Just great but thanks for the heads up.

Jon

On Wed, Dec 17, 2008 at 10:08 AM, Roger Wright <[email protected]> wrote:

>  "For NASA, space is still a high priority." - Dan Quayle
>
>
>
> -----Original Message-----
>
> From: Microsoft [mailto:[email protected]]
>
> Sent: Tuesday, December 16, 2008 4:13 PM
>
> Subject: Out-of Band Microsoft Security Bulletin Advance Notification for
> December 2008
>
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> Hash: SHA256
>
>
>
> ********************************************************************
>
> Out-of Band Microsoft Security Bulletin Advance Notification for December
> 2008
>
> Issued: December 16, 2008
>
> ********************************************************************
>
>
>
> This is an advance notification of an out-of-band security bulletin that
> Microsoft is intending to release on December 17, 2008.
>
>
>
> The full version of the Microsoft Security Bulletin Advance Notification
> for December 2008 can be found at
> http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx.
>
>
>
> This bulletin advance notification will be replaced with the revised
> December bulletin summary on December 17, 2008. The revised bulletin summary
> will include the out-of-band security bulletin as well as the security
> bulletins already released on December 9, 2008.
>
>
>
> For more information about the bulletin advance notification service, see
> http://www.microsoft.com/technet/security/Bulletin/advance.mspx.
>
>
>
> To receive automatic notifications whenever Microsoft Security Bulletins
> are issued, subscribe to Microsoft Technical Security Notifications on
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
>
>
> Microsoft will host two webcasts to address customer questions on this
> out-of-band security bulletin: on December 17, 2008, at 1:00 PM Pacific Time
> (US & Canada) and December 18, 2008, at 11:00 AM Pacific Time. Register for
> these out-of-band Security Bulletin Webcasts at
> http://www.microsoft.com/technet/security/bulletin/summary.mspx.
>
>
>
> Microsoft also provides information to help customers prioritize monthly
> security updates with any non-security, high-priority updates that are being
> released on the same day as the monthly security updates. Please see the
> section, Other Information.
>
>
>
> This advance notification provides the software subject as the bulletin
> identifier, because the official Microsoft Security Bulletin numbers are not
> issued until release. The bulletin summary that replaces this advance
> notification will have the proper Microsoft Security Bulletin numbers (in
> the MSyy-xxx format) as the bulletin identifier. The security bulletins for
> this month are as follows, in order of severity:
>
>
>
>
>
> Critical Security Bulletin
>
> ============================
>
>
>
> IE Bulletin
>
>
>
>   - Affected Software:
>
>     - Internet Explorer 5.01 Service Pack 4 when installed on
>
>       Microsoft Windows 2000 Service Pack 4
>
>     - Internet Explorer 6 Service Pack 1 when installed on
>
>       Microsoft Windows 2000 Service Pack 4
>
>     - Internet Explorer 6 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 6 for
>
>       Windows XP Professional x64 Edition and
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 Service Pack 1 and
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 x64 Edition and
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 6 for
>
>       Windows Server 2003 with SP1 for Itanium-based Systems and
>
>       Windows Server 2003 with SP2 for Itanium-based Systems
>
>     - Internet Explorer 7 for
>
>       Windows XP Service Pack 2 and
>
>       Windows XP Service Pack 3
>
>     - Internet Explorer 7 for
>
>       Windows XP Professional x64 Edition and
>
>       Windows XP Professional x64 Edition Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 Service Pack 1 and
>
>       Windows Server 2003 Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 x64 Edition and
>
>       Windows Server 2003 x64 Edition Service Pack 2
>
>     - Internet Explorer 7 for
>
>       Windows Server 2003 with SP1 for Itanium-based Systems and
>
>       Windows Server 2003 with SP2 for Itanium-based Systems
>
>     - Internet Explorer 7 in
>
>       Windows Vista and
>
>       Windows Vista Service Pack 1
>
>     - Internet Explorer 7 in
>
>       Windows Vista x64 Edition and
>
>       Windows Vista x64 Edition Service Pack 1
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for 32-bit Systems
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for x64-based Systems
>
>     - Internet Explorer 7 in
>
>       Windows Server 2008 for Itanium-based Systems
>
>
>
>     - Note for Windows Internet Explorer 8 Beta 2
>
>       This vulnerability was reported after the release of Windows
>
>       Internet Explorer 8 Beta 2. Customers running Windows Internet
>
>       Explorer 8 Beta 2 are encouraged to download and apply the
>
>       update to their systems when the bulletin is published.
>
>
>
>     - Impact: Remote Code Execution
>
>     - Version Number: 1.0
>
>
>
>
>
> Other Information
>
> =================
>
>
>
> Non-Security, High-Priority Updates on MU, WU, and WSUS:
>
> ========================================================
>
> For information about non-security releases on Windows Update and Microsoft
> update, please see:
>
> * http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
>
>   Article 894199, Description of Software Update Services and
>
>   Windows Server Update Services changes in content for 2008.
>
>   Includes all Windows content.
>
> * http://technet.microsoft.com/en-us/wsus/bb466214.aspx: New,
>
>   Revised, and Released Updates for Microsoft Products Other Than
>
>   Microsoft Windows
>
>
>
> Microsoft Active Protections Program (MAPP)
> ===========================================
>
> To improve security protections for customers, Microsoft provides
> vulnerability information to major security software providers in advance of
> each monthly security update release. Security software providers can then
> use this vulnerability information to provide updated protections to
> customers via their security software or devices, such as antivirus,
> network-based intrusion detection systems, or host-based intrusion
> prevention systems. To determine whether active protections are available
> from security software providers, please visit the active protections Web
> sites provided by program partners, listed at
> http://www.microsoft.com/security/msrc/mapp/partners.mspx.
>
>
>
> Recognize and avoid fraudulent e-mail to Microsoft customers:
>
> =============================================================
>
> If you receive an e-mail message that claims to be distributing a Microsoft
> security update, it is a hoax that may contain malware or pointers to
> malicious Web sites. Microsoft does not distribute security updates via
> e-mail.
>
>
>
> The Microsoft Security Response Center (MSRC) uses PGP to digitally sign
> all security notifications. However, PGP is not required for reading
> security notifications, reading security bulletins, or installing security
> updates. You can obtain the MSRC public PGP key at
> https://www.microsoft.com/technet/security/bulletin/pgp.mspx.
>
>
>
> To receive automatic notifications whenever Microsoft Security Bulletins
> are issued, subscribe to Microsoft Technical Security Notifications on
> http://www.microsoft.com/technet/security/bulletin/notify.mspx.
>
>
>
>
>
>
>
>
>
> Roger Wright
>
> Network Administrator
>
> Evatone, Inc.
>
> 727.572.7076  x388
>
>
>
> [image: ET E-mail Signature Logo]
>
> _____
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<image003.jpg>>

Reply via email to