From; Microsoft: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ******************************************************************** Title: Microsoft Security Bulletin Summary for April 2005 Issued: April 12, 2005 Version Number: 1.0 Bulletin: http://go.microsoft.com/fwlink/?LinkId=46049 ******************************************************************* Summary: ======== This advisory contains information about all security updates released this month. It is broken down by security bulletin severity. Critical Security Bulletins =========================== MS05-019 - Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066) - Affected Software: - Microsoft Windows 2000 Service Pack 3 - Microsoft Windows 2000 Service Pack 4 - Microsoft Windows XP Service Pack 1 - Microsoft Windows XP Service Pack 2 - Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) - Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) - Microsoft Windows Server 2003 - Microsoft Windows Server 2003 for Itanium-based Systems - Review the FAQ section of bulletin MS05-019 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Remote Code Execution - Version Number: 1.0 MS05-020 - Cumulative Security Update for Internet Explorer (890923) - Affected Software - Microsoft Windows 2000 Service Pack 3 - Microsoft Windows 2000 Service Pack 4 - Microsoft Windows XP Service Pack 1 - Microsoft Windows XP Service Pack 2 - Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) - Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) - Microsoft Windows Server 2003 - Microsoft Windows Server 2003 for Itanium-based Systems Review the FAQ section of bulletin MS05-020 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Affected Components: - Internet Explorer 5.01 Service Pack 3 - Internet Explorer 5.01 Service Pack 4 - Internet Explorer 5.5 Service Pack 2 on Microsoft Windows ME - Internet Explorer 6 Service Pack 1 - Internet Explorer 6 Service Pack 1 (64-Bit Edition) - Internet Explorer 6 for Windows XP Service Pack 2 - Internet Explorer 6 for Windows Server 2003 - Internet Explorer 6 for Windows Server 2003 for Itanium-based Systems - Impact: Remote Code Execution - Version Number: 1.0 MS05-021 - Vulnerability in Exchange Server Could Allow Remote Code Execution (894549) - Affected Software: - Microsoft Exchange 2000 Server Service Pack 3 - Microsoft Exchange Server 2003 - Microsoft Exchange Server 2003 Service Pack 1 - Impact: Remote Code Execution - Version Number: 1.0 MS05-022 - Vulnerability in MSN Messenger Could Lead to Remote Code Execution (896597) - Affected Software: - MSN Messenger 6.2 - Impact: Remote Code Execution - Version Number: 1.0 MS05-023 - Vulnerabilities in Microsoft Word May Lead to Remote Code Execution (890169) - Affected Software: - Microsoft Word 2000 - Microsoft Word 2002 - Microsoft Word 2003 - Microsoft Works Suite 2001 - Microsoft Works Suite 2002 - Microsoft Works Suite 2003 - Microsoft Works Suite 2004 - Impact: Remote Code Execution - Version Number: 1.0 Important Security Bulletins ============================ MS05-016 - Vulnerability in Windows Shell that Could Allow Remote Code Execution (893086) - Affected Software: - Microsoft Windows 2000 Service Pack 3 - Microsoft Windows 2000 Service Pack 4 - Microsoft Windows XP Service Pack 1 - Microsoft Windows XP Service Pack 2 - Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) - Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) - Microsoft Windows Server 2003 - Microsoft Windows Server 2003 for Itanium-based Systems - Review the FAQ section of bulletin MS05-016 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Remote Code Execution - Version Number: 1.0 MS05-017 - Vulnerability in MSMQ Could Allow Remote Code Execution (892944) - Affected Software: - Microsoft Windows 2000 Service Pack 3 - Microsoft Windows 2000 Service Pack 4 - Microsoft Windows XP Service Pack 1 - Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) - Review the FAQ section of bulletin MS05-017 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Impact: Remote Code Execution - Version Number: 1.0 MS05-018 - Vulnerability in Windows Kernel Could Allow Elevation of Privilege and Denial of Service (890859) - Affected Software: - Microsoft Windows 2000 Service Pack 3 - Microsoft Windows 2000 Service Pack 4 - Microsoft Windows XP Service Pack 1 - Microsoft Windows XP Service Pack 2 - Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) - Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) - Microsoft Windows Server 2003 - Microsoft Windows Server 2003 for Itanium-based Systems - Review the FAQ section of bulletin MS05-018 for information about these operating systems: - Microsoft Windows 98 - Microsoft Windows 98 Second Edition (SE) - Microsoft Windows Millennium Edition (ME) - Impact: Elevation of Privilege - Version Number: 1.0 Update Availability: =================== Updates are available to address these issues. For additional information, including Technical Details, Workarounds, answers to Frequently Asked Questions, and Update Deployment Information please read the Microsoft Security Bulletin Summary for this month at: http://go.microsoft.com/fwlink/?LinkId=46049 Support: ======== Technical support is