Fixlet Site - EnterpriseSecurity Current Version: 1193 Published: Fri, 12 Jun 2009 23:30:56 GMT New Fixlets: ============ *************************************************************** Title: MS09-017: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution - Office 2003 SP3 (Local/Network Install) (v2, re-released 06/12/2009) Severity: Important Fixlet ID: 901737 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-017.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Important Note: This patch was re-released unannounced on June 12, 2009 for unknown reasons. BigFix testing has determined that customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves a publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Office PowerPoint that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } } *************************************************************** Title: MS09-017: Vulnerabilities in Microsoft Office PowerPoint Could Allow Remote Code Execution - Office 2003 SP3 (Administrative Install) (v2, re-released 06/12/2009) Severity: Important Fixlet ID: 901739 Fixlet Link: http://www.microsoft.com/technet/security/Bulletin/MS09-017.mspx Fixlet Link: http://support.bigfix.com/cgi-bin/kbdirect.pl?id=129 Fixlet Description: Important Note: This patch was re-released unannounced on June 12, 2009 for unknown reasons. BigFix testing has determined that customers who have successfully updated their systems do not need to reinstall this update. Microsoft has released a security update that resolves a publicly disclosed vulnerability and several privately reported vulnerabilities in Microsoft Office PowerPoint that could allow remote code execution if a user opens a specially crafted PowerPoint file. An attacker who successfully exploited any of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. After downloading and installing this update, affected computers will no longer be susceptible to these vulnerabilities. Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the security bulletin for more information. document.body.onload = SetOfficeOverviewLink; function SetOfficeOverviewLink() { try { dashboardLink.innerHTML = EvaluateRelevance('"Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the " & link "Microsoft Office Overview Dashboard" of bes wizard whose (dashboard id of it = "office_overview.ojo" AND id of site of it = 2) as string & "."'); } catch (e) { dashboardLink.innerHTML = 'Note: For configuration controls and an overview of your Microsoft Office deployment(s), please see the Microsoft Office Overview Dashboard.'; } }