News

Microsoft Releases 3 Security Fixes for Windows, Exchange

As expected, Microsoft Corp. today released three new security bulletins today as part of its monthly Patch Tuesday announcement, with two of the patches being rated as "critical."

As expected, Microsoft Corp. today released three new security bulletins today as part of its monthly Patch Tuesday announcement, with two of the patches being rated as "critical."

One of the critical bullitens is for Microsoft Exchange, the company's popular messaging software; the other is for a vulnerability Windows that have Adobe's Macromedia Flash Player installed. The third patch, deemed "moderate," replaces a fix released a year ago that affected the MSDTC service.

The Exchange flaw, covered by bulletin MS06-19, affects Exchange Server 2000 with Service Pack 3, and Exchange Server 2003 with Service Pack 1 and 2. It fixes a recently discovered remote code execution flaw that was reported to Microsoft privately, in which an attacker might take over a system through a specially crafted e-mail with CDO objects attached or with certain vCAl or iCal properties, which is then sent through a targeted Exchange server. An attacker who gets into a compromised system through this method would then be able to view, change or delete data, as well as create new accounts with full user rights.

Bulletin MS06-020, also rated critical by Microsoft, fixes another remote code execution flaw that mainly affects Windows XP with Service Packs 1 and 2, as well as Windows 98, 98SE and Millenium Edition that have the Macromedia Flash Player versions 5 and 6 installed. The flaw can allow an attacker to get access to a user's system if that user is logged on with administrative user rights, so the flaw does carry less risk.

The fix isn't applicable to Windows 2000 or Windows Server 2003 (with or without SP3), since those systems don't come with Flash installed by default. However, because Flash is a popular media program used on many Web sites, Microsoft points to guidance on the Adobe Systems Web site for further help with fixes.

Microsoft rates bulletin MS06-018 as moderate; it replaces bulletin MS05-051 that was issued a year ago. The flaw allows an attacker who gains access by sending a network message to an infected system to launch a denial of service attack, which could cause the Microsoft Distributed Transaction Coordinator service to stop responding. The vulnerability exists due to an unchecked buffer in the MSDTC service.

Windows 2000 systems are mainly at risk, but so to are Windows XP SP1 and Windows Server 2003 system that have the service turned on.

More details can be found here.

Featured

  • Report: Cost, Sustainability Drive DaaS Adoption Beyond Remote Work

    Gartner's 2025 Magic Quadrant for Desktop as a Service reveals that while secure remote access remains a key driver of DaaS adoption, a growing number of deployments now focus on broader efficiency goals.

  • Windows 365 Reserve, Microsoft's Cloud PC Rental Service, Hits Preview

    Microsoft has launched a limited public preview of its new "Windows 365 Reserve" service, which lets organizations rent cloud PC instances in the event their Windows devices are stolen, lost or damaged.

  • Hands-On AI Skills Now Outshine Certs in Salary Stakes

    For AI-related roles, employers are prioritizing verifiable, hands-on abilities over framed certificates -- and they're paying a premium for it.

  • Roadblocks in Enterprise AI: Data and Skills Shortfalls Could Cost Millions

    Businesses risk losing up to $87 million a year if they fail to catch up with AI innovation, according to the Couchbase FY 2026 CIO AI Survey released this month.