Microsoft Security Bulletin Summary for July 2009
Published: | Updated:
This bulletin summary lists security bulletins released for July 2009.
With the release of the bulletins for July 2009, this bulletin summary replaces the bulletin advance notification originally issued July 9, 2009, and the out-of-band bulletin advance notification originally issued July 24, 2009. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.
For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications.
Microsoft hosted a webcast to address customer questions on the regularly scheduled bulletins on July 15, 2009, at 11:00 AM Pacific Time (US & Canada). This webcast is now available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.
For the out-of-band security bulletins added to Version 2.0 of this bulletin summary, MS09-034 and MS09-035, Microsoft is hosting two webcasts to address customer questions on these bulletins on July 28, 2009, at 1:00 PM Pacific Time (US & Canada) and at 4:00 PM Pacific Time (US & Canada). Register now for the July 28, 1:00 PM Webcast and the July 28, 4:00 PM Webcast. Afterwards, these webcasts are available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.
Microsoft also provides information to help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates. Please see the section, Other Information.
Microsoft has released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.
For information about non-security releases on Windows Update and Microsoft Update, please see:
- Microsoft Knowledge Base Article 894199: Description of Software Update Services and Windows Server Update Services changes in content. Includes all Windows content.
- New, Revised, and Released Updates for Microsoft Products Other Than Microsoft Windows.
To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.
Update Management Strategies
Security Guidance for Update Management provides additional information about Microsoft’s best-practice recommendations for applying security updates.
Obtaining Other Security Updates
Updates for other security issues are available from the following locations:
- Security updates are available from Microsoft Download Center. You can find them most easily by doing a keyword search for "security update".
- Updates for consumer platforms are available from Microsoft Update.
- You can obtain the security updates offered this month on Windows Update, from Download Center on Security and Critical Releases ISO CD Image files. For more information, see Microsoft Knowledge Base Article 913086.
IT Pro Security Community
Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics in IT Pro Security Community.
Microsoft thanks the following for working with us to help protect customers:
- Thomas Garnier of SkyRecon and Zheng Wenbin, Liu Qi, and Song Shenlei of Qihoo 360 Security Center for reporting an issue described in MS09-028
- Yamata Li of Palo Alto Networks for reporting an issue described in MS09-028
- Aaron Portnoy of TippingPoint DVLabs and an anonymous researcher working with TippingPoint's Zero Day Initiative, Thomas Garnier of SkyRecon, and Yamata Li of Palo Alto Networks for reporting an issue described in MS09-028
- VeriSign iDefense Labs for reporting an issue described in MS09-029
- Tavis Ormandy of Google Inc. for reporting an issue described in MS09-029
- Thomas Garnier for reporting an issue described in MS09-029
- Lionel d'Hauenens of Labo Skopia, working with VeriSign iDefense Labs, for reporting an issue described in MS09-030
- Ryan Smith and Alex Wheeler of IBM IIS X-Force for initially reporting an issue described in MS09-032
- Julien Tinnes and Tavis Ormandy of Google Inc. for reporting an issue described in MS09-033
- Peter Vreugdenhil of VeriSign iDefense Labs for reporting an issue described in MS09-034
- Wushi and Ling of team509, working with TippingPoint and the Zero Day Initiative, for reporting an issue described in MS09-034
- Peter Vreugdenhil, working with TippingPoint and the Zero Day Initiative, for reporting an issue described in MS09-034
- David Dewey of IBM ISS X-Force, for reporting an issue described in MS09-035
- Ryan Smith of VeriSign iDefense Labs, for reporting two issues described in MS09-035
- The affected software listed have been tested to determine which versions are affected. Other versions are past their support life cycle. To determine the support life cycle for your software version, visit Microsoft Support Lifecycle.
- Customers in the U.S. and Canada can receive technical support from Security Support or 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. For more information about available support options, see Microsoft Help and Support.
- International customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit International Help and Support.
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
- V1.0 (July 14, 2009): Bulletin Summary published.
- V1.1 (July 15, 2009): Updated Executive Summary for MS09-032; corrected restart requirement for MS09-029; and performed miscellaneous edits.
- V2.0 (July 28, 2009): Added Microsoft Security Bulletins MS09-034, Cumulative Security Update for Internet Explorer (972260), and MS09-035, Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution (969706). Also added the bulletin webcast links for these out-of-band security bulletins.
- V3.0 (August 4, 2009): Revised to announce the reissue of the update for Microsoft Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4. All customers who have already installed the original update for Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 are already protected. However, customers who have the Korean-language version of Internet Explorer 6 Service Pack 1 may reinstall the update for Internet Explorer 6 Service Pack 1 on their Windows 2000 systems in order to have the same protections and also resolve a printing issue. See Microsoft Security Bulletin MS09-034.
- V4.0 (August 11, 2009): Revised to announce the rerelease of MS09-035. MS09-035 was rereleased to offer new updates for Microsoft Visual Studio 2005 Service Pack 1 (KB973673), Microsoft Visual Studio 2008 (KB973674), and Microsoft Visual Studio 2008 Service Pack 1 (KB973675), for developers who use Visual Studio to create components and controls for mobile applications using ATL for Smart Devices.
- V4.1 (August 13, 2009): Corrected restart requirement for MS09-035.
- V5.0 (August 19, 2009): Added footnote for bulletin MS09-028 to clarify the affected software for DirectX 8.1.
- V6.0 (August 25, 2009): Revised to announce the rerelease of the Japanese-language update for Windows XP Service Pack 2, Windows XP Service Pack 3, and Windows XP Professional x64 Edition Service Pack 2. All customers who have already installed the original update are already protected. However, customers who have the Japanese-language version of Windows XP Service Pack 2, Windows XP Service Pack 3, or Windows XP Professional x64 Edition Service Pack 2 should reinstall the update in order to have the same protections and also resolve a printing issue. See Microsoft Security Bulletin MS09-029.
- V7.0 (January 12, 2010): Revised to add Windows Embedded CE 6.0 to affected software for MS09-035. The update for Windows Embedded CE 6.0 (KB974616) is a cumulative update that is available from the Microsoft Download Center only. Customers using the Windows Embedded CE 6.0 platform should consider applying the cumulative update.
- V8.0 (March 9, 2010): Revised to add Microsoft Virtual Server 2005 to affected software for MS09-033.