Microsoft Releases 3 Security Fixes for Windows, Exchange

As expected, Microsoft Corp. today released three new security bulletins today as part of its monthly Patch Tuesday announcement, with two of the patches being rated as "critical."

As expected, Microsoft Corp. today released three new security bulletins today as part of its monthly Patch Tuesday announcement, with two of the patches being rated as "critical."

One of the critical bullitens is for Microsoft Exchange, the company's popular messaging software; the other is for a vulnerability Windows that have Adobe's Macromedia Flash Player installed. The third patch, deemed "moderate," replaces a fix released a year ago that affected the MSDTC service.

The Exchange flaw, covered by bulletin MS06-19, affects Exchange Server 2000 with Service Pack 3, and Exchange Server 2003 with Service Pack 1 and 2. It fixes a recently discovered remote code execution flaw that was reported to Microsoft privately, in which an attacker might take over a system through a specially crafted e-mail with CDO objects attached or with certain vCAl or iCal properties, which is then sent through a targeted Exchange server. An attacker who gets into a compromised system through this method would then be able to view, change or delete data, as well as create new accounts with full user rights.

Bulletin MS06-020, also rated critical by Microsoft, fixes another remote code execution flaw that mainly affects Windows XP with Service Packs 1 and 2, as well as Windows 98, 98SE and Millenium Edition that have the Macromedia Flash Player versions 5 and 6 installed. The flaw can allow an attacker to get access to a user's system if that user is logged on with administrative user rights, so the flaw does carry less risk.

The fix isn't applicable to Windows 2000 or Windows Server 2003 (with or without SP3), since those systems don't come with Flash installed by default. However, because Flash is a popular media program used on many Web sites, Microsoft points to guidance on the Adobe Systems Web site for further help with fixes.

Microsoft rates bulletin MS06-018 as moderate; it replaces bulletin MS05-051 that was issued a year ago. The flaw allows an attacker who gains access by sending a network message to an infected system to launch a denial of service attack, which could cause the Microsoft Distributed Transaction Coordinator service to stop responding. The vulnerability exists due to an unchecked buffer in the MSDTC service.

Windows 2000 systems are mainly at risk, but so to are Windows XP SP1 and Windows Server 2003 system that have the service turned on.

More details can be found here.


  • Image of a futuristic maze

    The 2024 Microsoft Product Roadmap

    Everything Microsoft partners and IT pros need to know about major Microsoft product milestones this year.

  • Microsoft Sets September Launch for Purview Data Governance

    Microsoft's AI-powered Purview solution to address governance and security challenges is set to become generally available on Sept. 1.

  • An image of planes flying around a globe

    2024 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • End of the Road for Kaspersky in the United States

    Kaspersky on Monday said it is shuttering its U.S. operations, just days before a nationwide ban on sales of its security software was set to take effect.