Skip to main content
MSRC

MSRC

September 2006 Monthly Bulletin Release

Tuesday, September 12, 2006

Hello, This is Christopher Budd. I wanted to take a moment to let you know that we’ve posted our security bulletins for September 2006. Specifically, this month, we’re releasing: MS06-052 applies to Microsoft Windows and is rated Important MS06-053 applies to Microsoft Windows and is rated as Moderate MS06-054 applies to Microsoft Office and is rated as Critical for earlier versions and Important for more recent versions.

September 2006 Advance Notification

Thursday, September 07, 2006

Hello, This is Christopher Budd. I wanted to go ahead and let people know that we’ve posted our Advance Notificationfor September 2006 Microsoft Monthly Security Bulletin Release. Next Tuesday, on September 12, 2006 at approximately 10:00 am PT we are slated to release three new security bulletins: • Two Microsoft Security Bulletins affecting Microsoft Windows.

MS06-042 Re-released

Thursday, August 24, 2006

Hey folks - Mike Reavey here, I wanted to follow up on our Security Advisorywe released on Tuesday about the re-release of MS06-042for IE 6.0 SP1 customers. We’ve resolved the issues that delayed the re-release and have released the revised update. The revised update fully resolves the security vulnerability we discussed in the Advisory.

Power Point Zero Day? No.

Wednesday, August 23, 2006

Hi, Scott here from the MSRC operations team. I just wanted to drop a few lines to clarify the recent buzz/ activity on a PowerPoint zero day that occured over the weekend. Our investigation has proven thus far that customers who are up to date with Office security updates are NOT affected.

Today's postponed re-release of MS06-042, and posting of a Security Advisory

Tuesday, August 22, 2006

Hi everyone, Stephen Toulouse here. We wanted to provide you with information about the MS06-042 re-release that was scheduled to occur today. As posted on August 15th, we noted we would be re-releasing MS06-042 today to address a crashing issue that could occur if you are using HTTP 1.1 in combination with Internet Explorer 6.

Update about MS06-042 and IE 6.0 SP1

Tuesday, August 15, 2006

Hey folks - Mike Reavey here, we’ve made an update to MS06-042 to let customers know of an issue they might see after applying the update to Internet Explorer 6 Service Pack 1 systems. The issue is limited to IE6SP1 only, and then only when visiting a website that use HTTP 1.

Monday Update on Graweg

Monday, August 14, 2006

So I am back to give what I hope is the last update on the recent MS06-040 exploit. By the way, this is Adrian Stone again. As many of you know from the recent posts, and recent Advisory publication we have been working all weekend to stay on top of the Win32/Graweg issue so I thought it would be a good idea to update you with the current status as various enterprises and organizations around the world have come online.

An update on Win32/Graweg

Sunday, August 13, 2006

Hey everyone, it’s Adrian. Wanted to drop in and let you know where we are in our investigation of Win32/Graweg. As I’m sure you’ve seen by now on our AV partner sites, this is rated as a low threat and doesn’t at this time replicate automatically from machine to machine. So it’s impact in terms of infection base appears to be extremely small.

MS06-040 attack information

Saturday, August 12, 2006

Stepto here. It’s a late, late Saturday night. We’ve been made aware of a recent SANS Internet Storm Center diary post several hours ago regarding an active exploit on MS06-040. We wanted to let you know what we’ve been doing about the situation and what we know. Our AV teams have labeled this Win32/Graweg.

Advisory with Information on Exploit Code for MS06-040

Friday, August 11, 2006

Hey folks - Mike Reavey here, providing you with a quick update on MS06-040. This morning we released Security Advisory 922437 because we’re aware of exploit code that has been published on the Internet for the vulnerability that is addressed by Microsoft security bulletin MS06-040. We’ve verified that this exploit code can allow remote code to execute on Windows 2000 and Windows XP Service Pack 1 only.