[IS&T Security-FYI] Newsletter, July 13, 2007

Monique Yeaton myeaton at MIT.EDU
Fri Jul 13 10:36:58 EDT 2007


In this issue:

1. Microsoft's Patches for July 2007
2. Flash Player & QuickTime Updates
3. Postcard Spam Warning


---------------------------------------------
1. Microsoft's Patches for July 2007
---------------------------------------------

This past Tuesday, July 10, Microsoft released 6 security patches, 3  
of which are critical, for the following components:

- Windows 2000 and XP
- Windows Server 2003
- Windows XP Professional
- Windows Vista
- Excel
- Publisher
- .NET Framework

The patches have been approved for deployment via MIT WAUS.

If you have Automatic Updates enabled on your system, the updates are  
delivered to you when they are released, but you have to make sure  
you install them. We recommend that you take the updates unless you  
have specific information indicating that it is incompatible with an  
application you need to use. You will have to restart your computer  
after applying the patches.

Detailed descriptions of the 6 updates are in Microsoft Security  
Bulletins MS07-036 through MS07-041, available here:

<http://www.microsoft.com/technet/security/bulletin/ms07-Jul.mspx>

End users who wish to skip the details and go right to the download  
page can go here:

<http://www.microsoft.com/protect/computer/updates/bulletins/ 
200707.mspx>

------------------------------------------------
2. Flash Player & QuickTime Updates
------------------------------------------------

There are critical vulnerabilities in Adobe Flash player and related  
software. Exploitation of these vulnerabilities could allow a remote,  
unauthenticated attacker to execute arbitrary code or cause a denial  
of service on a vulnerable system.

Visit the Macromedia site to see if you have the latest player  
version installed: <http://www.macromedia.com/software/flash/about/>

More information about the update is also available here:
<http://www.adobe.com/support/security/bulletins/apsb07-12.html>

---

Apple QuickTime contains multiple vulnerabilities. Exploitation of  
these vulnerabilities could allow a remote attacker to execute  
arbitrary code or cause a denial-of-service condition.

Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java  
applets and various types of media files are handled. Note that  
QuickTime ships with Apple iTunes.

Solutions:
Upgrade to QuickTime 7.2. This and other updates for Mac OS X are  
available via Apple Update.

On Microsoft Windows, QuickTime users can install the update by using  
the built-in auto-update mechanism, Apple Software Update, or by  
installing the update manually.

Disabling QuickTime or Java in your web browser may defend against  
this attack. For more information, refer to the Securing Your Web  
Browser document.

Apple QuickTime 7.2 for Windows:
<http://www.apple.com/support/downloads/quicktime72forwindows.html>

Apple QuickTime 7.2 for Mac:
<http://www.apple.com/support/downloads/quicktime72formac.html>

CERT document on Securing Your Web Browser:
<http://www.us-cert.gov/reading_room/securing_browser/>


----------------------------------
3. Postcard Spam Warning
----------------------------------

We'd like to warn MIT computer users about a new wave of spam with  
the subject line "You've received a postcard from a family member!"  
Other variants of this spam email include the following subject  
lines, "BlueMountain.com greeting from a colleague," "July 4th B-B-Q  
Party," and "Independence Day Party."

These messages claim to be greetings from postcard services such as  
americangreetings.com, bluemountain.com and 2000greetings.com, among  
others.

Malicious website links are embedded in the email and appear to  
employ multiple methods to exploit a web browser in order to  
compromise a computer system.

If you haven't gotten one of these emails in your inbox, just give it  
time. There have been enough variants that they can get through spam  
filters. We remind users to be careful opening email and email  
attachments.

To learn more about spam filtering see:
<http://mit.edu/ist/services/email/nospam/>


Monique
=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security






More information about the ist-security-fyi mailing list