Just great but thanks for the heads up. Jon
On Wed, Dec 17, 2008 at 10:08 AM, Roger Wright <[email protected]> wrote: > "For NASA, space is still a high priority." - Dan Quayle > > > > -----Original Message----- > > From: Microsoft [mailto:[email protected]] > > Sent: Tuesday, December 16, 2008 4:13 PM > > Subject: Out-of Band Microsoft Security Bulletin Advance Notification for > December 2008 > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA256 > > > > ******************************************************************** > > Out-of Band Microsoft Security Bulletin Advance Notification for December > 2008 > > Issued: December 16, 2008 > > ******************************************************************** > > > > This is an advance notification of an out-of-band security bulletin that > Microsoft is intending to release on December 17, 2008. > > > > The full version of the Microsoft Security Bulletin Advance Notification > for December 2008 can be found at > http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx. > > > > This bulletin advance notification will be replaced with the revised > December bulletin summary on December 17, 2008. The revised bulletin summary > will include the out-of-band security bulletin as well as the security > bulletins already released on December 9, 2008. > > > > For more information about the bulletin advance notification service, see > http://www.microsoft.com/technet/security/Bulletin/advance.mspx. > > > > To receive automatic notifications whenever Microsoft Security Bulletins > are issued, subscribe to Microsoft Technical Security Notifications on > http://www.microsoft.com/technet/security/bulletin/notify.mspx. > > > > Microsoft will host two webcasts to address customer questions on this > out-of-band security bulletin: on December 17, 2008, at 1:00 PM Pacific Time > (US & Canada) and December 18, 2008, at 11:00 AM Pacific Time. Register for > these out-of-band Security Bulletin Webcasts at > http://www.microsoft.com/technet/security/bulletin/summary.mspx. > > > > Microsoft also provides information to help customers prioritize monthly > security updates with any non-security, high-priority updates that are being > released on the same day as the monthly security updates. Please see the > section, Other Information. > > > > This advance notification provides the software subject as the bulletin > identifier, because the official Microsoft Security Bulletin numbers are not > issued until release. The bulletin summary that replaces this advance > notification will have the proper Microsoft Security Bulletin numbers (in > the MSyy-xxx format) as the bulletin identifier. The security bulletins for > this month are as follows, in order of severity: > > > > > > Critical Security Bulletin > > ============================ > > > > IE Bulletin > > > > - Affected Software: > > - Internet Explorer 5.01 Service Pack 4 when installed on > > Microsoft Windows 2000 Service Pack 4 > > - Internet Explorer 6 Service Pack 1 when installed on > > Microsoft Windows 2000 Service Pack 4 > > - Internet Explorer 6 for > > Windows XP Service Pack 2 and > > Windows XP Service Pack 3 > > - Internet Explorer 6 for > > Windows XP Professional x64 Edition and > > Windows XP Professional x64 Edition Service Pack 2 > > - Internet Explorer 6 for > > Windows Server 2003 Service Pack 1 and > > Windows Server 2003 Service Pack 2 > > - Internet Explorer 6 for > > Windows Server 2003 x64 Edition and > > Windows Server 2003 x64 Edition Service Pack 2 > > - Internet Explorer 6 for > > Windows Server 2003 with SP1 for Itanium-based Systems and > > Windows Server 2003 with SP2 for Itanium-based Systems > > - Internet Explorer 7 for > > Windows XP Service Pack 2 and > > Windows XP Service Pack 3 > > - Internet Explorer 7 for > > Windows XP Professional x64 Edition and > > Windows XP Professional x64 Edition Service Pack 2 > > - Internet Explorer 7 for > > Windows Server 2003 Service Pack 1 and > > Windows Server 2003 Service Pack 2 > > - Internet Explorer 7 for > > Windows Server 2003 x64 Edition and > > Windows Server 2003 x64 Edition Service Pack 2 > > - Internet Explorer 7 for > > Windows Server 2003 with SP1 for Itanium-based Systems and > > Windows Server 2003 with SP2 for Itanium-based Systems > > - Internet Explorer 7 in > > Windows Vista and > > Windows Vista Service Pack 1 > > - Internet Explorer 7 in > > Windows Vista x64 Edition and > > Windows Vista x64 Edition Service Pack 1 > > - Internet Explorer 7 in > > Windows Server 2008 for 32-bit Systems > > - Internet Explorer 7 in > > Windows Server 2008 for x64-based Systems > > - Internet Explorer 7 in > > Windows Server 2008 for Itanium-based Systems > > > > - Note for Windows Internet Explorer 8 Beta 2 > > This vulnerability was reported after the release of Windows > > Internet Explorer 8 Beta 2. Customers running Windows Internet > > Explorer 8 Beta 2 are encouraged to download and apply the > > update to their systems when the bulletin is published. > > > > - Impact: Remote Code Execution > > - Version Number: 1.0 > > > > > > Other Information > > ================= > > > > Non-Security, High-Priority Updates on MU, WU, and WSUS: > > ======================================================== > > For information about non-security releases on Windows Update and Microsoft > update, please see: > > * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base > > Article 894199, Description of Software Update Services and > > Windows Server Update Services changes in content for 2008. > > Includes all Windows content. > > * http://technet.microsoft.com/en-us/wsus/bb466214.aspx: New, > > Revised, and Released Updates for Microsoft Products Other Than > > Microsoft Windows > > > > Microsoft Active Protections Program (MAPP) > =========================================== > > To improve security protections for customers, Microsoft provides > vulnerability information to major security software providers in advance of > each monthly security update release. Security software providers can then > use this vulnerability information to provide updated protections to > customers via their security software or devices, such as antivirus, > network-based intrusion detection systems, or host-based intrusion > prevention systems. To determine whether active protections are available > from security software providers, please visit the active protections Web > sites provided by program partners, listed at > http://www.microsoft.com/security/msrc/mapp/partners.mspx. > > > > Recognize and avoid fraudulent e-mail to Microsoft customers: > > ============================================================= > > If you receive an e-mail message that claims to be distributing a Microsoft > security update, it is a hoax that may contain malware or pointers to > malicious Web sites. Microsoft does not distribute security updates via > e-mail. > > > > The Microsoft Security Response Center (MSRC) uses PGP to digitally sign > all security notifications. However, PGP is not required for reading > security notifications, reading security bulletins, or installing security > updates. You can obtain the MSRC public PGP key at > https://www.microsoft.com/technet/security/bulletin/pgp.mspx. > > > > To receive automatic notifications whenever Microsoft Security Bulletins > are issued, subscribe to Microsoft Technical Security Notifications on > http://www.microsoft.com/technet/security/bulletin/notify.mspx. > > > > > > > > > > Roger Wright > > Network Administrator > > Evatone, Inc. > > 727.572.7076 x388 > > > > [image: ET E-mail Signature Logo] > > _____ > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
<<image003.jpg>>
