This evening Microsoft released a critical out-of-cycle security update addressing a 0 day vunerability in the Server service that could allow remote code execution. This is the first time since April 2007 that they have released an out-of-cycle update underlining the severity of the threat.
There are credible reports that this vunerability is being actively exploited in the wild. There is a high potential for widespread and reliable exploitation.
This is a critical update for Windows 2000, XP and Server 2003. It is an important update for Vista and Server 2008.
A visit to microsoft to download and install MS08-067 is highly recommended.
Alert email from Microsoft follows:
Subject: Alert - Critical Product Vulnerability - October 23, 2008 Microsoft Security Bulletin Release (Out of Band)
Due the urgency of this bulletin, you have received this notification in English. If your specified language preference is French, we will send you a French language version as soon as it becomes available. Thank you for your understanding.
What is the purpose of this alert?
This alert is to provide you with an overview of the new security bulletin released (out of band) on October 23, 2008. Microsoft has released security bulletin MS08-067, Vulnerability in Server Service Could Allow Remote Code Execution (958644), to address a vulnerability in all currently supported versions of Windows. This security update was released outside of the usual monthly security bulletin release cycle in an effort to protect customers.
Executive Summary
This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests.
Recommendations
Microsoft recommends customers prepare their systems and networks to apply this security bulletin immediately once released to help ensure that their computers are protected from attempted criminal attacks. For more information about security updates, visit http://www.microsoft.com/protect.
New Security Bulletin Technical Details
Identifier
MS08-067
Severity Rating
This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008.
Impact of Vulnerability
Remote Code Execution
Detection
Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software
All currently supported versions of Windows
Restart Requirement
The update requires a restart.
Removal Information
· For Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility
· For Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update
MS06-040 is superseded on these operating systems: Windows 2000 SP4, Windows XP SP2, Windows XP X64, Windows Server 2003 SP1, Windows Server 2003 X64, Windows Server 2003 SP1 for Itanium-based Systems.
Full Details:
http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx
Public Bulletin Webcast
Microsoft will host a Webcast to address customer questions on the bulletin:
Title: Information Regarding an Out-of-Band Security Bulletin Release (Level 200)
Date: Friday, October 24, 2008 11:00 A.M. Pacific Time (U.S. & Canada)
URL: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032394179&Culture=en-US
Regarding Information Consistency
We strive to provide you with accurate information in static (this mail) and dynamic (Web-based) content. Microsoft’s security content posted to the Web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft’s Web-based security content, the information in Microsoft’s Web-based security content is authoritative.
If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.
Thank you,
Microsoft CSS Security Team
There are credible reports that this vunerability is being actively exploited in the wild. There is a high potential for widespread and reliable exploitation.
This is a critical update for Windows 2000, XP and Server 2003. It is an important update for Vista and Server 2008.
A visit to microsoft to download and install MS08-067 is highly recommended.
Alert email from Microsoft follows:
Subject: Alert - Critical Product Vulnerability - October 23, 2008 Microsoft Security Bulletin Release (Out of Band)
Due the urgency of this bulletin, you have received this notification in English. If your specified language preference is French, we will send you a French language version as soon as it becomes available. Thank you for your understanding.
What is the purpose of this alert?
This alert is to provide you with an overview of the new security bulletin released (out of band) on October 23, 2008. Microsoft has released security bulletin MS08-067, Vulnerability in Server Service Could Allow Remote Code Execution (958644), to address a vulnerability in all currently supported versions of Windows. This security update was released outside of the usual monthly security bulletin release cycle in an effort to protect customers.
Executive Summary
This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests.
Recommendations
Microsoft recommends customers prepare their systems and networks to apply this security bulletin immediately once released to help ensure that their computers are protected from attempted criminal attacks. For more information about security updates, visit http://www.microsoft.com/protect.
New Security Bulletin Technical Details
Identifier
MS08-067
Severity Rating
This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008.
Impact of Vulnerability
Remote Code Execution
Detection
Microsoft Baseline Security Analyzer can detect whether your computer system requires this update.
Affected Software
All currently supported versions of Windows
Restart Requirement
The update requires a restart.
Removal Information
· For Windows 2000, Windows XP, Windows Server 2003: Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility
· For Windows Vista and Windows Server 2008: WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates.
Bulletins Replaced by This Update
MS06-040 is superseded on these operating systems: Windows 2000 SP4, Windows XP SP2, Windows XP X64, Windows Server 2003 SP1, Windows Server 2003 X64, Windows Server 2003 SP1 for Itanium-based Systems.
Full Details:
http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx
Public Bulletin Webcast
Microsoft will host a Webcast to address customer questions on the bulletin:
Title: Information Regarding an Out-of-Band Security Bulletin Release (Level 200)
Date: Friday, October 24, 2008 11:00 A.M. Pacific Time (U.S. & Canada)
URL: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032394179&Culture=en-US
Regarding Information Consistency
We strive to provide you with accurate information in static (this mail) and dynamic (Web-based) content. Microsoft’s security content posted to the Web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft’s Web-based security content, the information in Microsoft’s Web-based security content is authoritative.
If you have any questions regarding this alert please contact your Technical Account Manager or Application Development Consultant.
Thank you,
Microsoft CSS Security Team





