General software updates

Started by Lance, Mar 11, 2007, 16:22:27

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Rik

Microsoft Security Bulletin(s) for 5/08/2007
http://www.microsoft.com/technet/security/bulletin/ms07-may.mspx

May 8 2007
Today Microsoft released the following Security Bulletin(s).

Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:


Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution (935966):
http://www.microsoft.com/technet/security/Bulletin/MS07-029.mspx

Vulnerability in CAPICOM Could Allow Remote Code Execution (931906)
http://www.microsoft.com/technet/security/Bulletin/MS07-028.mspx

Cumulative Security Update for Internet Explorer 931768
http://www.microsoft.com/technet/security/Bulletin/MS07-027.mspx

Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832)
http://www.microsoft.com/technet/security/Bulletin/MS07-026.mspx

Vulnerability in Microsoft Office Could Allow Remote Code Execution (934873)
http://www.microsoft.com/technet/security/Bulletin/MS07-025.mspx

Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (934232)
http://www.microsoft.com/technet/security/Bulletin/MS07-024.mspx

Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (934233)
http://www.microsoft.com/technet/security/Bulletin/MS07-023.mspx

Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Update for Windows XP (KB927891)

Brief Description
This is a reliability update. This update resolves an issue in the Windows Installer (MSI) that can affect performance during software updates

Overview
This is a reliability update. This update resolves an issue in the Windows Installer (MSI) that can affect performance during software updates. After you install this item, you may have to restart your computer.


http://www.microsoft.com/downloads/details.aspx?FamilyID=7a81b0cd-a0b9-497e-8a89-404327772e5a&DisplayLang=en
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Winamp 5.35 Released
Winamp 5.35
Winamp 5.35 Full
Winamp 5.35 Pro (asks for key during install)
Winamp 5.35 Full emusic/bundle (includes 'The Magic Position by Patrick Wolf' mp3)
Winamp 5.35 Lite (basic mp3/cd player)

What's New

* Improved: Current translation support of core strings and dialogs
* Improved: Correct theming of tabbed dialogs on WinXP+
* Improved: Various misc tweaks/improvements
* Fixed: More tabbing fixes in UI and Preferences
* Fixed: [in_cdda] CDDB crash with non-English characters in user path
* Fixed: [in_cdda] Gapless playback of mix CDs with Sonic Engine
* Fixed: [in_flac] Genre field truncated in Flac Editor
* Fixed: [in_mp3] Incompatibility with musicbrainz tags
* Fixed: [in_mp3] Long stream urls truncated in Alt+3 dialog
* Fixed: [in_mp3] Tracklength not showing for mp3's with large embedded coverart
* Fixed: [in_mp4] MP4 file parsing buffer overflow vulnerability
* Fixed: [in_vorbis] Cancel button in Vorbis Editor
* Fixed: [in_vorbis] Tabbing in Vorbis Editor
* Fixed: [in_wm] Artist and Title fields reversed in WMA Editor
* Fixed: [in_wm] Crash when attempting to play malformed ASX playlists
* Fixed: [ml_local] NOTHAS and != with empty fields
* Fixed: [ml_wire] (4294967295%) in sc wire downloads
* Fixed: [ml_wire] Podcast downloading bug (uninitialized variable error)
* Fixed: [pmp_p4s] Crash on sync/transfers
* Updated: [gen_jumpex] Jump To File Extra v0.99.1b

http://forums.winamp.com/showthread.php?s=fd43622202dadb207a4abe005c69d30f&threadid=270944
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Lance

New version of CCleaner is available - version 1.40.520
Lance
_____

This post reflects my own views, opinions and experience, not those of IDNet.

DAB Badboy

#29
Those running the Opera browser might like to know that new (security fix) version is now available  - 9.21.

http://www.opera.com/download/

Inactive

Thanks DAB Badboy, all sorted..  ;)
Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

DAB Badboy

Details of the latest (none security sensitive) Windows update can be read @ http://www.microsoft.com/technet/security/advisory/927891.mspx

Rik

#32
  V 2.0.0.4 has just arrived...

