US-CERT Technical Cyber Security Alert TA05-039A -- Multiple Vulnerabilities in Microsoft Windows Components

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

           Technical Cyber Security Alert TA05-039A
  Multiple Vulnerabilities in Microsoft Windows Components

   Original release date: February 8, 2005
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows Systems

Overview

   Microsoft has released a Security Bulletin Summary for February, 2005.
   This summary includes several bulletins that address vulnerabilities
   in various Windows applications and components. Exploitation of some
   vulnerabilities can result in the remote execution of arbitrary code
   by a remote attacker. Details of the vulnerabilities and their impacts
   are provided below.


I. Description

   The table below provides a reference between Microsoft's Security
   Bulletins and the related US-CERT Vulnerability Notes. More
   information related to the vulnerabilities is available in these
   documents.

   _________________________________________________________________

   Format:

   Microsoft Security Bulletin

   Related US-CERT Vulnerability Note(s)
   _________________________________________________________________

   MS05-004: ASP.NET Path Validation Vulnerability (887219) 

   VU#283646 Microsoft ASP.NET fails to perform proper
   canonicalization
   _________________________________________________________________

   MS05-005: Microsoft Office XP could allow Remote Code Execution
   (873352) 
   
   VU#416001 Microsoft Office XP contains buffer overflow
   vulnerability
   _________________________________________________________________

   MS05-006: Vulnerability in Windows SharePoint Services and
   SharePoint Team Services Could Allow Cross-Site Scripting and
   Spoofing Attacks (887981)

   VU#340409 Microsoft Windows SharePoint Services and SharePoint Team
   Services contain cross-site scripting vulnerabilities
   _________________________________________________________________

   MS05-007: Vulnerability in Windows Could Allow Information
   Disclosure (888302)

   VU#939074 Microsoft Computer Browser service contains an
   information disclosure vulnerability
   _________________________________________________________________

   MS05-008: Vulnerability in Windows Shell Could Allow Remote Code
   Execution (890047)

   VU#698835 Microsoft Internet Explorer contains drag and drop flaw
   _________________________________________________________________

   MS05-009: Vulnerability in PNG Processing Could Allow Remote Code
   Execution (890261)

   VU#259890 Windows Media Player does not properly handle PNG images
   with excessive width or height values
   
   VU#817368 libpng png_handle_sBIT() performs insufficient bounds
   checking
   
   VU#388984 libpng fails to properly check length of transparency
   chunk (tRNS) data
   _________________________________________________________________

   MS05-010: Vulnerability in the License Logging Service Could Allow
   Code Execution (885834)

   VU#130433 Microsoft License Logging Service buffer overflow
   _________________________________________________________________

   MS05-011: Vulnerability in Server Message Block Could Allow Remote
   Code Execution (885250)

   VU#652537 Microsoft Windows SMB packet validation vulnerability
   _________________________________________________________________

   MS05-012: Vulnerability in OLE and COM Could Allow Remote Code
   Execution (873333)
   
   VU#597889 Microsoft COM Structured Storage Vulnerability
   
   VU#927889 Microsoft OLE input validation vulnerability
   _________________________________________________________________

   MS05-013: Vulnerability in the DHTML Editing Component ActiveX
   Control Could Allow Remote Code Execution (891781)

   VU#356600 Microsoft Internet Explorer DHTML Editing ActiveX control
   contains a cross-domain vulnerability
   _________________________________________________________________

   MS05-014: Cumulative Security Update for Internet Explorer (867282)
   
   VU#698835 Microsoft Internet Explorer contains drag and drop flaw
   
   VU#580299 Microsoft Internet Explorer contains URL decoding zone
   spoofing vulnerability
   
   VU#843771 Microsoft Internet Explorer contains a DHTML method heap
   memory corruption vulnerability
   
   VU#823971 Microsoft Internet Explorer contains a Channel Definition
   Format (CDF) cross-domain vulnerability
   _________________________________________________________________

   MS05-015: Vulnerability in Hyperlink Object Library Could Allow
   Remote Code Execution (888113)

   VU#820427 Microsoft Hyperlink Object Library buffer overflow
   _________________________________________________________________


II. Impact

   A remote, unauthenticated attacker may exploit VU#283646 to gain
   unauthorized access to secured content on an ASP.NET server.

