MS Security Bulletin

  • From: "Joshua M. Etterman" <jetterman@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "[ExchangeList]" <exchangelist@xxxxxxxxxxxxx>
  • Date: Wed, 15 Oct 2003 17:27:19 -0400

I'm sure everyone else has gotten this, but thought I'd post it FYI!

-----BEGIN PGP SIGNED MESSAGE-----

- --------------------------------------------------------------------
Title: Microsoft Exchange Server Security Bulletin Summary for 
       October 2003
Issued: October 15, 2003 
Version Number: 1.0 
Bulletin: http://www.microsoft.com/technet/security/excoct03.asp
- --------------------------------------------------------------------

Summary:
========
Included in this advisory are updates for two newly discovered 
vulnerabilities in Microsoft Exchange Server. These vulnerabilities, 
broken down by severity are: 

\\Critical Security Bulletins\\

    MS03-046 - Vulnerability in Exchange Server could allow 
               Arbitrary Code Execution (829436)

             - Affected Software: 
               - Exchange Server 5.5
               - Exchange 2000 Server

             - Impact: Remote Code Execution
             - Version Number: 1.0 

\\Moderate Security Bulletins\\

    MS03-047 - Vulnerability in Exchange Server 5.5 Outlook Web 
               Access Could Allow Cross-Site Scripting Attack 
               (828489)

             - Affected Software:
               - Exchange Server 5.5

             - Impact: Remote Code Execution 
             - Version Number: 1.0

    
Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details, 
Workarounds, answers to Frequently Asked Questions, and Patch 
Deployment Information please read the Microsoft Exchange 
Security Bulletin Summary for October at: 
http://www.microsoft.com/technet/security/excoct03.asp 

Acknowledgments:
================
Microsoft thanks the following for working with us to protect 
customers:

- - João Gouveia (joao.gouveia@xxxxxxxxxxxx) for reporting the issue 
described in MS03-046. 

- - Ory Segal of Sanctum Inc. (http://www.sanctuminc.com/) for reporting 
the issue described in MS03-047. 


Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PCSAFETY. There is no charge for support calls 
associated with security patches.
 
Revisions: 
==========
* V1.0 October 15, 2003: Bulletin Created. 


********************************************************************
Protect your PC: 
Microsoft has provided information on how you can
help protect your PC at the following locations: 
http://www.microsoft.com/technet/security/protect 

Patch Management Strategies:
The Microsoft Guide to Security Patch Management Web Site provides 
additional information about Microsoft's best practice recommendations for 
applying security patches: 
http://www.microsoft.com/technet/security/topics/patch/secpatch/Defaul
t.asp

IT Pro Security Zone Community:
Learn to improve security and optimize your IT infrastructure, and participate 
with other IT Pros on security topics: 
http://www.microsoft.com/technet/security/community/default.mspx

If you receive an e-mail that claims to be distributing a 
Microsoft security patch, it is a hoax that may be distributing a 
virus. Microsoft does not distribute security patches via e-mail. 
You can learn more about Microsoft's software distribution 
policies here: http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
- --------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED 
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL 
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF 
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT 
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY 
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, 
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF 
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE 
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION 
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES 
SO THE FOREGOING LIMITATION MAY NOT APPLY.
- --------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQEVAwUBP42V/40ZSRQxA/UrAQGBpQf/QfirolX/+4hkE/oy85o/zOWUkjBlJZTc
BGaJ5R4P9NOQGr/cHuYkRj0I4F8GgxzG6/4L/QAeJUUc0ZMW9cz4wTHyVUK9Wvwi
CAbPNVV2v0ONeIl3JwTXLDtMnGIOl26NDBbYDTNGeskzN1sX6GtghkFtmchniACN
XwOvoauVHVDRwx532wLqsOuTvLXYGhsXAMAg6fvIRgnwqwlh7TiH+46BJaqprwnS
PtEG8eStCzsFbLmWe21OtJD1sIB2eOpFBLIjQDc3DIbzZ3keJPwgUi6y9SRTPbA3
L7NLWAE1efQKn50WeI0ZyMAMAdZCXc6bjKEjxVVsj9Gmzb8NJX+5zw==
=LAjg
-----END PGP SIGNATURE-----



*******************************************************************

You have received this e-mail bulletin because of your subscription to the 
Microsoft Product Security Notification Service.  For more information on this 
service, please visit http://www.microsoft.com/technet/security/notify.asp.
 
To verify the digital signature on this bulletin, please download our PGP key 
at http://www.microsoft.com/technet/security/notify.asp.
 
To unsubscribe from the Microsoft Security Notification Service, please visit 
the Microsoft Profile Center at http://register.microsoft.com/regsys/pic.asp 
 
If you do not wish to use Microsoft Passport, you can unsubscribe from the 
Microsoft Security Notification Service via email as described below: Reply to 
this message with the word UNSUBSCRIBE in the Subject line.
 
For security-related information about Microsoft products, please visit the 
Microsoft Security Advisor web site at http://www.microsoft.com/security.

---
Joshua M. Etterman

Complete College Solutions
CCS Financial Corporation
513 W. Chocolate Avenue
Hershey, PA 17033

Phone: (717) 508-2000
Fax: (717) 508-2001
Email: jetterman@xxxxxxxxxxxxxxxxxxxxxxxxxxxx




Other related posts: