A quick information guide to what you're going to patch if you haven't already done so

Feb 15, 2006 09:30 GMT  ·  By

Here's a quick recap of the Security Updates released in yesterday's Patch:

MS06-004: Cumulative Security Update for Internet Explorer (910620) Critical A vulnerability exists in the Graphics Rendering Engine that could allow remote code execution.

MS06-005: A vulnerability in Windows Media Player Could Allow Remote Code Execution (911565) Critical A vulnerability exists in the way that Windows Media Player processes certain files that could allow remote code execution.

MS06-006: A vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution (911564) Important A remote code execution vulnerability exists in the Windows Media Player plug-in for non-Microsoft Internet browsers that can allow remote code execution.

MS06-007: A vulnerability in TCP/IP Could Allow Denial of Service (913446) Important A vulnerability exists that could allow an attacker to send a specially crafted IGMP that could cause an affected system to stop responding.

MS06-008: A vulnerability in Web Client Service Could Allow Remote Code Execution (911927) Important A vulnerability exists in the Windows Web Client Service that could allow an attacker to take complete control of an affected system. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.

MS06-009: A vulnerability in the Korean Input Method Editor Could Allow Elevation of Privilege (901190) Important A vulnerability exists in the Windows and Office Korean Input Method Editor that could allow an attacker to take complete control of an affected system. For an attack to be successful an attacker must be able to interactively log on to the affected system.

MS06-010: A vulnerability in PowerPoint 2000 Could Allow Information Disclosure (889167) Important Avulnerability exists PowerPoint that could allow information disclosure.

You can get more information directly from the Microsoft bulletin.