NOTE: On installing it to a machine with Java Console 6.1, it reported it was incompatible and disabling Java, but didn't...
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Inactive

Spybot S & D update available. ;)
Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Rik

#34
Netgear have issued a firmware update for the DG834G v3.

Version 4.01.28 is available here. Note that there is a warning that settings might be lost during the upgrade process, so backup the router before starting.

As always, I recommend IE when flashing the router - it doesn't seem to work smoothly with alternative browsers.

UPDATE: This firmware does not log connection problems such as loss of sync.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Inactive

Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Rik

Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Inactive

Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Rik

Nae bother, better twice than not at all.  :)
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Microsoft Security Bulletin(s) for 6/12/2007
http://www.microsoft.com/technet/security/bulletin/ms07-jun.mspx

June 12 2007
Today Microsoft released the following Security Bulletin(s).

Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:
Vulnerability in Win 32 API Could Allow Remote Code Execution (935839): MS07-035
http://www.microsoft.com/technet/security/Bulletin/MS07-035.mspx

Cumulative Security Update for Outlook Express and Windows Mail (929123): MS07-034
http://www.microsoft.com/technet/security/Bulletin/MS07-034.mspx

Cumulative Security Update for Internet Explorer (933566): MS07-033
http://www.microsoft.com/technet/security/Bulletin/MS07-033.mspx

Vulnerability in Windows Vista Could Allow Information Disclosure (931213): MS07-032
Affected Software: Windows Vista, Windows Vista x64
http://www.microsoft.com/technet/security/Bulletin/MS07-032.mspx

Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution (935840): MS07-031
http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx

Vulnerabilities in Microsoft Visio Could Allow Remote Code Execution (927051): MS07-030
Affected Software: Visio 2002, Visio 2003
http://www.microsoft.com/technet/security/Bulletin/MS07-030.mspx
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Inactive

I got an additional one to that list, it was for IE6, I hate IE7..  :(
Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Rik

People seem to be reporting variable numbers this month, Inactive. Two of my machines have IE6 on them, the new one has IE7. As I've only updated the latter as yet, I'm about to find out what will happen.

I only use IE for two things: MS updates and router firmware updates. Of the two versions, I prefer Firefox!  ;D
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Inactive

Quote from: Rik on Jun 13, 2007, 09:48:25


I only use IE for two things: MS updates and router firmware updates. Of the two versions, I prefer Firefox!  ;D

Ditto.

I use Opera for Online Banking.
Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Rik

You have piqued my curiosity. I thought you preferred Firefox to Opera? Is there something about Opera your prefer for secure work?
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Inactive

I use FF 99% of the time, I like the distinct security features of Opera Rik, that is why I use it for Online Banking, not sure if it is any safer, it just feels safer somehow.
Anything and everything that I post on here is purely my opinion, it ain't going to change the world, you are under no obligation to agree with me, it is purely my expressed opinion.

Rik

I can understand what you mean. It's always nice to feel safer.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

What's New in Thunderbird 2.0.0.4-
Security Update: The following security issues have been fixed:
-MFSA 2007-15 Security Vulnerability in APOP Authentication
-MFSA 2007-12 Crashes with evidence of memory corruption (rv:1.8.0.12/1.8.1.4)
-New Language: Korean is now available

http://www.mozilla.com/en-US/thunderbird/all.html
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Background Intelligent Transfer Service (BITS) 2.5 for Windows Server 2003 (KB923845)
Background Intelligent Transfer Service (BITS) 2.5 is a required component for the new releases of Microsoft System Center Configuration Manager 2007 and Windows Live OneCare.
http://www.microsoft.com/downloads/info.aspx?na=22&p=1&SrcDisplayLang=en&SrcCategoryId=&SrcFamilyId=&u=%2fdownloads%2fdetails.aspx%3fFamilyID%3d25490249-f820-4ad9-8f38-313d8982d6fa%26DisplayLang%3den

