LANDesk Patch News Bulletin: Microsoft Patch Tuesday Release Available for October 2009

Version 1

    LANDesk Security and Patch News

    Headlines

          ·       (October 14, 2009) Microsoft released thirteen security updates to address vulnerabilities in Microsoft Windows OS, Microsoft Office Suites, Systems, and Components, Microsoft SQL Server, Microsoft Silverlight, Microsoft Visual Studio, Microsoft Report Viewer and Microsoft Forefront Security. The contents can be downloaded from the LANDesk global host servers.  Please visit the following page for more details,

      http://www.microsoft.com/technet/security/bulletin/ms09-oct.mspx

           

    New Vulnerabilities

    ·       Vulnerability ID –  MS09-050

    -      Vulnerabilities in SMBv2 Could Allow Remote Code Execution (975517)

    ·       Vulnerability ID –  MS09-051

    -       Vulnerabilities in Windows Media Runtime Could Allow Remote Code Execution (975682)

    ·       Vulnerability ID –  MS09-052

    -      Vulnerability in Windows Media Player Could Allow Remote Code Execution (974112)

    ·       Vulnerability ID –  MS09-053

    -      Vulnerabilities in FTP Service for Internet Information Services Could Allow Remote Code Execution (975254)

    ·       Vulnerability ID –  MS09-054

    -       Cumulative Security Update for Internet Explorer (974455)         

    ·       Vulnerability ID –  MS09-055

    -      Cumulative Security Update of ActiveX Kill Bits (973525)

    ·       Vulnerability ID –  MS09-056

    -      Vulnerabilities in Windows CryptoAPI Could Allow Spoofing (974571)

    ·       Vulnerability ID –  MS09-057

    -      Vulnerability in Indexing Service Could Allow Remote Code Execution (969059)

    ·       Vulnerability ID –  MS09-058

    -      Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (971486)

    ·       Vulnerability ID –  MS09-059

    -      Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service (975467)

    ·       Vulnerability ID –  MS09-060

    -      Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution (973965)

    ·       Vulnerability ID –  MS09-061

    -      Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (974378)

    ·       Vulnerability ID –  MS09-062

    -      Vulnerabilities in GDI+ Could Allow Remote Code Execution (957488)

     

     

    Changed Vulnerabilities

    ·          Malicious Software Removal Tool (Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents. You can run the tool from this Web page anytime or download it to your computer).

    - Reason:  Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents.

    ·          Vulnerability ID: MS04-007, MS06-053, MS07-022, MS07-040,MS08-015_ENU, MS08-052_ENU, MS08-052v2, MS08-064, MS08-076, MS09-032, MS09-034, 890830_INTLv3.5, MS07-040_VISTA_WIN2008, MS08-052_INTL, MS08-052_VISTA_WIN2008, MS08-064_VISTA_WIN2008,MS09-032_VISTA_WIN2008, MS09-034_VISTA_WIN2008

           - Reason:  Adding the supercedence information.

     

