Microsoft Security Patches July 2009

Martin Brinkmann
Jul 15, 2009
Updated • Feb 12, 2013
Windows, Windows Updates
|
5

Microsoft has released the Security Bulletin Summary for July 2009 which contains security patches for several Microsoft products. Six security patches are provided by Microsoft this time that include three rated critical and three rated important. Affected programs are Microsoft Windows, Microsoft Office, Microsoft ISA Server, Virtual PC and Virtual Server. Affected operating systems are pretty much all from Windows 2000 onwards although the severity rating varies depending on the operating system.

Critical ratings for Windows XP or Windows Server 2003 are usually important or moderate ratings for Windows Vista or Windows Server 2008 thanks to the increased security in those operating systems. Downloads are already available from various official sources including Automatic Updates, Windows Update or Microsoft Update.

  • MS09-028 - Vulnerabilities in the Embedded OpenType Font Engine Could Allow Remote Code Execution (961371) - This security update resolves two privately reported vulnerabilities in the Microsoft Windows component, Embedded OpenType (EOT) Font Engine. The vulnerabilities could allow remote code execution. An attacker who successfully exploited either of these vulnerabilities could take complete control of an affected system remotely. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • MS09-029 - Vulnerabilities in Microsoft DirectShow Could Allow Remote Code Execution (971633) - This security update resolves one publicly disclosed vulnerability and two privately reported vulnerabilities in Microsoft DirectShow. The vulnerabilities could allow remote code execution if a user opened a specially crafted QuickTime media file. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • MS09-030 - Cumulative Security Update of ActiveX Kill Bits (973346) - This security update resolves a privately reported vulnerability that is currently being exploited. The vulnerability in Microsoft Video ActiveX Control could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control. This ActiveX control was never intended to be instantiated in Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
  • MS09-031 - Vulnerability in Virtual PC and Virtual Server Could Allow Elevation of Privilege (969856) - This security update resolves a privately reported vulnerability in Microsoft Virtual PC and Microsoft Virtual Server. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected guest operating system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
  • MS09-032 -Vulnerability in Microsoft ISA Server 2006 Could Cause Elevation of Privilege (970953) - This security update resolves a privately reported vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2006. The vulnerability could allow elevation of privilege if an attacker successfully impersonates an administrative user account for an ISA server that is configured for Radius One Time Password (OTP) authentication and authentication delegation with Kerberos Constrained Delegation.
  • MS09-033 - Vulnerability in Microsoft Office Publisher Could Allow Remote Code Execution (969516) - This security update resolves a privately reported vulnerability in Microsoft Office Publisher that could allow remote code execution if a user opens a specially crafted Publisher file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

It is recommended to install the Microsoft Security Patches as soon as possible to close the security vulnerabilities.

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. Logic Computer Repair Falkirk said on July 20, 2009 at 6:59 pm
    Reply

    ms vista may be a more suecure system due to the prompts before any changes are executed however this is really annoying and I’m very happy to hear that in wondows 7 you can adjust the sensitivity of this feature or turn it off completely

  2. Kieran88 said on July 16, 2009 at 7:21 am
    Reply

    Go on this website

  3. Jojo said on July 15, 2009 at 10:18 pm
    Reply

    Everyone should read this article:
    http://windowssecrets.com/2009/07/02/02-Its-confirmed-Windows-may-update-unexpectedly

    I and many others have this problem with Windows updates where the update icon doe snot show in the tray and there is no apparent notice that there are updates to be applied UNTIL you reboot. Then you will see a little icon and note under “Turn Computer Off”.

  4. paulus said on July 15, 2009 at 4:23 pm
    Reply

    Again Martin a really great, ferry informative, very pleasant to read and very useful links, Microsoft update article. I hope you find the time for this tradition to continue.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.