Patch Name | Windows6.0-2008-KB967723-x64.msu | ||||||||||||||||||||||||||
Patch Description | Security Update for Windows Server 2008 x64 Edition (KB967723) | ||||||||||||||||||||||||||
Bulletin Id | MS09-048 | ||||||||||||||||||||||||||
Bulletin Title | Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723) | ||||||||||||||||||||||||||
Severity | Critical | ||||||||||||||||||||||||||
Location Path | Windows6.0-2008-KB967723-x64.msu | ||||||||||||||||||||||||||
Bulletin Summary | The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed. | ||||||||||||||||||||||||||
Superceding Bulletin Id | None | ||||||||||||||||||||||||||
Patch Release Date | Sep 8, 2009 | ||||||||||||||||||||||||||
Affected Product Information
|
Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.