February 2009 Monthly Bulletin Release



Today we’re releasing four new security bulletins as part of our regular monthly release process. 


·         MS09-002 rated Critical that addresses two code execution vulnerabilities in Internet Explorer.


·         MS09-003 rated Critical that addresses one code execution vulnerability and one denial of service vulnerability in Exchange Server.


·         MS09-004 rated Important that addresses one code execution vulnerability in SQL Server.


·         MS09-005 rated Important that addresses three code execution vulnerabilities in Visio.


 


We’re also releasing Microsoft Security Advisory 960715 that announces the release of a new cumulative update for killbits on third-party ActiveX controls.


 


This month’s edition of the Microsoft Windows Malicious Software Removal Tool (MSRT) adds the ability to remove the Win32/Srizbi family of trojans.  Again this month, our colleagues over at the Microsoft Malware Protection Center (MMPC) have information on this month’s MSRT addition on their weblog.


 


As always, I want to encourage you to register for our regular, monthly TechNet Webcast for this month’s bulletin release. We’ll be broadcasting live on Wednesday February 11, 2009 at 11:00 AM Pacific Time. If you can’t join us then, remember you can always view the webcast later, on-demand.  You can register for the webcast here.


 


Thanks


Christopher


*This posting is provided “AS IS” with no warranties, and confers no rights*


Comments (5)

  1. Anonymous says:

    Quatre bulletins de sécurité ont été publiés ce soir, dont deux critiques. Synthèse en français Synthèse

  2. Anonymous says:

    I just saw that the folks over on the MSRC blog just posted the info for the February security bulleting

  3. Anonymous says:

    I just saw that the folks over on the MSRC blog just posted the info for the February security bulleting

  4. Anonymous says:

    Here in Holland, just a few days before the big move to the US, there’s still some time left to update

  5. Anonymous says:

    Aggiornato il 12/02/2008 ore 10:30 Risorse di riferimento: Detection and Deployment Guidance for Microsoft