   Exploitation of VU#416001, VU#698835, VU#259890, VU#817368,
   VU#388984, VU#130433, VU#652537, VU#597889, VU#927889, VU#356600,
   VU#580299, VU#843771, and VU#820427 would permit a remote attacker
   to execute arbitrary code on a vulnerable Windows system.

   Exploitation of VU#340409, VU#356600, and VU#823971 will have
   impacts similar to cross-site scripting vulnerabilities. For more
   information about cross-site scripting, please see CERT Advisory
   CA-2000-02.

   A remote attacker could use VU#939074 to retrieve the names of
   users who have open connections to a shared Windows resource.


III. Solution

Apply a patch

   Microsoft has provided the patches for these vulnerabilities in the
   Security Bulletins and on Windows Update.

Appendix A. References

     * Microsoft's Security Bulletin Summary for February, 2005 -
       <http://www.microsoft.com/technet/security/bulletin/ms05-feb.mspx>

     * US-CERT Vulnerability Note VU#283646 -
       <http://www.kb.cert.org/vuls/id/283646>

     * US-CERT Vulnerability Note VU#416001 -
       <http://www.kb.cert.org/vuls/id/416001>

     * US-CERT Vulnerability Note VU#340409 -
       <http://www.kb.cert.org/vuls/id/340409>

     * US-CERT Vulnerability Note VU#939074 -
       <http://www.kb.cert.org/vuls/id/939074>

     * US-CERT Vulnerability Note VU#698835 -
       <http://www.kb.cert.org/vuls/id/698835>

     * US-CERT Vulnerability Note VU#259890 -
       <http://www.kb.cert.org/vuls/id/259890>

     * US-CERT Vulnerability Note VU#817368 -
       <http://www.kb.cert.org/vuls/id/817368>

     * US-CERT Vulnerability Note VU#388984 -
       <http://www.kb.cert.org/vuls/id/388984>

     * US-CERT Vulnerability Note VU#130433 -
       <http://www.kb.cert.org/vuls/id/130433>

     * US-CERT Vulnerability Note VU#652537 -
       <http://www.kb.cert.org/vuls/id/652537>

     * US-CERT Vulnerability Note VU#597889 -
       <http://www.kb.cert.org/vuls/id/597889>

     * US-CERT Vulnerability Note VU#927889 -
       <http://www.kb.cert.org/vuls/id/927889>

     * US-CERT Vulnerability Note VU#356600 -
       <http://www.kb.cert.org/vuls/id/356600>

     * US-CERT Vulnerability Note VU#580299 -
       <http://www.kb.cert.org/vuls/id/580299>

     * US-CERT Vulnerability Note VU#843771 -
       <http://www.kb.cert.org/vuls/id/843771>

     * US-CERT Vulnerability Note VU#823971 -
       <http://www.kb.cert.org/vuls/id/823971>

     * US-CERT Vulnerability Note VU#820427 -
       <http://www.kb.cert.org/vuls/id/820427>

     * CERT Advisory CA-2000-002 -
       <http://www.cert.org/advisories/CA-2000-02.html#impact>
   _________________________________________________________________

   Feedback can be directed to the authors: Will Dormann, Jeff Gennari,
   Chad Dougherty, Ken MacInnis, and Jeff Havrilla
   _________________________________________________________________


   This document is available from: 
   
      <http://www.us-cert.gov/cas/techalerts/TA05-039A.html>      
   
   _________________________________________________________________

   Copyright 2004 Carnegie Mellon University.
   
   Terms of use: <http://www.us-cert.gov/legal.html>
   _________________________________________________________________



   Revision History

   February 8, 2005: Initial release

                      Last updated February 08, 2005 




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQglyjBhoSezw4YfQAQJHvwf+MJrGdbRzuV+xr5SgRZQXCmL+0uSedhZZ
5c+NuO1p9wKex+9Q6a7UCvCykf0KgWumy0MkE5htZzxDqrTLMQxWOIa0JkHtqZGy
CklUEhEbB+4UeuVx0Jcgwkq7nLUaFJW86elSp0GyxiPVKQUFFwSRFYPzOUPYPe7+
Pv/JdiME6gejCdpTfiNxEvx7JKa/pWc/ntD/35bPWFkJkj+5VZPQQf/gaG7qmTll
zG0e21aufLjsfqZPYFyHr4ADmgeMkWutolZYnooEDNvOo1zhtrPkoZEMLLk68WMX
tia8bq0ScAhOg9gwQBvagBPqYyPGXbAsWLwPVB6nlWN68IbUezCzqw==
=I8H5
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux