Four Microsoft Security Updates!

Published by

Microsoft has released a couple of new security updates for several of their products. If you want to find out if you need or want to download any of them click on read more.

SQL Server Remote Data Source Function Contain Unchecked Buffers: Who should read this bulletin: Database administrators using Microsoft® SQL Server?. Impact of vulnerability: Run code of attacker?s choice on server Maximum Severity Rating: Moderate Recommendation: Apply the SQL Server patch immediately to affected systems Affected Software: Microsoft SQL Server 7.0 Microsoft SQL Server 2000 A patch is already available for download. XMLHTTP Control Can Allow Access to Local Files: Who should read this bulletin: Customers using Microsoft® XML Core Services 2.6 and later. This includes customers using Microsoft Windows® XP, SQL Server? 2000, and Internet Explorer 6.0. Impact of vulnerability: Information disclosure Maximum Severity Rating: Critical Recommendation: Customers and system administrators should apply the patch to all affected machines immediately. Affected Software: Microsoft XML Core Services versions 2.6, 3.0, and 4.0 An affected version of Microsoft XML Core Services also ships as part of the following products: Microsoft Windows XP Microsoft Internet Explorer 6.0 Microsoft SQL Server 2000 A patch is already available for download. Incorrect VBScript Handling in IE can Allow Web Pages to Read Local Files: Who should read this bulletin: Customers using Microsoft® Internet Explorer. Impact of vulnerability: Information Disclosure Maximum Severity Rating: Critical Recommendation: Customers using IE should apply the patch. Affected Software: Microsoft Internet Explorer 5.01 Microsoft Internet Explorer 5.5 Microsoft Internet Explorer 6.0 A patch is already available for download. Unchecked Buffer in ISAPI Filter Could Allow Commerce Server Compromise: Who should read this bulletin: System administrators using Microsoft® Commerce Server 2000 Impact of vulnerability: Run code of attacker?s choice. Maximum Severity Rating: Critical Recommendation: System administrators should install the patch immediately. Affected Software: Microsoft Commerce Server 2000 A patch is already available for download.