<script></script><META http-equiv="Content-Type" content="text/html; charset=utf-8">
<HTML><HEAD></HEAD>
<BODY>
<DIV id=idOWAReplyText62405 dir=ltr>
<DIV dir=ltr>3rd time - sorry guys! mutter damn html</DIV>
<DIV dir=ltr>&nbsp;</DIV>
<DIV dir=ltr>-&nbsp;Microsoft is aware of code available on the Internet that seeks to exploit vulnerabilities addressed as part of our April 13th security updates. We are investigating the situation to help protect our customers.&nbsp; Specifically, the reports detail exploit code that attempts to use the IIS PCT/SSL vulnerability on servers running Internet Information Services with the Secure Socket Layer authentication enabled.&nbsp; This vulnerability is addressed by bulletin MS04-011.&nbsp; Customers who have deployed MS04-011 are not at risk from this exploit code.</DIV>
<DIV dir=ltr>-&nbsp;Microsoft considers these reports credible and serious and continues to urge all customers to immediately install the MS4-011 update as well as the other critical updates provided on April 13th.</DIV>
<DIV dir=ltr>-&nbsp;Customers who are still evaluating and testing MS04-011 should immediately implement the workaround steps detailed for the PCT/SSL vulnerability detailed in the MS04-011.&nbsp; In addition, Microsoft has published a knowledge base article KB187498 at <A href="http://support.microsoft.com/default.aspx?scid=kb;en-us;187498">http://support.microsoft.com/default.aspx?scid=kb;en-us;187498</A>&nbsp; which provides additional details on SSL and how to disable PCT without applying MS04-011.</DIV>
<DIV dir=ltr>-&nbsp;We expect to see additional exploits and proof-of-concept code targeting the April 2004 security bulletin release in coming days and weeks, potentially including worm or virus examples.<BR></DIV></DIV></BODY></HTML>