[262] in Security FYI

home help back first fref pref prev next nref lref last post

[Security-fyi]

daemon@ATHENA.MIT.EDU (Tim McGovern)
Fri Dec 3 09:31:22 2004

Mime-Version: 1.0 (Apple Message framework v619)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <3834ABA4-44A9-11D9-B88B-000A95ABC792@mit.edu>
Content-Transfer-Encoding: 7bit
From: Tim McGovern <tjm@mit.edu>
Date: Thu, 2 Dec 2004 16:29:16 -0500
To: I/T Security FYI List <security-fyi@mit.edu>
cc: itss@mit.edu
Errors-To: security-fyi-bounces@mit.edu

Colleagues,

IS&T's I/T Security Support is notifying the community of a security 
problem affecting the users of Microsoft Windows computers.

On December 1, 2004, Microsoft announced a fix for a major problem in 
one or more Windows operating systems supported by MIT.  The specific 
vulnerability is contained within the Internet Explorer portion of the 
Windows operating system.  This problem is identified as Microsoft 
Bulletin MS04-040 
(http://www.microsoft.com/technet/security/bulletin/MS04-040.mspx).  
This problem gives someone the ability to break into, and use, your 
computer for their own purposes.  If that happens your personal, 
sensitive or other data may be revealed or destroyed.  It may also 
result in your computer being used to break into other computers here 
at MIT or elsewhere.

We suggest that the fix be applied to all of your affected Microsoft 
Windows systems immediately unless your local system administrator -- 
the person who maintains your computer's software -- has instructed you 
to do otherwise.  Please take the steps recommended below according to 
the version of Windows you are running.

Microsoft Windows XP Service Pack 2     Take no action --- 
vulnerability does not exist

Microsoft Windows XP Service Pack 1     Either upgrade to Windows XP 
Service Pack 2
                                         Or apply update provided by 
Microsoft

Microsoft Windows 2000 (all levels)     Either upgrade to Windows XP 
Service Pack 2
                                         Or apply update provided by 
Microsoft

Other unsupported versions of           Refer to the Microsoft Bulletin 
referenced above.
Microsoft Windows

The very best first line of defense against vulnerabilities is to take 
Microsoft patches automatically whenever feasible.  We want to thank 
everyone who already uses Microsoft's Automatic Update service 
(http://windowsupdate.microsoft.com/) or MIT's local Windows Update 
Service (http://waus.mit.edu/), and if you already use one of these 
services, the patch has likely already been installed on your machine.

For further assistance, please contact IS&T I/T Security Support at 
<security@mit.edu>, or the IS&T Computing Help Desk at x3-1101 or 
<computing-help@mit.edu>.

Tim McGovern
Manager, I/T Security Support
Client Support Services
Information Services & Technology
Massachusetts Institute of Technology
77 Massachusetts Ave. Room N42-040k
Cambridge MA 02139-4307
(617) 253-0505

_______________________________________________
Security-fyi mailing list
Security-fyi@mit.edu
http://mailman.mit.edu/mailman/listinfo/security-fyi

home help back first fref pref prev next nref lref last post