Home > Microsoft Security > Ms08-052 Superseded

Ms08-052 Superseded

Contents

There is no charge for support calls that are associated with security updates. When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? No. Why does this update address several reported security vulnerabilities? This update contains support for several vulnerabilities because the modifications that are required to address these issues are located in related files. These are the sites that will host the update, and it requires an ActiveX Control to install the update. navigate here

Why was this bulletin revised on September 12, 2008? Microsoft revised this bulletin to make the following changes: Added Microsoft Office Project 2002 Service Pack 2, Microsoft Office Word Viewer, Microsoft Word If a restart is required at the end of Setup, a dialog box will be presented to the user with a timer warning that the computer will restart in 30 seconds. These are the sites that will host the update, and it requires an ActiveX Control to install the update. This is a mitigating factor for Web sites that have not been added to Internet Explorer Trusted sites zone. you can try this out

Ms08-052 Superseded

If you have previously installed a hotfix to update one of these files, the installer copies the RTMQFE, SP1QFE, or SP2QFE files to your system. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when This documentation is archived and is not being maintained. These Web sites could contain specially crafted content that could exploit this vulnerability.

What might an attacker use the vulnerability to do? An attacker who successfully exploited this vulnerability could take complete control of an affected system. For more information about the Microsoft Update Catalog, see the Microsoft Update Catalog FAQ. Inclusion in Future Service Packs There are no more service packs planned for this software. Cve-2003-1048 An attacker who successfully exploited this vulnerability could take complete control of an affected system.

Note that the Server Core installation option does not apply to certain editions of Windows Server 2008; see Compare Server Core Installation Options. Microsoft Ie Gif Parsing Double Free Vulnerability(30025) For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and Block IGMP and MLD on perimeter firewalls Firewall best practices and standard default firewall configurations can help protect networks from IGMP and MLD attacks that originate outside the enterprise perimeter. see this For more information about the Windows Product Lifecycle, visit Microsoft Support Lifecycle.

For more detailed information, see Microsoft Knowledge Base Article 910723: Summary list of monthly detection and deployment guidance articles. Ms09-062 In the Internet Options dialog box, click the Security tab, and then click the Internet icon. When this security bulletin was issued, had this vulnerability been publicly disclosed? No. We recommend that you add only sites that you trust to the Trusted sites zone.

Microsoft Ie Gif Parsing Double Free Vulnerability(30025)

For a complete list of service packs, see Lifecycle Supported Service Packs. https://technet.microsoft.com/en-us/library/security/ms08-021.aspx For more information about how to deploy this security update using Windows Server Update Services, visit the Windows Server Update Services Web site. Ms08-052 Superseded Also, in certain cases, files may be renamed during installation. Ms08-071 Security updates are also available from the Microsoft Download Center.

Windows Server Update Services By using Windows Server Update Services (WSUS), administrators can deploy the latest critical updates and security updates for Windows 2000 operating systems and later, Office XP and SoftwareMBSA 2.0.1 Microsoft Windows 2000 Service Pack 4Yes Windows XP Service Pack 2Yes Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2Yes Windows Server 2003 Service No user interaction is required, but installation status is displayed. For more information about the terminology that appears in this bulletin, such as hotfix, see Microsoft Knowledge Base Article 824684. Ms04-025

File Information See Microsoft Knowledge Base Article 955047 Registry Key Verification Not applicable Office Features The following table contains the list of feature names (case sensitive) that must be reinstalled for For backward compatibility, the security update also supports the setup switches that the earlier version of the Setup program uses. For more information, see the Windows Operating System Product Support Lifecycle FAQ. http://technologyprometheus.com/microsoft-security/microsoft-security-bulletin-ms08-028-critical-download.html It should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities.

Inclusion in Future Service Packs The update for this issue may be included in a future update rollup Deployment Installing without user interventionMicrosoft Windows 2000 Service Pack 4:Windows2000-kb957095-x86-enu /quiet Installing without Ms13-054 However, best practices strongly discourage allowing this. For more information about MBSA, visit Microsoft Baseline Security Analyzer.

You can find additional information in the subsection, Deployment Information, in this section.

For information about the different Microsoft XML Core Services versions that are available and the products that install them, see Microsoft Knowledge Base Article 269238. Added an "Uninstalling without restarting" switch entry for Microsoft .NET Framework 1.0 Service Pack 3 in the Security Update Deployment section. These files are located at the path that is specified in the switch. /extract[:path] Extracts files without starting the Setup program /ER Enables extended error reporting /verbose Enables verbose logging. Kb938464 In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability.

I have a non-vulnerable version of software installed, why am I being offered this update? Some of the non-affected software including Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Microsoft had not received any information to indicate that this vulnerability had been publicly disclosed when this security bulletin was originally issued. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems. These files are located at the path that is specified in the switch. /extract[:path] Extracts files without starting the Setup program. /ER Enables extended error reporting. /verbose Enables verbose logging.

Security Update Deployment Affected Software For information about the specific security update for your affected software, click the appropriate link: Windows 2000 (all editions) Reference Table The following table contains the Click Start and then enter an update file name in Start Search. How could an attacker exploit the vulnerability? This vulnerability requires that a user open a specially crafted Word file with an affected version of Microsoft Word. You can find them most easily by doing a keyword search for "security update." Finally, security updates can be downloaded from the Microsoft Update Catalog.

To determine the support life cycle for your software release, visit Microsoft Support Lifecycle. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality. If they are, see your product documentation to complete these steps. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

Does this update contain any security-related changes to functionality? For more detailed information, see Microsoft Knowledge Base Article 910723: Summary list of monthly detection and deployment guidance articles. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. See the “Microsoft Baseline Security Analyzer” heading under the section, Detection and Deployment Tools and Guidance, earlier in this bulletin for more information.

When this security bulletin was issued, had this vulnerability been publicly disclosed? No. This security update supports the following setup switches. For more information about this behavior, see Microsoft Knowledge Base Article 824994. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality.

Disclaimer The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Verifying that the Update Has Been Applied Microsoft Baseline Security Analyzer To verify that a security update has been applied to an affected system, you may be able to use the How could an attacker exploit the vulnerability? An attacker could try to exploit the vulnerability by creating specially crafted network packets and sending the packets to an affected system. Yes.

Also, in certain cases, files may be renamed during installation. For more information about the terminology that appears in this bulletin, such as hotfix, see Microsoft Knowledge Base Article 824684. Supported Security Update Installation Switches SwitchDescription /q Specifies quiet mode, or suppresses prompts, when files are being extracted. /q:u Specifies user-quiet mode, which presents some dialog boxes to the user. /q:a