    New Patch Downloads

    ·          ndp1.0sp3-kb953295-x86-ocm-enu.-yuUVw.exe

    ·          ndp1.1sp1-kb953297-x86.-1IoQg.exe

    ·          ndp20sp1-kb953300-v2-x64._yyv1g.exe

    ·          ndp20sp1-kb953300-v2-x86.-_s_lg.exe

    ·          ndp20sp2-kb974417-x64.-hMMiQ.exe

    ·          ndp20sp2-kb974417-x86.-x4GMQ.exe

    ·          windows-kb890830-v3.0._PsFDw.exe

    ·          windows-kb890830-x64-v3.0.-b_zrQ.exe

    ·          windows2000-kb969059-x86-enu.-VBBPA.exe

    ·          windows2000-kb971486-x86-enu.-y70uA.exe

    ·          windows2000-kb974571-x86-enu.-Xv3Wg.exe

    ·          windows2000-kb975254-x86-enu.-ly53A.exe

    ·          windows2000-windowsmedia-kb954155-x86-enu.-cW3DQ.exe

    ·          windows2000-windowsmedia-kb975025-x86-enu.-_i3kA.exe

    ·          windows6.0-kb954155-x64._o0Krg.msu

    ·          windows6.0-kb954155-x64._PbaQQ.msu

    ·          windows6.0-kb954155-x86.-ZK0wA.msu

    ·          windows6.0-kb954155-x86._DMcyA.msu

    ·          windows6.0-kb971486-x64.-b4tkg.msu

    ·          windows6.0-kb971486-x64._zTM5w.msu

    ·          windows6.0-kb971486-x86.-2RyYg.msu

    ·          windows6.0-kb971486-x86._YpSow.msu

    ·          windows6.0-kb974291-x64._L3g1Q.msu

    ·          windows6.0-kb974291-x86._0beoQ.msu

    ·          windows6.0-kb974292-x64._TeWcw.msu

    ·          windows6.0-kb974292-x86._syoBw.msu

    ·          windows6.0-kb974467-x64._Ha-pQ.msu

    ·          windows6.0-kb974467-x86._42A0Q.msu

    ·          windows6.0-kb974468-x64._zE9SQ.msu

    ·          windows6.0-kb974468-x86._MoDPQ.msu

    ·          windows6.0-kb974469-x64.-zGstw.msu

    ·          windows6.0-kb974469-x86.-MqSww.msu

    ·          windows6.0-kb974470-x64._Msv5Q.msu

    ·          windows6.0-kb974470-x86._zARkQ.msu

    ·          windows6.0-kb974571-x64.--ob0g.msu

    ·          windows6.0-kb974571-x64.-Pn9Cw.msu

    ·          windows6.0-kb974571-x86._Br5iw.msu

    ·          windows6.0-kb974571-x86._DuTGA.msu

    ·          windows6.0-kb975254-x64.-Dq9IQ.msu

    ·          windows6.0-kb975254-x64._-wSLw.msu

    ·          windows6.0-kb975254-x86.-tSRhg.msu

    ·          windows6.0-kb975254-x86.__WSwg.msu

    ·          windows6.0-kb975467-x64.-daoAg.msu

    ·          windows6.0-kb975467-x64.-u6aDw.msu

    ·          windows6.0-kb975467-x86.-ewX8Q.msu

    ·          windows6.0-kb975467-x86._PVTBA.msu

    ·          windows6.0-kb975517-x64.-b65YQ.msu

    ·          windows6.0-kb975517-x64._FiDxg.msu

    ·          windows6.0-kb975517-x86.-h8cyw.msu

    ·          windows6.0-kb975517-x86.-J2Fmg.msu

    ·          windows6.1-kb974571-x64.-Z07CQ.msu

    ·          windows6.1-kb974571-x64._oisjA.msu

    ·          windows6.1-kb974571-x86.-ue9vg.msu

    ·          windows6.1-kb975467-x64._tr_MA.msu

    ·          windows6.1-kb975467-x64.__Zu7Q.msu

    ·          windows6.1-kb975467-x86.-j5tlA.msu

    ·          windowsmedia10-kb954155-x64-enu._A_xLQ.exe

    ·          windowsmedia11-kb954155-x64-enu._9Mr0w.exe

    ·          windowsmedia64-kb974112-x86-enu._4PGmQ.exe

    ·          windowsmedia9-kb969878-x64-enu.-hQtng.exe

    ·          windowsmedia9-kb969878-x86-enu.-4FIqg.exe

    ·          windowsserver2003-kb953298-x86-enu._1Vxyg.exe

    ·          windowsserver2003-kb954155-x86-enu.-zvhRg.exe

    ·          windowsserver2003-kb969059-x86-enu._b6NdQ.exe

    ·          windowsserver2003-kb971486-x86-enu._trf2w.exe

    ·          windowsserver2003-kb974112-x86-enu.-WwrTw.exe

    ·          windowsserver2003-kb974571-x86-enu._ANA6g.exe

    ·          windowsserver2003-kb975025-x86-enu.__cG9A.exe

    ·          windowsserver2003-kb975254-x86-enu.-K9hpw.exe

    ·          windowsserver2003-kb975467-x86-enu.-ipX-g.exe

    ·          windowsserver2003.windowsxp-kb954155-x64-enu.-K6bKA.exe

    ·          windowsserver2003.windowsxp-kb954155-x64-enu._57K7A.exe

    ·          windowsserver2003.windowsxp-kb969059-x64-enu.-pCICA.exe

    ·          windowsserver2003.windowsxp-kb969059-x64-enu.-XyY6Q.exe

    ·          windowsserver2003.windowsxp-kb971486-x64-enu._LVHcw.exe

    ·          windowsserver2003.windowsxp-kb971486-x64-enu._NkYWg.exe

    ·          windowsserver2003.windowsxp-kb974112-x64-enu.-54kkQ.exe

    ·          windowsserver2003.windowsxp-kb974112-x64-enu.-5T38g.exe

    ·          windowsserver2003.windowsxp-kb974571-x64-enu.-q4YTw.exe

    ·          windowsserver2003.windowsxp-kb974571-x64-enu.-s6WTg.exe

    ·          windowsserver2003.windowsxp-kb975025-x64-enu.-lUDng.exe

    ·          windowsserver2003.windowsxp-kb975254-x64-enu.-BzD4g.exe

    ·          windowsserver2003.windowsxp-kb975254-x64-enu.-p6Bgg.exe

    ·          windowsserver2003.windowsxp-kb975467-x64-enu.-wqgWQ.exe

    ·          windowsserver2003.windowsxp-kb975467-x64-enu.__FRkg.exe

    ·          windowsxp-kb969059-x86-enu._NT_-Q.exe

    ·          windowsxp-kb971486-x86-enu.-DnOZA.exe

    ·          windowsxp-kb974112-x86-enu.-jl2sw.exe

    ·          windowsxp-kb974571-x86-enu._v8dfw.exe

    ·          windowsxp-kb975025-x86-enu._v9WDg.exe

    ·          windowsxp-kb975254-x86-enu.-OE6KQ.exe

    ·          windowsxp-kb975467-x86-enu.-46xIA.exe

    ·          windowsxp-sp2-windowsmedia-kb954155-x86-enu.-egKuQ.exe

    ·          windowsxp-windowsmedia-kb954155-x86-enu._wqCkQ.exe

    ·          wm9codecs.-ggJ6g.exe

     

    Where to Send Feedback

    At LANDesk, we are constantly striving to improve our products and services and hope you find these changes reflective of our ongoing commitment to listen to you—our partners and customers—in providing the best possible solutions to meet your needs now and in the future.  Please continue to provide feedback by contacting our local support organization.

    Best regards,

    LANDesk Product Support

    Copyright © 2009 LANDesk Software.  All rights reserved. LANDesk is either a registered trademark or trademark of LANDesk Software, Ltd. or its affiliated entities in the United States and/or other countries. Other names or brands may be claimed as the property of others.

    Information in this document is provided for information purposes only.  The information presented here is subject to change without notice.  This information is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including any implied warranties and conditions of merchantability or fitness for a particular purpose. LANDesk disclaims any liability with respect to this document and LANDesk has no responsibility or liability for any third party products of any content contained on any site referenced herein.  This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. For the most current product information, please visit http://www.landesk.com/.