Background Intelligent Transfer Service (BITS) 2.5 for Windows XP x64 Edition (KB923845)
http://www.microsoft.com/downloads/info.aspx?na=22&p=2&SrcDisplayLang=en&SrcCategoryId=&SrcFamilyId=&u=%2fdownloads%2fdetails.aspx%3fFamilyID%3db8ae244a-bcbd-4e38-90ef-772859ed233c%26DisplayLang%3den

Background Intelligent Transfer Service (BITS) 2.5 for Windows Server 2003 x64 Edition (KB923845)
http://www.microsoft.com/downloads/info.aspx?na=22&p=3&SrcDisplayLang=en&SrcCategoryId=&SrcFamilyId=&u=%2fdownloads%2fdetails.aspx%3fFamilyID%3d4d160634-ca5e-4ead-8154-7dac7625e701%26DisplayLang%3den

Background Intelligent Transfer Service (BITS) 2.5 for Windows XP (KB923845)
http://www.microsoft.com/downloads/info.aspx?na=22&p=4&SrcDisplayLang=en&SrcCategoryId=&SrcFamilyId=&u=%2fdownloads%2fdetails.aspx%3fFamilyID%3da064bf14-e54c-4e8c-85e7-1e3be1628b2d%26DisplayLang%3den

Background Intelligent Transfer Service (BITS) 2.5 for Windows Server 2003 for Itanium-based Systems (KB923845)
http://www.microsoft.com/downloads/info.aspx?na=22&p=5&SrcDisplayLang=en&SrcCategoryId=&SrcFamilyId=&u=%2fdownloads%2fdetails.aspx%3fFamilyID%3d43430322-26ef-4c68-a6c9-3e836e899ddc%26DisplayLang%3den

Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Java Runtime Environment (JRE) 6u2 has been released.

The full internal version number for this update release is 1.6.0_02-b05 (where "b" means "build"). The external version number is 6u05.



Release notes
http://java.sun.com/javase/6/webnotes/ReleaseNotes.html

Download
http://java.sun.com/javase/downloads/index.jsp
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.

Rik

Microsoft Security Bulletin Summary for July 2007

Microsoft Security Bulletin(s) for 10/07/2007
http://www.microsoft.com/technet/security/Bulletin/ms07-Jul.mspx

July 10 2007
Today Microsoft released the following Security Bulletin(s).

Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.

Bulletin Summary:
http://www.microsoft.com/technet/security/Bulletin/ms07-Jul.mspx


Critical Bulletins:
Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (936542)
http://www.microsoft.com/technet/security/Bulletin/ms07-036.mspx

Vulnerability in Windows Active Directory Could Allow Remote Code Execution (926122)
http://www.microsoft.com/technet/security/Bulletin/ms07-039.mspx

Vulnerabilities in .NET Framework Could Allow Remote Code Execution (931212)
http://www.microsoft.com/technet/security/Bulletin/ms07-040.mspx

Important Bulletins:
Vulnerability in Microsoft Office Publisher 2007 Could Allow Remote Code Execution 936548
http://www.microsoft.com/technet/security/Bulletin/ms07-037.mspx

Vulnerability in Microsoft Internet Information Services Could Allow Remote Code Execution (939373)
http://www.microsoft.com/technet/security/Bulletin/ms07-041.mspx


Moderate Bulletins:
Vulnerability in Windows Vista Firewall Could Allow Information Disclosure (935807)
http://www.microsoft.com/technet/security/Bulletin/ms07-038.mspx

Re-Released Bulletins:
Vulnerability in Windows Media Format Could Allow Remote Code Execution (923689)
http://www.microsoft.com/technet/security/Bulletin/ms06-078.mspx

This represents our regularly scheduled monthly bulletin release (second Tuesday of each month). Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
Rik
--------------------

This post reflects my own views, opinions and experience, not those of IDNet.