Skip to main content

Month Archives: August 2006

MS06-042 Re-released

Thursday, August 24, 2006

Hey folks - Mike Reavey here, I wanted to follow up on our Security Advisorywe released on Tuesday about the re-release of MS06-042for IE 6.0 SP1 customers. We’ve resolved the issues that delayed the re-release and have released the revised update. The revised update fully resolves the security vulnerability we discussed in the Advisory.

Power Point Zero Day? No.

Wednesday, August 23, 2006

Hi, Scott here from the MSRC operations team. I just wanted to drop a few lines to clarify the recent buzz/ activity on a PowerPoint zero day that occured over the weekend. Our investigation has proven thus far that customers who are up to date with Office security updates are NOT affected.

Today's postponed re-release of MS06-042, and posting of a Security Advisory

Tuesday, August 22, 2006

Hi everyone, Stephen Toulouse here. We wanted to provide you with information about the MS06-042 re-release that was scheduled to occur today. As posted on August 15th, we noted we would be re-releasing MS06-042 today to address a crashing issue that could occur if you are using HTTP 1.1 in combination with Internet Explorer 6.

Update about MS06-042 and IE 6.0 SP1

Tuesday, August 15, 2006

Hey folks - Mike Reavey here, we’ve made an update to MS06-042 to let customers know of an issue they might see after applying the update to Internet Explorer 6 Service Pack 1 systems. The issue is limited to IE6SP1 only, and then only when visiting a website that use HTTP 1.

Monday Update on Graweg

Monday, August 14, 2006

So I am back to give what I hope is the last update on the recent MS06-040 exploit. By the way, this is Adrian Stone again. As many of you know from the recent posts, and recent Advisory publication we have been working all weekend to stay on top of the Win32/Graweg issue so I thought it would be a good idea to update you with the current status as various enterprises and organizations around the world have come online.

An update on Win32/Graweg

Sunday, August 13, 2006

Hey everyone, it’s Adrian. Wanted to drop in and let you know where we are in our investigation of Win32/Graweg. As I’m sure you’ve seen by now on our AV partner sites, this is rated as a low threat and doesn’t at this time replicate automatically from machine to machine. So it’s impact in terms of infection base appears to be extremely small.

MS06-040 attack information

Saturday, August 12, 2006

Stepto here. It’s a late, late Saturday night. We’ve been made aware of a recent SANS Internet Storm Center diary post several hours ago regarding an active exploit on MS06-040. We wanted to let you know what we’ve been doing about the situation and what we know. Our AV teams have labeled this Win32/Graweg.

Advisory with Information on Exploit Code for MS06-040

Friday, August 11, 2006

Hey folks - Mike Reavey here, providing you with a quick update on MS06-040. This morning we released Security Advisory 922437 because we’re aware of exploit code that has been published on the Internet for the vulnerability that is addressed by Microsoft security bulletin MS06-040. We’ve verified that this exploit code can allow remote code to execute on Windows 2000 and Windows XP Service Pack 1 only.

August 2006 Microsoft Monthly Bulletin Release: Day Two Update

Wednesday, August 09, 2006

Hi Christopher Budd here, We’re into the second day of our August 2006 release and I wanted to check back and let folks know how things are going with this release. It’s been about 30 hours since we posted the security updates and I’m happy to be able to say we’ve had well over 100 million downloads of the update for MS06-040 (that’s nearly 3.

August 2006 Security Update Release

Tuesday, August 08, 2006

Hey everyone - Adrian Stone here again, stepping in for Craig Gehre to provide a quick overview of the security updates we’ve released Today. The full list of the updates released today are below, and, as always, additional information on the specific vulnerabilities resolved with this release are included within each security bulletin.