Patch Repository

Windows Server 2008 Standard Edition (x64) Patch Details
Patch Name Windows6.0-2008-KB967723-x64.msu
Patch Description Security Update for Windows Server 2008 x64 Edition (KB967723)
Bulletin Id MS09-048
Bulletin Title Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723)
Severity Critical
Location Path Windows6.0-2008-KB967723-x64.msu
Bulletin Summary The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.
Superceding Bulletin Id None
Patch Release Date Sep 8, 2009

Affected Product Information

Product Name Service Pack Name
Windows Server 2008 Standard Edition (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Enterprise Edition (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Datacenter Edition (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Foundation Edition (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Web Server Edition (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 HPC Edition (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Datacenter Edition without Hyper-V (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Enterprise Edition without Hyper-V (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Standard Edition without Hyper-V (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Standard Edition without Hyper-v (core installation) (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Enterprise Edition without Hyper-v (core installation) (x64)Windows Server 2008 SP1 (x64)
Windows Server 2008 Enterprise Edition (core installation) (x64)Windows Server 2008 SP1 (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.