available from Microsoft Product Support Services at 1-866-PC SAFETY (1-866-727-2338). There is no charge for support calls associated with security updates. International customers can get support from their local Microsoft subsidiaries. Phone numbers for international support can be found at: http://support.microsoft.com/common/international.aspx Additional Resources: ===================== * Microsoft has created a free monthly e-mail newsletter containing valuable information to help you protect your network. This newsletter provides practical security tips, topical security guidance, useful resources and links, pointers to helpful community resources, and a forum for you to provide feedback and ask security-related questions. You can sign up for the newsletter at: http://www.microsoft.com/technet/security/secnews/default.mspx * Microsoft has created a free e-mail notification service that serves as a supplement to the Security Notification Service (this e-mail). It provides timely notification of any minor changes or revisions to previously released Microsoft Security Bulletins. This new service provides notifications that are written for IT professionals and contain technical information about the revisions to security bulletins. Visit http://www.microsoft.com to subscribe to this service: - Click on Subscribe at the top of the page. - This will direct you via Passport to the Subscription center. - Under Newsletter Subscriptions you can sign up for the "Microsoft Security Notification Service: Comprehensive Version". * Join Microsoft's webcast for a live discussion of the technical details of these security bulletins and steps you can take to protect your environment. Details about the live webcast can be found at: www.microsoft.com/technet/security/bulletin/summary.mspx The on-demand version of the webcast will be available 24 hours after the live webcast at: www.microsoft.com/technet/security/bulletin/summary.mspx * Protect your PC: Microsoft has provided information on how you can help protect your PC at the following locations: http://www.microsoft.com/security/protect/ If you receive an e-mail that claims to be distributing a Microsoft security update, it is a hoax that may be distributing a virus. Microsoft does not distribute security updates through e-mail. You can learn more about Microsoft's software distribution policies here: http://www.microsoft.com/technet/security/topics/policy/swdist.mspx Acknowledgments: ================ Microsoft thanks the following for working with us to protect customers: * Mark Dowd and Ben Layer of ISS X-Force (http://www.iss.net) for reporting an issue described in MS05-021. * Alex Li (alexli@xxxxxxxx) for reporting an issue described in MS05-023. * Hongzhen Zhou (felix__zhou@xxxxxxxxxxx)for reporting the issue described in MS05-022. * Song Liu (songsong@xxxxxxx), Hongzhen Zhou, and Neel Mehta of ISS X-Force (http://www.iss.net) for reporting an issue described in MS05-019. * Fernando Gont (http://www.gont.com.ar) for reporting an issue described in MS05-019. * Qualsys (http://www.qualys.com) for reporting an issue described in MS05-019. * Berend-Jan Wever working with iDefense (http://www.idefense.com) for reporting an issue described in MS05-020. * 3APA3A and axle@bytefall working with iDefense (http://www.idefense.com) for reporting an issue described in MS05-020. * Andres Tarasco of SIA Group (http://www.siainternational.com) for reporting an issue described in MS05-020. * iDefense (http://www.idefense.com) for reporting an issue described in MS05-016. * Kostya Kortchinsky (kostya.kortchinsky@xxxxxxxxxx) with CERT RENATER for reporting an issue described in MS05-017. * John Heasman with NGSSoftware (http://www.ngssoftware.com) for reporting an issue described in MS05-018. * Sanjeev Radhakrishnan, Amit Joshi, and Ananta Iyengar with GreenBorder Technologies (http://www.greenborder.com) for reporting an issue described in MS05-018. * David Fritz working with iDefense (http://www.idefense.com) for reporting an issue described in MS05-018. ******************************************************************** THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQIVAwUBQlwERIreEgaqVbxmAQIzahAAlKDP0zz9tHxRWg7IF+n8MyRC+OjM+ljk jpQJ5dATUX1HximAiuRTUZjFVujXQ8Ao1GVqfvuAD5FXSS/ULNun+mt8hWNw5j2n i9Cz7+H0aWs/Si+E23WnuRVrw7UUPGUBwmochn8PUlmDb1ZrNgr1KoQaJKNBXry7 gV0+jhrZIMEcApvNP4aWZTikvOqST15DQfwo5Br4EsCebRp2V4RpPX6aSBxN18r9 qyvt6BvF9u9qPAfMMdbO4pCUPAaLTLyqr7vITaHPWJc+PcKlSLTEXiy34Wq7dyo7 lLda+eCSJ3OMwIGe6H+kkiUPanAkBzln5dOFOD8CK4xsSdI4422j0qK95DkYx8lI mcHJHMZ3tOL3PclFofzuq36HPX1iyybu3bAtW7Ii9Obkb/IvosFLa1zJZxIo0EEO CZf6QCLP+hhv+l8P0Mhpjzjtc/fmwubxkwu90aXm4efvS9bDQxnPA21fkGnUVaxp yhotdlJTB+UR429CN5pHDaoBzzNQ16phK+sxXPu+WWgFGdLK4Kf82wsrZv9o8A7e u8m+9pHV/SW0yqQLEu5OAmqugaBf88Bnb8/Rbu48h08x/jz5Rg1SnMxTLAhbmzUT EvLEOApU0iLJ4uxghA+o+StGgwutd0dOIqJ/UjMHg2OPk4L7mhRFeJSKIRnUcg1r fyrg6mMkols= =IrfB -----END PGP SIGNATURE----- To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You can manage all your Microsoft.com communication preferences at this site. Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>. This newsletter was sent by the Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member