Jump to content

Microsoft Security Bulletin Summary for November, 2006


NICK ADSL UK
 Share

Recommended Posts

Microsoft Security Bulletin Summary for November, 2006

http://www.microsoft.com/technet/security/...n/ms06-nov.mspx

Critical (5)

Bulletin Identifier Microsoft Security Bulletin MS06-067

Bulletin Title

Cumulative Security Update for Internet Explorer (922760)

Executive Summary

This update resolves vulnerabilities in Internet Explorer that could allow remote code execution.

http://www.microsoft.com/technet/security/...n/ms06-067.mspx

Bulletin Identifier Microsoft Security Bulletin MS06-068

Bulletin Title

Vulnerability in Microsoft Agent Could Allow Remote Code Execution (920213)

Executive Summary

This update resolves a vulnerability in Microsoft Agent that could allow remote code execution

http://www.microsoft.com/technet/security/...n/ms06-068.mspx

Bulletin Identifier Microsoft Security Bulletin MS06-069

Bulletin Title

Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (923789)

Executive Summary

This update resolves vulnerabilities in Macromedia Flash Player, from Adobe, that could allow remote code execution.

http://www.microsoft.com/technet/security/...n/ms06-069.mspx

Bulletin Identifier Microsoft Security Bulletin MS06-070

Bulletin Title

Vulnerability in Workstation Service Could Allow Remote Code Execution (924270)

Executive Summary

This update resolves a vulnerability in Workstation Service that could allow remote code execution.

http://www.microsoft.com/technet/security/...n/ms06-070.mspx

Bulletin Identifier Microsoft Security Bulletin MS06-071

Bulletin Title

Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution 928088

Executive Summary

This update resolves a vulnerability in Microsoft XML Core Services that could allow remote code execution.

http://www.microsoft.com/technet/security/...n/ms06-071.mspx

Important (1)

Bulletin Identifier Microsoft Security Bulletin MS06-066

Bulletin Title

Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution (923980)

Executive Summary

This update resolves vulnerabilities in the Client Service for NetWare that could allow remote code execution. The Client Service for NetWare is not installed by default on any affected operating system version.

http://www.microsoft.com/technet/security/...n/ms06-066.mspx

This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

Webcast

Microsoft will host a webcast tomorrow. The webcast focuses on addressing your questions and concerns about the security bulletins. Therefore, most of the live webcast is aimed at giving you the opportunity to ask questions and get answers from their security experts.

Start Time: Wednesday, november 15th, 2006 11:00 AM Pacific Time (US & Canada)

End Time: Wednesday, november 15th, 2006 12:00 PM Pacific Time (US & Canada)

Presenter: Christopher Budd, CISA, CISM, CISSP, ISSMP Security Program Manager, PSS Security, Microsoft Corporation and Mike Reavey, Lead Security Program Manager, Microsoft Corporation

Security Tool

Find out if you are missing important Microsoft product updates by using MBSA.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy