Microsoft Security Bulletin Summary for December 2008
Published: | Updated:
This bulletin summary lists security bulletins released for December 2008.
With the release of the bulletins for December 2008, this bulletin summary replaces the bulletin advance notification originally issued December 4, 2008. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.
For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications.
Microsoft is hosting a webcast to address customer questions on these bulletins on December 10, 2008, at 11:00 AM Pacific Time (US & Canada). Register now for the December Security Bulletin Webcast. After this date, this webcast is available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.
For the out-of-band security bulletin added to Version 3.0 of this bulletin summary, MS08-078, Microsoft is hosting two webcasts to address customer questions on these bulletins: on December 17, 2008, at 1:00 PM Pacific Time (US & Canada) and December 18, 2008, at 11:00 AM Pacific Time. Register now for the December 17 webcast and the December 18 webcast. Afterwards, these webcasts are available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.
Microsoft also provides information to help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates. Please see the section, Other Information.
Microsoft has released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.
For information about non-security releases on Windows Update and Microsoft Update, please see:
- Microsoft Knowledge Base Article 894199: Description of Software Update Services and Windows Server Update Services changes in content for 2008. Includes all Windows content.
- New, Revised, and Released Updates for Microsoft Products Other Than Microsoft Windows.
To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.
Update Management Strategies
Security Guidance for Update Management provides additional information about Microsoft’s best-practice recommendations for applying security updates.
Obtaining Other Security Updates
Updates for other security issues are available from the following locations:
- Security updates are available from Microsoft Download Center. You can find them most easily by doing a keyword search for "security update".
- Updates for consumer platforms are available from Microsoft Update.
- You can obtain the security updates offered this month on Windows Update, from Download Center on Security and Critical Releases ISO CD Image files. For more information, see Microsoft Knowledge Base Article 913086.
IT Pro Security Community
Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics in IT Pro Security Community.
Microsoft thanks the following for working with us to help protect customers:
- ADLab of VenusTech for reporting several issues described in MS08-070
- Jason Medeiros of Affiliated Computer Services for reporting an issue described in MS08-070
- Carsten Eiram of Secunia Research for reporting an issue described in MS08-070
- Mark Dowd, working with McAfee Avert Labs, for reporting an issue described in MS08-070
- Brett Moore of Insomnia Security for reporting an issue described in MS08-070
- CHkr_D591, working with TippingPoint and Zero Day Initiative, for reporting an issue described in MS08-070
- Michal Bucko, working with CERT/CC, for reporting an issue described in MS08-070
- Symantec’s Security Intelligence Analysis Team for working with us on an issue described in MS08-070
- Jun Mao of Verisign iDefense Labs for reporting an issue described in MS08-071
- Juan Caballero, working with Bitblaze group at Carnegie Mellon University and UC Berkeley, for reporting an issue described in MS08-071
- Ricardo Narvaja of Core Security Technologies for reporting an issue described in MS08-072
- Dyon Balding of Secunia Research for reporting an issue described in MS08-072
- Yamata Li of Palo Alto Networks for reporting an issue described in MS08-072
- Wushi, working with TippingPoint and the Zero Day Initiative, for reporting an issue described in MS08-072
- Aaron Portnoy of TippingPoint DVLabs for reporting issues described in MS08-072
- Wushi of team509, working with Zero Day Initiative, for reporting an issue described in MS08-072
- Wushi and Ling, working with TippingPoint and the Zero Day Initiative, for reporting an issue described in MS08-072
- Carlo Di Dato (aka shinnai) for reporting an issue described in MS08-073
- Brett Moore, working with TippingPoint and the Zero Day Initiative, for reporting an issue described in MS08-073
- Chris Weber of Casaba Security for reporting an issue described in MS08-073
- Jun Mao of Verisign iDefense Labs for reporting an issue described in MS08-073
- Joshua J. Drake of Verisign iDefense Labs for reporting an issue described in MS08-074
- Claes M Nyberg of signedness.org for reporting an issue described in MS08-074
- Dyon Balding of Secunia for reporting an issue described in MS08-074
- Andre Protas of eEye Digital Security for reporting an issue described in MS08-075
- Nate McFeters for reporting an issue described in MS08-075
- An anonymous finder for reporting an issue described in MS08-077
- The affected software listed have been tested to determine which versions are affected. Other versions are past their support life cycle. To determine the support life cycle for your software version, visit Microsoft Support Lifecycle.
- Customers in the U.S. and Canada can receive technical support from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates.
- International customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit International Help and Support.
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
- V1.0 (December 9, 2008): Bulletin summary published.
- V2.0 (December 10, 2008): Corrected affected software for MS08-076 to list Windows Media Format Runtime 9.5 and Windows Media Format Runtime 11 as separate updates on Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2. Also removed erroneous references to Windows Media Format Runtime 11 x64 Edition on Windows XP Professional x64 Edition, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 x64 Edition, and Windows Server 2003 x64 Edition Service Pack 2 for MS08-076.
- V3.0 (December 17, 2008): Added Microsoft Security Bulletin MS08-078, Security Update for Internet Explorer (960714). Also added the bulletin webcast links for this out-of-band security bulletin.
- V3.1 (December 18, 2008): For MS08-078, added unaffected server core notation for Windows Internet Explorer 7 in Windows Server 2008 for 32-bit Systems and in Windows Server 2008 for x64-based Systems.
- V3.2 (January 7, 2009): Removed Microsoft Office Word Viewer 2003 from affected software for MS08-072.
- V4.0 (January 13, 2009): Microsoft has re-released MS08-076 to offer new update packages for Windows Media Format Runtime 9.5 on Windows XP Service Pack 2 (KB952069) and on Windows XP Service Pack 3 (KB952069). Customers running all other supported and affected versions of Windows Media components who have already applied the original MS08-076 security update packages do not need to take any further action. Also, listed Windows Media Player 6.4 and Windows Media Services 4.1 as affected on all editions of Microsoft Windows 2000 Service Pack 4 for MS08-076; customers who were offered but have not applied this update, KB954600 for Windows Media Player 6.4, or KB952068 for Windows Media Services 4.1, need to do so. Finally, listed Microsoft Office Word Viewer as affected for MS08-072; customers who have successfully installed security update KB956366 do not need to reinstall.
- V5.0 (January 28, 2009): Added a footnote for MS08-074 in the Affected Software table, pertaining to security update packages KB958437 and KB958439 for supported versions of Microsoft Office Excel 2007. There were no changes to the security update binaries or detection. Customers with Microsoft Office Excel 2007 or Microsoft Office Excel 2007 Service Pack 1 who have already successfully installed KB958437 and KB958439 do not need to reinstall.
- V6.0 (April 29, 2009): Added Windows Media Services 2008 (KB952068) on 32-bit and x64-based editions of Windows Server 2008 Service Pack 2 as affected software for MS08-076. This is a detection change only; there were no changes to the binaries. Customers who have already successfully installed KB952068 do not need to reinstall.