RTTY
[Top] [All Lists]

[RTTY] Today's Windows vulnerabilities

To: RTTY@contesting.com
Subject: [RTTY] Today's Windows vulnerabilities
From: Peter Laws <plaws@plaws.net>
Date: Wed, 14 Apr 2004 10:12:36 -0500 (CDT)
List-post: <mailto:rtty@contesting.com>
Since this was a topic of conversation ...  I've cc'd the N1MM list
because I *think* the Jet database engine is used by Logger.

73,
Peter Laws
N5UWY/9

---------- Forwarded message ----------
From: US-CERT Technical Alerts <technical-alerts@us-cert.gov>
To: technical-alerts@us-cert.gov
Date: Tue, 13 Apr 2004 22:19:05 -0400
Subject: US-CERT Technical Cyber Security Alert TA04-104A -- Multiple
    Vulnerabilities in Microsoft Products


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple Vulnerabilities in Microsoft Products

   Original release date: April 13, 2004
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows Operating Systems

     * Microsoft Windows Remote Procedure Call (RPC) and Distributed
       Component Object Model (DCOM) subsystems

     * Microsoft Windows MHTML Protocol Handler

     * Microsoft Jet Database Engine

Overview

   Microsoft Corporation has released a series of security bulletins
   affecting most users of the Microsoft Windows operating system. Users
   of systems running Microsoft Windows are strongly encouraged to visit
   the "Windows Security Updates for April 2004" site at

   <https://www.microsoft.com/security/security_bulletins/200404_windows.
   asp>

   and take actions appropriate to their system configurations.

I. Description

   Microsoft has released four security bulletins listing a number of
   vulnerabilities which affect a variety of Microsoft Windows software
   packages. The following section summarizes the issues identified in
   their bulletins.

Summary of Microsoft Bulletins for April 2004

  Security Bulletin MS04-011: Security Update for Microsoft Windows (835732)

   This bulletin addresses 14 vulnerabilities affecting the systems
   listed below. There are several new vulnerabilities address by this
   bulletin, and several updates to previously reported vulnerabilities.

   Impact

     Remote attackers could execute arbitrary code on vulnerable systems.

   Systems affected

     * Windows NT Workstation 4.0
     * Windows NT Server 4.0
     * Windows NT Server 4.0, Terminal Server Edition
     * Windows 2000
     * Windows XP
     * Windows Server 2003

   Vulnerability identifiers

   The following table outlines these issues and is based on Microsoft's
   Security Bulletin:

   Vulnerability Title |US-CERT ID |CVE ID       | Impact of Vulnerability
   --------------------+-----------+-------------+------------------------
   LSASS Vulnerability |VU#753212  |CAN-2003-0533| Remote Code Execution
   LDAP Vulnerability  |VU#639428  |CAN-2003-0663| Denial of Service
   PCT Vulnerability   |VU#586540  |CAN-2003-0719| Remote Code Execution
   Winlogon Vulnerabili|VU#471260  |CAN-2003-0806| Remote Code Execution
   Metafile Vulnerabili|VU#547028  |CAN-2003-0906| Remote Code Execution
   Help and Support Cen|VU#260588  |CAN-2003-0907| Remote Code Execution
   Utility Manager Vuln|VU#526084  |CAN-2003-0908| Privilege Elevation
   Windows Management V|VU#206468  |CAN-2003-0909| Privilege Elevation
   Local Descriptor Tab|VU#122076  |CAN-2003-0910| Privilege Elevation
   H.323 Vulnerability |VU#353956  |CAN-2004-0117| Remote Code Execution
   Virtual DOS Machine |VU#783748  |CAN-2004-0118| Privilege Elevation
   Negotiate SSP Vulner|VU#638548  |CAN-2004-0119| Remote Code Execution
   SSL Vulnerability   |VU#150236  |CAN-2004-0120| Denial of Service
   ASN.1 "Double Free" |VU#255924  |CAN-2004-0123  Remote Code Execution


  Security Bulletin MS04-012: Cumulative Update for Microsoft RPC/DCOM
   (828741)

   This  bulletin  addresses  several  new  vulnerabilities affecting the
   systems  listed  below. These vulnerabilities are in Microsoft Windows
   Remote  Procedure  Call  (RPC)  and Distributed Component Object Model
   (DCOM).

