Edit to add:
- The MSRC Blog post on these critical updates has now been published. With the critical updates, I didn't want to hold off this post for that release.
- The IEBlog published the reminder that IE security updates are cumulative and contain all previously released updates for each version of Internet Explorer.
Should you have difficulty with the updates, no-charge support is available at 1-866-PCSAFETY (1-866-727-2338). This number is available 24 hours a day for the U.S. and Canada for virus and other security-related support. For numbers outside the U.S. and Canada, please select your region and follow the instructions there.
Microsoft has provided information, about how you can help protect your computer system, at the following locations:
- Consumers can visit Security At Home, where this information is also available by clicking “Latest Security Updates”.
- IT Professionals can visit the TechNet Security Center
There are 7 Critical Updates:
- MS07-023 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (934233), Affected Software: Office.
- MS07-024 Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (934232), Affected Software: Office.
- MS07-025 Vulnerability in Microsoft Office Could Allow Remote Code Execution (934873), Affected Software: Office.
- MS07-026 Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832), Affected Software: Exchange.
- MS07-027 Cumulative Security Update for Internet Explorer (931768), Affected Software: Internet Explorer, including IE7 on Windows Vista
- MS07-028 Vulnerability in CAPICOM Could Allow Remote Code Execution (931906), Affected Software: CAPICOM, BizTalk.
- MS07-029 Vulnerability in RPC on Windows DNS Server Could Allow Remote Code Execution (935966), Affected Software: Windows
Reminder: The MS07-029 security update will NOT undo any of the workarounds that may have been applied and will need to be undone.
No comments:
Post a Comment
Neither spam nor comments containing vulgarities will be approved.