Windows XP UpdateMicrosoft Security Bulletin MS06-061Maximum Security Rating: Critical
Affected Softwares: Windows 2000 SP4, Windows XP SP1, Windows XP SP2, Windows XP Professiona x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition, Microsoft Office 2003 SP1 and SP2
Description: A security issue has been identified in the way Microsoft XML Core Services (MSXML) is handled that could allow an attacker to compromise a Windows-based system and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
Windows Malicious Software Removal Tool - October 2006 (KB890830)After the download, this tool runs once to check your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove any infection found. If an infection is found, the tool will display a status report the next time you start your computer. A new version of the tool will be offered every month. If you want to manually run the tool on your computer, you can download a copy from the Microsoft Download Center or run an online version from microsoft.com. This tool is not a replacement for an anti-virus product. To help protect your computer, you should use an anti-virus product.
Microsoft Security Bulletin MS06-063Maximum Security Rating: Important
Affected Softwares: Windows 2000 SP4, Windows XP SP1, Windows XP SP2, Windows XP Professional x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition
Description: A security issue has been identified in the Server service that could allow a remote user to cause an affected Windows-based system to stop responding. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.
Microsoft Security Bulletin MS06-057Maximum Security Rating: Critical
Affected Softwares: Windows 2000 SP4, Windows XP SP1, Windows XP SP2, Windows XP Professional x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition
Description: A remote code execution vulnerability exists in Windows Shell due to improper validation of input parameters when invoked by the WebViewFolderIcon ActiveX control (Web View). This vulnerability could potentially allow remote code execution if a user visited a specially crafted Web site or viewed a specially crafted e-mail message. An attacker could exploit the vulnerability by hosting a web site that contained a web page that was used to exploit this vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
Microsoft Security Bulletin MS06-058Maximum Security Rating: Critical
Affected Softwares: Microsoft Office PowerPoint 2000, Microsoft Office PowerPoint 2002, Microsoft Office PowerPoint 2003, Microsoft Office 2004 for Mac, Microsoft Office v. X for Mac
Description:
Full Details hereMicrosoft Security Bulletin MS06-059Maximum Security Rating: Critical
Affected Softwares: Microsoft Office Excel 2000, Microsoft Office Excel 2002, Microsoft Office Excel 2003, Microsoft Office Excel Viewer 2003, Microsoft Work Suites 2004, 2005, 2006, Microsoft Office 2004 for Mac, Microsoft Office v. X for Mac
Description:
Full details hereMicrosoft Security Bulletin MS06-060Maximum Security Rating: Critical
Affected Softwares: Microsoft Office Word 2000, Microsoft Office Word 2002, Microsoft Office Word 2003, Microsoft Office Word Viewer 2003, Microsoft Work Suites 2004, 2005, 2006, Microsoft Office 2004 for Mac, Microsoft Office v. X for Mac
Description:
Full details hereMicrosoft Security Bulletin MS06-062Maximum Security Rating: Critical
Affected Softwares: Microsoft Office 2000 SP3, Microsoft Office XP SP3, Microsoft Office SP1 and SP2, Microsoft Office Project 2000 SP1, Microsoft Office Project 2002 SP1, Microsoft Office Visio 2002 SP2, Microsoft Office 2004 for Mac, Microsoft Office v. X for Mac
Description:
Full details hereMicrosoft Security Bulletin MS06-063Maximum Security Rating: Important
Affected Softwares: Windows 2000 SP4, Windows XP SP1, Windows XP SP2, Windows XP Professional x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition
Description:
Server Service Denial of Service VulnerabilityA denial of service vulnerability exists in the Server service because of the way it handles certain network messages. An attacker could exploit the vulnerability by sending a specially crafted network message to a computer running the Server service. An attacker who successfully exploited this vulnerability could cause the computer to stop responding.
SMB Rename VulnerabilityA remote code execution vulnerability exists in the Server service because of the way it handles certain network messages. An attacker could exploit the vulnerability sending a specially crafted network message to a computer running the Server service as an authenticated user. An attacker who successfully exploited this vulnerability could take complete control of the affected system.
Microsoft Security Bulletin MS06-056Maximum Security Rating: Moderate
Affected Softwares: Windows 2000 SP4, Windows XP SP1, Windows XP SP2, Windows XP Professional x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition
Description: A cross-site scripting vulnerability exists in a server running a vulnerable version of the .Net Framework 2.0 that could inject a client side script in the user's browser. The script could spoof content, disclose information, or take any action that the user could take on the affected web site. Attempts to exploit this vulnerability require user interaction.
Microsoft Security Bulletin MS06-065Maximum Security Rating: Moderate
Affected Softwares: Windows XP SP1, Windows XP SP2, Windows XP Professional x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition
Description: A remote code execution vulnerability exists in Windows Object Packager because of the way that file extensions are handled. An attacker could exploit the vulnerability by constructing a specially crafted file that could potentially allow remote code execution if a user visited a specially crafted Web site. An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, significant user interaction is required to exploit this vulnerability.
Microsoft Security Bulletin MS06-064Maximum Security Rating: Low
Affected Softwares: Windows XP SP1, Windows XP SP2, Windows XP Professional x64 Edition, Windows Server 2003, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based systems, Windows Server 2003 SP1 for Itanium-based systems, Windows Server 2003 64-bit Edition
Description:
Full details hereUpdate Windows hereNote: Macintosh users Microsoft Office for Mac are affected. If you are not using Microsoft Office, ignore this.