[WinPartners] Fwd: Microsoft Bulletin: MS03-49 - Windows Operating System Vulnerability

Ginny Williams ginnyw at MIT.EDU
Thu Nov 20 12:36:16 EST 2003


I trust you all have seen a notice about this, but just in case.

ginny
--- begin forwarded text


X-Sieve: CMU Sieve 2.2
From: Theresa M Regan <tregan at MIT.EDU>
Date: Fri, 14 Nov 2003 13:09:38 -0500
To: IT-Partners <itpartners at mit.edu>,
    Administrative Community <aac-aoquery at mit.edu>
X-Mailer: Apple Mail (2.606)
cc: Theresa M Regan <tregan at mit.edu>
Subject: Microsoft Bulletin:  MS03-49 - Windows Operating System Vulnerability
X-BeenThere: itpartners at mit.edu
X-Mailman-Version: 2.1
List-Id: IT Partners Discussion List <itpartners.mit.edu>
List-Help: <mailto:itpartners-request at mit.edu?subject=help>
List-Post: <mailto:itpartners at mit.edu>
List-Subscribe: <http://mailman.mit.edu/mailman/listinfo/itpartners>,
	<mailto:itpartners-request at mit.edu?subject=subscribe>
List-Unsubscribe: <http://mailman.mit.edu/mailman/listinfo/itpartners>,
	<mailto:itpartners-request at mit.edu?subject=unsubscribe>
Sender: itpartners-bounces at MIT.EDU
X-Spam-Score: -1
X-Spam-Flag: NO
X-Scanned-By: MIMEDefang 2.28 (www . roaringpenguin . com / mimedefang)

Colleagues,

On Tuesday, November 11th, Microsoft announced the following 
*critical* Windows operating system security vulnerability:

      Microsoft Security Bulletin MS03-049
      Title: Buffer Overrun in the Workstation Service Could Allow 
Code Execution (828749)

      Affected Software:
           *        Microsoft Windows 2000 Service Pack 2, Service 
Pack 3, Service Pack 4
           *        Microsoft Windows XP, Microsoft Windows XP Service Pack 1
           *        Microsoft Windows XP 64-Bit Edition

More complete information is available from Microsoft at: 
<http://www.microsoft.com/technet/security/bulletin/MS03-049.asp>

Information Systems thanks the members of the Community who acted 
upon earlier notifications.  Thanks!

We still need help reaching many members of the MIT Community and 
ensuring Windows workstations are patched.

      --  Should you have responsibility for Windows workstations and 
have not patched the operating system for this vulnerability, please 
set aside time to patch these workstations, quickly.

      --  Members of the MIT Community with ties to academic 
departments, please assist us by forwarding along this e-mail to 
appropriate internal mailing lists for Faculty, Principal 
Investigators, Graduate Students and Students.

In closing, Information Systems thanks everyone who set aside time 
this week to patch their Windows operating system.  Contact the 
Computing Help Desk at (617) 253-1102 or e-mail 
<computing-help at mit.edu> if you require further assistance.

--- end forwarded text




More information about the winpartners mailing list