• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • UC Berkeley
  • Berkeley Engineering
  • EECS

Header Search Widget

IRIS

Instructional & Research Information Systems

  • About Us
  • Get Started
  • Get Help
  • FAQ
    • FAQ: Accounts
    • FAQ: EECS Slack
    • FAQ: File Storage
    • FAQ: Hardware
    • FAQ: MacOS
    • FAQ: Mail
    • FAQ: Mailing Lists
    • FAQ: Network
    • FAQ: Security
    • FAQ: Unix
    • FAQ: Web
    • FAQ: Windows
  • Services
    • Accounts
    • Backups
    • E-mail
    • EECS Login Servers
    • File Storage
    • Infrastructure
    • Mailing Lists
    • Network
    • Printing
    • Room Reservations
    • Security
    • Software
    • Unix
    • Web
  • Policies
  • Forms
    • System Registration/Update
    • Account Request Form
    • Network Problem Report
    • SSL Certificate Request
    • All Other Forms
  • Rates

Microsoft Security Bulletin for January 2006

January 11, 2006 by IRIS Staff

********************************************************************
Title: Microsoft Security Bulletin for January 2006
Issued: January 10, 2006
Version Number: 2.0
Bulletin: http://go.microsoft.com/fwlink/?LinkId=58872
********************************************************************


Security patches defined by Microsoft as "critical" or "important" MUST be applied within 10 business days of notification. Should there be active exploits, the time will be adjusted and users will be informed appropriately. Hosts unpatched after the defined time are subject to scanning and removal from the EECS network as per campus IT security policies (http://socrates.berkeley.edu:2002/MinStds/).

Patching is sometimes dependent on the service pack level of the Microsoft OS, and installed applications, please read requirements carefully.

Critical Security Bulletins ===========================

MS06-001 - Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919)

- Impact: Remote Code Execution

- Affected Software: - Windows 2000 Service Pack 4 - Windows XP Service Pack 1 - Windows XP Service Pack 2 - Windows XP Professional x64 Edition - Windows Server 2003 - Windows Server 2003 Service Pack 1 - Windows Server 2003 x64 Edition - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 with SP1 for Itanium-based Systems

- Review the FAQ section of bulletin MS06-001 for information about these operating systems: - Windows 98 - Windows 98 Second Edition (SE) - Windows Millennium Edition (ME)

- Version Number: 1.0



MS06-002 - Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution (908519)

- Impact: Remote Code Execution

- Affected Software: - Windows 2000 Service Pack 4 - Windows XP Service Pack 1 - Windows XP Service Pack 2 - Windows XP Professional x64 Edition - Windows Server 2003 - Windows Server 2003 Service Pack 1 - Windows Server 2003 x64 Edition - Windows Server 2003 for Itanium-based Systems - Windows Server 2003 with SP1 for Itanium-based Systems

- Review the FAQ section of bulletin MS06-002 for information about these operating systems: - Windows 98 - Windows 98 Second Edition (SE) - Windows Millennium Edition (ME)

- Version Number: 1.0



MS06-003 - Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution (902412)

- Impact: Remote Code Execution

- Affected Software: - Microsoft Office 2000 Service Pack 3 - Windows Microsoft Office XP Service Pack 3 - Microsoft Office 2003 Service Pack 1 - Microsoft Office 2003 Service Pack 2 - Microsoft Exchange Server 5.0 Service Pack 2 - Microsoft Exchange Server 5.5 Service Pack 4 - Microsoft Exchange 2000 Server Pack 3 with the Exchange 2000 Post-Service Pack 3 Update Rollup of August 2004

- Version Number: 1.0

Filed Under: News

Primary Sidebar

IRIS Service Status

Green
We have 0 Active Incidents, and 0 Scheduled Maintenances noted.

IST Service Status

Outages to campus services are listed at berkeley.statusdashboard.com.

Recent Highlights

IT Support During Winter 2022 Energy Curtailment

December 7, 2022 by Lars Rohrbach

Upcoming Change to EECS Firewall Handling of SSH

September 22, 2022 by Lars Rohrbach

  • About
  • Contact
  • PRIVACY
  • ACCESSIBILITY
  • NONDISCRIMINATION

© 2022–2023 UC Regents  |  Log in