Here is a tech alert from CERT (on MS Security issues) for those not
familiar...
 
Danny
 
           Technical Cyber Security Alert TA05-039A
  Multiple Vulnerabilities in Microsoft Windows Components
 
I. Description
 
   The table below provides a reference between Microsoft's Security
   Bulletins and the related US-CERT Vulnerability Notes. More
   information related to the vulnerabilities is available in these
   documents.
 
   MS05-004: ASP.NET Path Validation Vulnerability (887219)
 
   VU#283646 Microsoft ASP.NET fails to perform proper
   canonicalization
 
   MS05-005: Microsoft Office XP could allow Remote Code Execution
   (873352)
  
   VU#416001 Microsoft Office XP contains buffer overflow
   vulnerability
 
   MS05-006: Vulnerability in Windows SharePoint Services and
   SharePoint Team Services Could Allow Cross-Site Scripting and
   Spoofing Attacks (887981)
 
   VU#340409 Microsoft Windows SharePoint Services and SharePoint Team
   Services contain cross-site scripting vulnerabilities
 
   MS05-007: Vulnerability in Windows Could Allow Information
   Disclosure (888302)
 
   VU#939074 Microsoft Computer Browser service contains an
   information disclosure vulnerability
 
   MS05-008: Vulnerability in Windows Shell Could Allow Remote Code
   Execution (890047)
 
   VU#698835 Microsoft Internet Explorer contains drag and drop flaw
 
   MS05-009: Vulnerability in PNG Processing Could Allow Remote Code
   Execution (890261)
 
   VU#259890 Windows Media Player does not properly handle PNG images
   with excessive width or height values
  
   VU#817368 libpng png_handle_sBIT() performs insufficient bounds
   checking
  
   VU#388984 libpng fails to properly check length of transparency
   chunk (tRNS) data
 
   MS05-010: Vulnerability in the License Logging Service Could Allow
   Code Execution (885834)
 
   VU#130433 Microsoft License Logging Service buffer overflow
 
   MS05-011: Vulnerability in Server Message Block Could Allow Remote
   Code Execution (885250)
 
   VU#652537 Microsoft Windows SMB packet validation vulnerability
 
   MS05-012: Vulnerability in OLE and COM Could Allow Remote Code
   Execution (873333)
  
   VU#597889 Microsoft COM Structured Storage Vulnerability
  
   VU#927889 Microsoft OLE input validation vulnerability
 
   MS05-013: Vulnerability in the DHTML Editing Component ActiveX
   Control Could Allow Remote Code Execution (891781)
 
   VU#356600 Microsoft Internet Explorer DHTML Editing ActiveX control
   contains a cross-domain vulnerability
 
   MS05-014: Cumulative Security Update for Internet Explorer (867282)
  
   VU#698835 Microsoft Internet Explorer contains drag and drop flaw
  
   VU#580299 Microsoft Internet Explorer contains URL decoding zone
   spoofing vulnerability
  
   VU#843771 Microsoft Internet Explorer contains a DHTML method heap
   memory corruption vulnerability
  
   VU#823971 Microsoft Internet Explorer contains a Channel Definition
   Format (CDF) cross-domain vulnerability
 
   MS05-015: Vulnerability in Hyperlink Object Library Could Allow
   Remote Code Execution (888113)
 
   VU#820427 Microsoft Hyperlink Object Library buffer overflow
 
II. Impact
 
   A remote, unauthenticated attacker may exploit VU#283646 to gain
   unauthorized access to secured content on an ASP.NET server.
 
   Exploitation of VU#416001, VU#698835, VU#259890, VU#817368,
   VU#388984, VU#130433, VU#652537, VU#597889, VU#927889, VU#356600,
   VU#580299, VU#843771, and VU#820427 would permit a remote attacker
   to execute arbitrary code on a vulnerable Windows system.
 
   Exploitation of VU#340409, VU#356600, and VU#823971 will have
   impacts similar to cross-site scripting vulnerabilities. For more
   information about cross-site scripting, please see CERT Advisory
   CA-2000-02.
 
   A remote attacker could use VU#939074 to retrieve the names of
   users who have open connections to a shared Windows resource.
 
 
III. Solution
 
Apply a patch
 
   Microsoft has provided the patches for these vulnerabilities in the
   Security Bulletins and on Windows Update.
 
Appendix A. References
 
     * Microsoft's Security Bulletin Summary for February, 2005 -
       <http://www.microsoft.com/technet/security/bulletin/ms05-feb.mspx>
 
     * US-CERT Vulnerability Note VU#283646 -
       <http://www.kb.cert.org/vuls/id/283646>
 
     * US-CERT Vulnerability Note VU#416001 -
       <http://www.kb.cert.org/vuls/id/416001>
 
     * US-CERT Vulnerability Note VU#340409 -
       <http://www.kb.cert.org/vuls/id/340409>
 
     * US-CERT Vulnerability Note VU#939074 -
       <http://www.kb.cert.org/vuls/id/939074>
 
     * US-CERT Vulnerability Note VU#698835 -
       <http://www.kb.cert.org/vuls/id/698835>
 
     * US-CERT Vulnerability Note VU#259890 -
       <http://www.kb.cert.org/vuls/id/259890>
 
     * US-CERT Vulnerability Note VU#817368 -
       <http://www.kb.cert.org/vuls/id/817368>
 
     * US-CERT Vulnerability Note VU#388984 -
       <http://www.kb.cert.org/vuls/id/388984>
 
     * US-CERT Vulnerability Note VU#130433 -
       <http://www.kb.cert.org/vuls/id/130433>
 
     * US-CERT Vulnerability Note VU#652537 -
       <http://www.kb.cert.org/vuls/id/652537>
 
     * US-CERT Vulnerability Note VU#597889 -
       <http://www.kb.cert.org/vuls/id/597889>
 
     * US-CERT Vulnerability Note VU#927889 -
       <http://www.kb.cert.org/vuls/id/927889>
 
     * US-CERT Vulnerability Note VU#356600 -
       <http://www.kb.cert.org/vuls/id/356600>
 
     * US-CERT Vulnerability Note VU#580299 -
       <http://www.kb.cert.org/vuls/id/580299>
 
     * US-CERT Vulnerability Note VU#843771 -
       <http://www.kb.cert.org/vuls/id/843771>
 
     * US-CERT Vulnerability Note VU#823971 -
       <http://www.kb.cert.org/vuls/id/823971>
 
     * US-CERT Vulnerability Note VU#820427 -
       <http://www.kb.cert.org/vuls/id/820427>
 
     * CERT Advisory CA-2000-002 -
       <http://www.cert.org/advisories/CA-2000-02.html#impact>
 
   This document is available from:
  
      <http://www.us-cert.gov/cas/techalerts/TA05-039A.html>     
  
 

------------------------------------------------------
To unsubscribe:           [EMAIL PROTECTED]
For additional commands:         [EMAIL PROTECTED]
Archive:  http://archives.gnatbox.com/gb-users/

Reply via email to