   Impact

     Remote attackers could execute arbitrary code on vulnerable systems.

   Systems affected

     * Windows NT Workstation 4.0
     * Windows NT Server 4.0
     * Windows NT Server 4.0, Terminal Server Edition
     * Windows 2000
     * Windows XP
     * Windows Server 2003

   Vulnerability identifiers

   The  following table outlines these issues and is based on Microsoft's
   Security Bulletin:

   Vulnerability Title |US-CERT ID |CVE ID       | Impact of Vulnerability
   --------------------+-----------+-------------+------------------------
   RPC Runtime Library |VU#547820  |CAN-2003-0813| Remote Code Execution
   RPCSS Service Vulner|VU#417052  |CAN-2004-0116| Denial of Service
   RPC over HTTP Vulner|VU#698564  |CAN-2003-0807| Denial of Service
   Object Identity Vuln|VU#212892  |CAN-2004-0124| Information Disclosure


  Security Bulletin MS04-013:Cumulative Security Update for Outlook Express
   (837009)

   This  bulletin  addresses a vulnerability affecting the systems listed
   below.  The vulnerability affects the Microsoft Windows MHTML Protocol
   handler  and any applications that use it, including Microsoft Outlook
   and  Internet Explorer. This vulnerability has been assigned VU#323070
   and CAN-2004-0380.

   Note:   MS04-013   includes   patches  remediating  the  vulnerability
   described in TA04-099A.

   Impact

     Remote attackers could execute arbitrary code on vulnerable systems.

   Systems affected

     * Windows NT Workstation 4.0
     * Windows NT Server 4.0
     * Windows NT Server 4.0, Terminal Server Edition
     * Windows 2000
     * Windows XP
     * Windows Server 2003
     * Windows 98
     * Windows 98 Second Edition (SE)
     * Windows Millennium Edition (Windows Me)

   Note:  This  issue  affects  systems  with  Outlook Express installed.
   Outlook  Express  is installed by default on most (if not all) current
   versions of Microsoft Windows.


  Security Bulletin MS04-014: Vulnerability in the Microsoft Jet Database
   Engine Could Allow Code Execution (837001)

   This  bulletin  addresses a vulnerability affecting the systems listed
   below.  There  is  a  buffer overflow vulnerability in Microsoft's Jet
   Database  Engine (Jet). An attacker could take control of a vulnerable
   system,  including installing programs; viewing, changing, or deleting
   data;  or  creating  new  accounts  that  have  full  privileges. This
   vulnerability has been assigned VU#740716 and CAN-2004-0197.

   Impact

     Remote attackers could execute arbitrary code on vulnerable systems.

   Systems affected

     * Windows NT Workstation 4.0
     * Windows NT Server 4.0
     * Windows NT Server 4.0, Terminal Server Edition
     * Windows 2000
     * Windows XP
     * Windows Server 2003


Update to TA04-099A

   Microsoft  has  released  a  patch  that  addresses  the  cross-domain
   vulnerability  discussed  in  TA04-099A:  "Vulnerability  in  Internet
   Explorer  ITS  Protocol  Handler".  US-CERT  is tracking this issue as
   VU#323070.   This   reference  number  corresponds  to  CVE  candidate
   CAN-2004-0380.

   The  patches  and  further  information  about  the  vulnerability are
   available  in Microsoft Security Bulletin MS04-013. MS04-013 is titled
   "Cumulative  Security  Update for Outlook Express". Since most (if not
   all)  current  Windows  systems  have  Outlook  Express  installed  by
   default, and the MHTML protocol handler is part of the Outlook Express
   software  package,  most  (if  not  all)  Windows  systems  should  be
   considered vulnerable.

   TA04-099A and VU#323070 focused on the ITS protocol handlers; however,
   the latent vulnerability appears to be in the MHTML handler shipped as
   part of Outlook Express. These documents have been updated.

II. Impact

   Several  of  the issues identified by Microsoft have been described as
   "Critical" in nature.Each bulletin contains at least one vulnerability
   which may allow remote attackers to execute arbitrary code on affected
   systems. The privileges gained would depend on the security context of
   the software and vulnerability exploited.

