Jump to content

Microsoft Security Bulletin(s) for March 11 2008


NICK ADSL UK
 Share

Recommended Posts

Microsoft Security Bulletin(s) for March 11 2008

Note: There may be latency issues due to replication, if the page does not display keep refreshing

Today Microsoft released the following Security Bulletin(s).

Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:

http://www.microsoft.com/technet/security/...n/ms08-mar.mspx

Critical (4)

Microsoft Security Bulletin MS08-014

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (949029)

http://www.microsoft.com/technet/security/...n/MS08-014.mspx

Microsoft Security Bulletin MS08-015

Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (949031)

http://www.microsoft.com/technet/security/...n/MS08-015.mspx

Microsoft Security Bulletin MS08-016

Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (949030)

http://www.microsoft.com/technet/security/...n/MS08-016.mspx

Microsoft Security Bulletin MS08-017

Vulnerabilities in Microsoft Office Web Components Could Allow Remote Code Execution (933103)

http://www.microsoft.com/technet/security/...n/MS08-017.mspx

Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact Product Support Services in the United States at 1-866-PCSafety 1-866-727-2338. International customers should contact their local subsidiary.

As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

Security Tool

Find out if you are missing important Microsoft product updates by using MBSA.

Link to comment
Share on other sites

  • 2 weeks later...
Hello, this is Tim Rains.

Very quickly, I wanted to let you know that we've just re-released MS08-014 for Microsoft Office Excel 2003 Service Pack 2 and Service Pack 3 only.

The original version released on March 11, 2008 did fully protect against the security issues discussed in the bulletin. However, after release we discovered that the security update caused a calculation error in Microsoft Excel 2003 when a Real Time Data source was used in a user-created Visual Basic for Applications solution (in other words a custom-built VBA function). For additional details, please refer to KB950340.

If you're not running Microsoft Excel 2003, this re-release doesn't apply to you and you don't need to take any action.

If you are running Microsoft Excel 2003 Service Pack 2 or Service Pack 3, you should use the guidance provided in Knowledge Base article KB950340 to deploy the new update. It is being released through all the same distribution channels as the original MS08-014 security update. It is also supported by the same detection and deployment tools as the original update.

Thanks.

Tim

*This posting is provided "AS IS" with no warranties, and confers no rights.*

http://www.microsoft.com/technet/security/...n/ms08-014.mspx

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy