Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates several security
vulnerabilities in Microsoft(r) Windows NT(r) 4.0 and Windows(r)
2000. The vulnerabilities could allow a range of effects, from denial
of service attacks to, in some cases, privilege elevation.

Frequently asked questions regarding this vulnerability and the
patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-070.asp

Affected Software Versions
==========================
- Microsoft Windows NT 4.0 Workstation
- Microsoft Windows NT 4.0 Server
- Microsoft Windows NT 4.0 Server, Enterprise Edition
- Microsoft Windows NT 4.0 Server, Terminal Server Edition
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server

Patch Availability
==================
- Microsoft Windows NT 4.0 Workstation, Server, and Server,
Enterprise Edition:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24650
- Microsoft Windows NT 4.0 Server, Terminal Server Edition:
To be released shortly
- Microsoft Windows 2000 Professional, Server, Advanced Server,
and Datacenter Server:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24649

Note: The Windows NT 4.0 patch can be installed on systems running
Service Pack 6a, and will be included in Service Pack 7. The Windows
2000 patch can be installed on systems with or without Service Pack
1, and will be included in Service Pack 2.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows(r) 2000. The vulnerability
could allow a malicious user to gain complete control over an
affected machine.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-069.asp

Affected Software Versions
==========================
- Microsoft Windows 2000

Note: Only the Simplified Chinese version of Windows 2000 is affected
by default. Customers running any other language version of Windows
2000 only need to take action if they installed a Simplified Chinese
IME during system setup.

Patch Availability
==================
- Microsoft Windows 2000, Simplified Chinese version:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24631
- Microsoft Windows 2000, English version:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24627

Security 10918 Published by Philipp Esselbach 0

The Outlook:registered: 2000 SR-1 E-mail Security Update for the MultiLanguage Pack ensures that the Outlook 2000 SR-1 E-mail Security Update performs with complete functionality when you use an Office 2000 MultiLanguage Pack.

Note - For the Outlook 2000 SR-1 E-mail Security Update for the MultiLanguage Pack to work correctly, you must have installed the Office 2000 Service Release 1 (or Office 2000 Service Release 1a (SR-1a)), the Outlook 2000 SR-1 E-mail Security Update & the Office 2000 MultiLanguage Pack Service Release 1 for the language you are using.

Read more/Download

Security 10918 Published by Philipp Esselbach 0

MooSoft has posted a updated database for The Cleaner.

To update simply go to Start->Programs->The Cleaner->MooLive

Database v3169 09-29-2000
----------------------------
Added Keylog Trojan
Added Magic Horse

Updated InCommand
Updated MTX
Updated NetBus

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows Media Player (WMP) 7 but
primarily affects e-mail applications. The net effect of the
vulnerability is that it could enable a malicious user to create an
e-mail that, when closed after being read, could cause the e-mail
application to fail.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-068.asp

Affected Software Versions
===========================
- Microsoft Windows Media Player 7

Patch Availability
==================
- Microsoft Windows Media Player 7
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24421

Security 10918 Published by Philipp Esselbach 0

Symantec has released a new virus definitions update for Norton AntiVirus.

This update will work on the following products:

NAV for Lotus Notes (Intel)
NAV for MS Exchange (Intel)
NAV 4.0, 5.0 and 2000 for Win9x
NAV 4.0, 5.0 and 2000 for WinNT
NAV 2000 for Win2000
NAV for Firewalls
pcAnywhere32 7.5 and higher for WinNT
Norton Utilities for Windows 95/98 (all versions)
Norton SystemWorks (all versions)

Download

Security 10918 Published by Philipp Esselbach 0

Microsoft has updated the "Windows 2000 Telnet Client NTLM Authentication" Vulnerability Patch.

Summary
=======
On September 14, 2000, Microsoft released the original version of
this bulletin, which was revised the following day to advise of a
problem with the patch. On September 21, 2000, a new version of the
patch was released, and the bulletin was updated to advise of its
availability. Microsoft recommends that all customers, including
those who applied the original version of the patch, apply the new
version.

The patch eliminates a security vulnerability in the telnet client
that ships with Microsoft(r) Windows 2000. The vulnerability could,
under certain circumstances, allow a malicious user to obtain
cryptographically protected logon credentials from another user.