III. Solution

Apply an appropriate set of updates from Microsoft

   Please  see  the following site for more information about appropriate
   remediation.

     Windows Security Updates for April 2004 -

     <http://www.microsoft.com/security/security_bulletins/200404_windows
     .asp>

Appendix A. Vendor Information

   This  appendix  contains  information  provided  by  vendors  for this
   technical alert. As vendors report new information to US-CERT, we will
   update this section and note the changes in our revision history. If a
   particular  vendor  is  not  listed  below, we have not received their
   comments.

Microsoft Corporation

     Windows Security Updates for April 2004

     + Microsoft Security Bulletin MS04-011 -
        Security Update for Microsoft Windows (835732)

     + Microsoft Security Bulletin MS04-012 -
        Cumulative  Update  for Microsoft RPC/DCOM (828741)

     + Microsoft Security Bulletin MS04-013 -
        Cumulative Security Update for Outlook Express (837009)

     + Microsoft Security Bulletin MS04-014 -
        Vulnerability  in  the Microsoft Jet Database Engine Could
        Allow Code Execution (837001)


Appendix B. References

     * Technical    Cyber    Security   Alert   TA04-099A:   Cross-Domain
       Vulnerability   in   Outlook  Express  MHTML  Protocol  Handler  -
       <http://www.us-cert.gov/cas/techalerts/TA04-099A.html>

     * US-CERT   Cyber  Security  Alert  SA04-104A:  Summary  of  Windows
       Security Updates for April 2004 -
       <http://www.us-cert.gov/cas/alerts/SA04-104A.html>

     * Windows      Security     Updates     for     April     2004     -
       <http://www.microsoft.com/security/security_bulletins/200404_windo
       ws.asp>

     * Microsoft   Security  Bulletin  MS04-011  -  Security  Update  for
       Microsoft Windows (835732) -
       <http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx>

     * Microsoft  Security  Bulletin  MS04-012  -  Cumulative  Update for
       Microsoft RPC/DCOM (828741) -
       <http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx>

     * Microsoft  Security Bulletin MS04-013 - Cumulative Security Update
       for Outlook Express (837009) -
       <http://www.microsoft.com/technet/security/bulletin/MS04-013.mspx>

     * Microsoft  Security  Bulletin  MS04-014  -  Vulnerability  in  the
       Microsoft  Jet Database Engine Could Allow Code Execution (837001)
       -
       <http://www.microsoft.com/technet/security/bulletin/MS04-014.mspx>

     * Microsoft  Security  Response  Center  Security  Bulletin Severity
       Rating System (Revised, November 2002) -
       <http://www.microsoft.com/technet/security/bulletin/rating.mspx>

     * Vulnerability  Note  VU#323070:  Outlook  Express  MHTML  protocol
       handler  does  not  properly validate location of alternate data -
       <http://www.kb.cert.org/vuls/id/323070>

     * Vulnerability   Note   VU#547820:   Microsoft   Windows   DCOM/RPC
       vulnerability - <http://www.kb.cert.org/vuls/id/547820>

     * Vulnerability   Note  VU#740716:  Microsoft  Jet  Database  Engine
       database      request      handling      buffer     overflow     -
       <http://www.kb.cert.org/vuls/id/740716>
     _________________________________________________________________

   Feedback  about  this  technical  alert  should  be  sent  to "US-CERT
   Technical Alert" at <mailto:cert@cert.org>. Please include the Subject
   line "TA04-104A Feedback VU#667571".
     _________________________________________________________________

   Copyright 2004 Carnegie   Mellon   University.

   Terms   of   use: <http://www.us-cert.gov/legal.html>

   Revision History

   April 13, 2004: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFAfJtjXlvNRxAkFWARAmmUAJ4jbj7Mm8I5NdasPeDIliOCUTJutQCfaeoC
uIhq7G9V+u7Cg0B78NzRMGk=
=UEBC
-----END PGP SIGNATURE-----
_______________________________________________
RTTY mailing list
RTTY@contesting.com
http://lists.contesting.com/mailman/listinfo/rtty

<Prev in Thread] Current Thread [Next in Thread>
  • [RTTY] Today's Windows vulnerabilities, Peter Laws <=