-----BEGIN PGP SIGNED MESSAGE-----<br />Hash: SHA1<br /><br />********************************************************************<br />Title: Microsoft Security Bulletin Summary for January 2005<br />Issued: January, 2005<br />Version Number: 1.0<br />Bulletin: http://go.microsoft.com/fwlink/?LinkId=40943<br />*******************************************************************<br /><br />Summary:<br />========<br />This advisory contains information about all security updates<br />released this month. It is broken down by security bulletin severity.<br /><br />Critical Security Bulletins<br />===========================<br /><br /> MS05-001 - Vulnerability in HTML Help Could Allow Remote Code<br /> Execution (890175)<br /><br /> - Affected Software: - Windows 2000 Service Pack 3<br /> - Windows 2000 Service Pack 4 - Windows XP Service Pack 1<br /> - Windows XP Service Pack 2<br /> - Windows XP 64-Bit Edition Service Pack 1<br /> - Windows XP 64-Bit Edition Version 2003<br /> - Windows Server 2003<br /> - Windows Server 2003 64-Bit Edition<br /><br /> - Affected Components: - Internet Explorer 6.0 Service Pack 1 when<br /> installed on Windows NT Server 4.0<br /> Service Pack 6a or Windows NT Server 4.0 Terminal Server Edition Service Pack 6<br /> - Review the FAQ section of bulletin MS05-O01 for<br /> information about these operating systems:<br /> - Microsoft Windows 98<br /> - Microsoft Windows 98 Second Edition (SE)<br /> - Microsoft Windows Millennium Edition (ME)<br /><br /> - Impact: Remote Code Execution<br /> - Version Number: 1.0 <br /> MS05-002 - Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)<br /><br /> - Affected Software:<br /> - Windows NT Server 4.0 Service Pack 6a<br /> - Windows NT Server 4.0 Terminal Server Edition<br /> Service Pack 6<br /> - Windows 2000 Service Pack 3<br /> - Windows 2000 Service Pack 4 - Windows XP Service Pack 1<br /> - Windows XP 64-Bit Edition Service Pack 1<br /> - Windows XP 64-Bit Edition Version 2003<br /> - Windows Server 2003<br /> - Windows Server 2003 64-Bit Edition<br /><br /> - Review the FAQ section of bulletin MS05-O02 for<br /> information about these operating systems:<br /> - Microsoft Windows 98<br /> - Microsoft Windows 98 Second Edition (SE)<br /> - Microsoft Windows Millennium Edition (ME)<br /><br /> - Impact: Remote Code Execution<br /> - Version Number: 1.0 <br />Important Security Bulletins<br />============================<br /><br /> MS05-003 - Vulnerability in Indexing Service Could Allow Remote Code Execution (871250)<br /><br /> - Affected Software: - Windows 2000 Service Pack 3<br /> - Windows 2000 Service Pack 4 - Windows XP Service Pack 1<br /> - Windows XP 64-Bit Edition Service Pack 1<br /> - Windows XP 64-Bit Edition Version 2003<br /> - Windows Server 2003<br /> - Windows Server 2003 64-Bit Edition<br /><br /> - Impact: Remote Code Execution<br /> - Version Number: 1.0<br /><br />Update Availability:<br />===================<br />Updates are available to address these issues.<br />For additional information, including Technical Details,<br />Workarounds, answers to Frequently Asked Questions,<br />and Update Deployment Information please read<br />the Microsoft Security Bulletin Summary for this<br />month at: http://go.microsoft.com/fwlink/?LinkId=40943<br /><br />Support:<br />========<br />Technical support is available from Microsoft Product Support<br />Services at 1-866-PC SAFETY (1-866-727-2338). There is no<br />charge for support calls associated with security updates.<br />International customers can get support from their local Microsoft<br />subsidiaries. Phone numbers for international support can be found<br />at: http://support.microsoft.com/common/international.aspx<br /><br />Additional Resources:<br />=====================<br />* Microsoft has created a free monthly e-mail newsletter containing<br /> valuable information to help you protect your network. This<br /> newsletter provides practical security tips, topical security<br /> guidance, useful resources and links, pointers to helpful<br /> community resources, and a forum for you to provide feedback<br /> and ask security-related questions.