[WinPartners] Fwd: Microsoft Bulletin: MS03-49 - Windows Operating System Vulnerability
Ginny Williams
ginnyw at MIT.EDU
Thu Nov 20 12:36:16 EST 2003
I trust you all have seen a notice about this, but just in case.
ginny
--- begin forwarded text
X-Sieve: CMU Sieve 2.2
From: Theresa M Regan <tregan at MIT.EDU>
Date: Fri, 14 Nov 2003 13:09:38 -0500
To: IT-Partners <itpartners at mit.edu>,
Administrative Community <aac-aoquery at mit.edu>
X-Mailer: Apple Mail (2.606)
cc: Theresa M Regan <tregan at mit.edu>
Subject: Microsoft Bulletin: MS03-49 - Windows Operating System Vulnerability
X-BeenThere: itpartners at mit.edu
X-Mailman-Version: 2.1
List-Id: IT Partners Discussion List <itpartners.mit.edu>
List-Help: <mailto:itpartners-request at mit.edu?subject=help>
List-Post: <mailto:itpartners at mit.edu>
List-Subscribe: <http://mailman.mit.edu/mailman/listinfo/itpartners>,
<mailto:itpartners-request at mit.edu?subject=subscribe>
List-Unsubscribe: <http://mailman.mit.edu/mailman/listinfo/itpartners>,
<mailto:itpartners-request at mit.edu?subject=unsubscribe>
Sender: itpartners-bounces at MIT.EDU
X-Spam-Score: -1
X-Spam-Flag: NO
X-Scanned-By: MIMEDefang 2.28 (www . roaringpenguin . com / mimedefang)
Colleagues,
On Tuesday, November 11th, Microsoft announced the following
*critical* Windows operating system security vulnerability:
Microsoft Security Bulletin MS03-049
Title: Buffer Overrun in the Workstation Service Could Allow
Code Execution (828749)
Affected Software:
* Microsoft Windows 2000 Service Pack 2, Service
Pack 3, Service Pack 4
* Microsoft Windows XP, Microsoft Windows XP Service Pack 1
* Microsoft Windows XP 64-Bit Edition
More complete information is available from Microsoft at:
<http://www.microsoft.com/technet/security/bulletin/MS03-049.asp>
Information Systems thanks the members of the Community who acted
upon earlier notifications. Thanks!
We still need help reaching many members of the MIT Community and
ensuring Windows workstations are patched.
-- Should you have responsibility for Windows workstations and
have not patched the operating system for this vulnerability, please
set aside time to patch these workstations, quickly.
-- Members of the MIT Community with ties to academic
departments, please assist us by forwarding along this e-mail to
appropriate internal mailing lists for Faculty, Principal
Investigators, Graduate Students and Students.
In closing, Information Systems thanks everyone who set aside time
this week to patch their Windows operating system. Contact the
Computing Help Desk at (617) 253-1102 or e-mail
<computing-help at mit.edu> if you require further assistance.
--- end forwarded text
More information about the winpartners
mailing list