Microsoft’s Windows Security Updates for August

You can share this, including by text message!

  • Microsoft’s Windows Security Updates for August

Ever dutiful, Microsoft today released its monthly security updates for Windows for August. There are six of them today, ranging from “moderate” to “important” to “critical”, and affecting IE, Microsoft telephony, and RDP, among others, and allowing everything from spoofing to DOSing to the ever present RCE (remote code execution).

The critical updates include a cumulative update for Internet Explorer, affecting pretty much every version of Windows which may still be in use (so don’t dally, just do it), a vulnerability in the Plug-and-Play module which affects XP SP1 and SP2, Win2k SP4, and Windows Server 2003, and a vulnerability in the print spooler service affecting XP SP1 and SP2, Win2k SP4, and Server 2003.

A vulnerability in the Telephony Application Programming Interface (TAPI) has been classified as “important” (which is below critical, but above moderate), and affects XP SP1, SP2, and Professional x64 Edition, Win2k, and Server 2003. If you don’t have telephony enabled, it is not as critical, but it’s a good idea to update it anyways.

Finally, the two moderate updates (which means that they are not rated “critical”, but which does not mean that you should ignore them or not apply them!) The first is a vulnerability in the Remote Desktop Protocol (RDP) which can allow a denial of service attack, and the second is a vulnerability in Kerberos which can allow a DOS, spoofing, or leaking of information from your computer (Kerberos is a network authentication protocol).

(Article continues below)
Get notified of new Internet Patrol articles for free!
Or Read Internet Patrol Articles Right in Your Inbox!
as Soon as They are Published! Only $1 a Month!

Imagine being able to read full articles right in your email, or on your phone, without ever having to click through to the website unless you want to! Just $1 a month and you can cancel at any time!
Microsoft’s Windows Security Updates for August

Don’t take these updates lightly, or for granted. Do them. And just say “no” to hackers, phishers, spoofers, and Internet thieves.

 

Here are the links to the updates:

[Page no longer available – we have linked to the archive.org version instead]
[Page no longer available – we have linked to the archive.org version instead]
[Page no longer available – we have linked to the archive.org version instead]
[Page no longer available – we have linked to the archive.org version instead]
[Page no longer available – we have linked to the archive.org version instead]
[Page no longer available – we have linked to the archive.org version instead]

  
No Paywall Here!
The Internet Patrol is and always has been free. We don't hide our articles behind a paywall, or restrict the number of articles you can read in a month if you don't give us money. That said, it does cost us money to run the site, so if something you read here was helpful or useful, won't you consider donating something to help keep the Internet Patrol free? Thank you!

Microsoft’s Windows Security Updates for August

Get notified of new Internet Patrol articles!

You can share this, including by text message!

  • Microsoft’s Windows Security Updates for August

2 Replies to “Microsoft’s Windows Security Updates for August”

  1. Dude, one thing that really irritates me is that you guys write hackers, fyi its cracker, because a hacker is someone who creates something useful and not harmful. Cracker is someone who breaks things for their own purposes.

  2. Hello Aunty. I just found out that the MS update site WILL NOT ALLOW UPDATES to be downloaded period unless you have geniune ms products. I understood that Critical updates would still be allowed, not so, at least from my attempt this AM. I had no idea that my XP was not authentic until this morning. But, as stated absolutely no updates were allowed from the ms update site. Just thought I would let you know.. Thanks for your efforts and enjoy them greatly. Charles

Leave a Reply

Your email address will not be published. Required fields are marked *