Frequently asked questions regarding this vulnerability and
the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-067.asp

Patch Availability
==================
- Microsoft Windows 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24399

Note: Customers who applied the original version of the patch should
consider applying the current version. The original version
eliminated the vulnerability; however, if a malicious user attempted
to exploit the vulnerability, the patch caused the Telnet client to
fail. The current version of the patch eliminates the vulnerability
without interfering with Telnet connections.

Note: This patch will also be included in the next Service Pack for
Windows 2000. It can be applied to computers with or without Service
Pack 1.

Security 10918 Published by Philipp Esselbach 0

Moosoft has updated their trojan definitions database for The Cleaner.

To update simply go to Start->Programs->The Cleaner->MooLive

Database v3161 09-19-2000
-------------------------
Added Cyber Takeover
Added Fuse
Added Happy2000
Added WinLoop
Added Zoory

Updated DTSE
Updated NetBus
Updated PsychWard
Updated Sockets de Troie
Updated SubSeven

Security 10918 Published by Philipp Esselbach 0

Microsoft has re-released this Bulletin to update important
information in the Patch Availability section.

Summary
=======
Microsoft has released a patch that eliminates a security
vulnerability in the telnet client that ships with Microsoft(r)
Windows 2000. The vulnerability could, under certain circumstances,
allow a malicious user to obtain cryptographically protected logon
credentials from another user.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-067.asp

Patch Availability
==================

- Microsoft Windows 2000:

Due to continuing operational issues with the Microsoft.com download
servers, the final patch for this issue was not uploaded to the
download servers. Instead, a beta version of the patch was made
available. This patch has subsequently been removed.

Those who have downloaded and applied the beta patch are protected
>from the vulnerability discussed in this Bulletin. The beta patch
will prompt users before passing NTLM credentials to the remote
server and
will only present NTLM credentials if approved by the user, as
discussed in the FAQ.

A bug exists in the beta patch wherein the telnet client may crash
while requesting an NTLM authentication session with a non-Windows
2000 NTLM enabled telnet server. At no time will NTLM credentials be
passed to the remote server if the user does not specifically choose
to send the credentials.

The correct version of the patch will uploaded to the download center
shortly. Users who have installed the beta patch can overwrite that
version with the soon to be released final version.

Users without the beta patch can perform the following workaround
until such time as the final patch can be made available.

To disable NTLM authentication, perform the following steps:

- Type ´telnet´ at the command prompt.
- Type ´unset ntlm´ and hit Enter.
- Type ´quit´ to exit telnet and save your preferences.

To determine what form of authentication you are currently using,
perform the following steps:
- Type ´telnet´ at a command prompt.
- Type ´display´ at the telnet prompt.
- A value of ´Will Auth (NTLM Authentication)´ means telnet will
use NTLM authentication by default.
- A value of ´Not Auth (NTLM Authentication)´ means telnet will
not use NTLM authentication.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in the telnet client that ships with Microsoft(r)
Windows 2000. The vulnerability could, under certain circumstances,
allow a malicious user to obtain cryptographically protected logon
credentials from another user.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-067.asp

Affected Software Versions
==========================
- Microsoft Windows 2000

Patch Availability
==================

- Microsoft Windows 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24319

Note: The above URL may not be accessible.
If this is the case, please download the patch from
here.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security vulnerability in Microsoft(r) Windows 2000. The vulnerability could allow a malicious user to cause a Denial of Service on a Windows 2000 computer.

Frequently asked questions regarding this vulnerability and the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-066.asp

Affected Software Versions
===========================
- Microsoft Windows 2000 All Versions

Note: Microsoft Windows NT 4.0 is not affected by this vulnerability.

Patch Availability
==================
Microsoft Windows 2000:
- http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24229

- This patch will also be included in the next Service Pack for Windows 2000 -- it can be applied to a computer with or without Service Pack 1.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows 2000. The vulnerability could
allow a user logged onto a Windows 2000 machine from the keyboard to
become an administrator on the machine.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-065.asp

Affected Software Versions
==========================
- Microsoft Windows 2000

Patch Availability
==================
- Microsoft Windows 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24200

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows Media(tm) Services. The
vulnerability could allow a malicious user to prevent an affected
server from providing useful service.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-064.asp

Affected Software Versions
==========================
- Microsoft Windows Media Services 4.0
- Microsoft Windows Media Services 4.1

Patch Availability
==================
- Microsoft Windows Media Services 4.1:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=24167