Microsoft Patch Tuesday 2006-11-14

MS60-66
Title Remote Code Execution and DoS Vulnerabilities in Netware client services
Replaces
Affected Netware client services
KB KB923980
Known Exploits No
Microsoft Rating Important
ISC Client Rating Less urgent
ISC Server Rating Less urgent
CVE Exploitability
2006-4688 Unknown
2006-4689 Unknown
MS60-67
Title Remote Code Execution Vulnerability in Internet Explorer
Replaces
Affected Internet Explorer
KB KB922760
Known Exploits Yes
Microsoft Rating Critical
ISC Client Rating Patch now
ISC Server Rating Patch now
CVE Exploitability
2006-4446 Unknown
2006-4687 Unknown
2006-4777 Unknown
MS60-68
Title Remote Code Execution Vulnerability in Microsoft Agent
Replaces
Affected Microsoft Agent
KB KB920213
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2006-3445 Unknown
MS60-69
Title Remote Code Execution in Adobe Flash Player
Replaces
Affected Adobe flash player
KB KB923789
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2006-3014 Unknown
2006-3311 Unknown
2006-3587 Unknown
2006-3588 Unknown
2006-4640 Unknown
MS60-70
Title Remote Code Execution Vulnerability in Workstation Service
Replaces
Affected Workstation service
KB KB924270
Known Exploits Yes
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2006-4691 Unknown
MS60-71
Title XML Core Services Vulnerability
Replaces
Affected XML Core services
KB KB928088
Known Exploits Yes
Microsoft Rating Critical
ISC Client Rating Patch now
ISC Server Rating Patch now
CVE Exploitability
2006-5745 Unknown
We will update issues on this page for about a week or so as they evolve. We appreciate your updates!
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
    • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.