internet Explorer updates in this “Cumulative update”. This particular update patches no less then 8 remote code execution issues. In addition one information disclosure problem and an address bar spoofing vulnerability are fixed. Note that there are exploits public for at least one (CVE-2006-1245) and possibly two (CVE-2006-1388) of the advisories. While the exploits known to us only trigger a DoS condition, it is very much possible that more sinister exploits are already in use. Microsoft states that they are not aware of any exploits in the wild, which likely refers to remote execution exploits, not DoS exploit.

Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution

If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Vulnerability in Windows Explorer Could Allow Remote Code Execution

A remote code execution vulnerability exists in Windows Explorer because of the way that it handles COM objects. An attacker would need to convince a user to visit a Web site that could force a connection to a remote file server. This remote file server could then cause Windows Explorer to fail in a way that could allow code execution. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

if you can’t apply the patch right away, MS recommends:

* Disable the Web Client service
* Use the Group Policy settings to disable the WebClient service on all affected systems that do not require this feature.
* Block TCP ports 139 and 445 at the firewall

Important:

Cumulative Security Update for Outlook Express

A remote code execution vulnerability exists within Outlook Express involving its handling of Windows Address Book (.wab) files. Attackers can craft a suitable version of the .wab file and then convince the end user to open the file through either direct email, or through opening a link on a web site. The attacker would gain the
same administrative rights as the end user.

Moderate:

Vulnerability in Microsoft FrontPage Server Extensions Could Allow Cross-Site Scripting

A remote code execution exists in FrontPage Server Extensions (FPSE) or Sharepoint Team Services (STS) which could allow an attacker to run client-side scripts on behalf of an FPSE user. If the user has administrative rights, the attacker would gain complete access of the server. Otherwise, it will be limited to the administrative rights granted to the end user. As there is a list of mitigating circumstances, and the default install of Windows Server, Microsoft is releasing this as a moderate issue. However, pay attention that this is a remote code execution problem and could be more critical in your particular circumstances.

For download the updates visit to the Windows Update website. You may also get the updates thru Automatic Updates functionality in Windows system.

Critical patch

 Previous Post

Found new fake codec – emcodec

Next Post 

Strider URL Tracer

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply

New Guides

STDEI GLP 1 Review, Stdei GLP-1 Weight Loss Oral Solution Scam
scam alert
GOTEEX.com Review: Promo Code Scams Exposed
Olygee Cooling Ace Review, Don’t Be Fooled by False Promises and Misleading Ads
Suzuki Moorai Robot Dog Vehicle Real or a Scam, What You Need to Know
Liketonline Cooling Ace Review, Scam or Legit? What You Need to Know

Follow Us

Search

Useful Guides

How to remove pop-up ads [Chrome, Firefox, IE, Opera, Edge]
Best free malware removal tools
Best Free Malware Removal Tools 2025
Smart Captcha Virus redirect
What is a Virus that Redirects Web Pages? A Comprehensive Guide
How to reset Mozilla Firefox (Updated Apr. 2018)
adwcleaner
AdwCleaner – Review, How to use, Comments

Recent Guides

Found new fake codec – emcodec
New home for Coolwebsearch / Trafficadvance
New vulnerability in Internet Explorer
How to remove Trojan Vundo
Temporary fix for IE vulnerability

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.