<br /> You can sign up for the newsletter at:<br /><br /> http://www.microsoft.com/technet/security/secnews/default.mspx<br /><br />* Microsoft has created a free e-mail notification service that<br /> serves as a supplement to the Security Notification Service<br /> (this e-mail). It provides timely notification of any minor<br /> changes or revisions to previously released Microsoft Security<br /> Bulletins. This new service provides notifications that are<br /> written for IT professionals and contain technical information<br /> about the revisions to security bulletins.<br /> Visit http://www.microsoft.com to subscribe to this service:<br /><br /> - Click on Subscribe at the top of the page.<br /> - This will direct you via Passport to the Subscription center.<br /> - Under Newsletter Subscriptions you can sign up for the<br /> "Microsoft Security Notification Service: Comprehensive Version".<br /><br />* Join Microsoft's webcast for a live discussion of the technical<br /> details of these security bulletins and steps you can take<br /> to protect your environment. Details about the live webcast<br /> can be found at: <br /> www.microsoft.com/technet/security/bulletin/summary.mspx<br /><br /> The on-demand version of the webcast will be available 24 hours<br /> after the live webcast at:<br /><br /> www.microsoft.com/technet/security/bulletin/summary.mspx<br /><br />* Protect your PC: Microsoft has provided information on how you<br /> can help protect your PC at the following locations:<br /><br /> http://www.microsoft.com/security/protect/<br /><br /> If you receive an e-mail that claims to be distributing a<br /> Microsoft security update, it is a hoax that may be distributing a<br /> virus. Microsoft does not distribute security updates through<br /> e-mail. You can learn more about Microsoft's software distribution<br /> policies here:<br /> <br />http://www.microsoft.com/technet/security/topics/policy/swdist.mspx<br /><br />Acknowledgments:<br />================<br />Microsoft thanks the following for working with us to protect<br />customers:<br /><br />- - eEye (http://www.eeye.com)<br /> for reporting the issue described in MS05-002.<br /><br />********************************************************************<br />THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS<br />PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT<br />DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING<br />THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR<br />PURPOSE.<br />IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE<br />LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,<br />INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL<br />DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN<br />ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.<br />SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY<br />FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING<br />LIMITATION MAY NOT APPLY.<br />********************************************************************<br /><br /><br />-----BEGIN PGP SIGNATURE-----<br />Version: PGP 8.1<br /><br />iQIVAwUBQeQaBYreEgaqVbxmAQLvzQ//U9/MsYd34ZlgfLXqzduIQRml2SCM/FKd<br />ir7VAXNJZnK056dcB4R2Ev9rZoBOqU/G8QbE0oV85K1nnWvbgsKcQd/utN092Gw2<br />vUrwhGhRbcjBhQGB7Y4WaBpvJOF8Vbib69XbnxzJ+VEy11ResRpkKaJRKxTkqQl0<br />7nWUxg5H18B3Cxosz0GszJm4/Lpj36Ws8GmkFo1AFa8mERJMnbWa66r4m6TzgXGO<br />U9y7zvGUR21x7PksGbPIa5abOnLSm+onaIUkVxRkiYUz66GTNmFlWadi5MOO1HKE<br />iXXYymmBrYTXR/3Ztp73LmGpmfPlNfk5XO03yZ0091dbsvp3WtaDxSUiDvNbfntl<br />ZcsQVaJLPK0jWWK8PaBK2r2/oWk87D1tJiQ88S5pQOZ04H2psXET50mcw/IiCEa0<br />Kr1wnncnKp0cPuHvdAH1TiFJ5909pQIioJ2N5mbY1oKQT5DGga1WThDzkNEPYkYD<br />rT4EeVGZR/aTOX2/VFn4jFn7w3UlANJJhoJpHO6KmUo2Np3DJhx/gLIXZtHkQTsy<br />voEsiINah5C3SYGyeR2EJQfaXQz+sg+LNiiIbOfb0Uf8bi7Cre3osGh7nkew54Qg<br />h+mbwOD2VzTroVTJNzjrIvxadUBKUaTX0AaJ9Ulnuly1NBnAqbefSXt+ebydtv4n<br />rwQ/SmZ/LvQ=<br />=2c19<br />-----END PGP SIGNATURE-----<br />To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at the Microsoft.com web site <http://www.microsoft.com/misc/unsubscribe.htm>. You can manage all your Microsoft.com communication preferences at this site.<br /><br />Legal Information <http://www.microsoft.com/info/legalinfo/default.mspx>.<br /><br />This newsletter was sent by the Microsoft Corporation<br />1 Microsoft Way<br />Redmond, Washington, USA<br />98052