Windows Server 2003 with SP2 for Itanium-based Systems Windows Server 2003 with SP1 for Itanium-based Systems Windows Server 2003 圆4 Edition Service Pack 2 Windows XP Professional 圆4 Edition Service Pack 2 To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle. Other versions or editions are either past their support life cycle or are not affected. The following software have been tested to determine which versions or editions are affected. Known Issues. None Affected and Non-Affected Software
#Eboostr force dll priority update
Recommendation. Microsoft recommends that customers apply the update immediately. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests.
For more information, see the subsection, Affected and Non-Affected Software, in this section. This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. It is possible that this vulnerability could be used in the crafting of a wormable exploit. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. This security update resolves a privately reported vulnerability in the Server service. Version: 1.0 General Information Executive Summary Security Bulletin Microsoft Security Bulletin MS08-067 - Critical Vulnerability in Server Service Could Allow Remote Code Execution (958644)