Hello and welcome to this month’s blog on the Microsoft patch releases.
This is a relatively light month; the vendor is releasing four bulletins
that cover a total of nine vulnerabilities.

All nine of the issues are rated “important” this month. Although none of
the issues jump out and say, “This is a severe or critical vulnerability,”
a couple of the issues have the potential to become widespread. Two of the
four SQL Server issues, while local in nature, could be exploited remotely
if an attacker can exploit a latent SQL-injection issue in an application
that uses the vulnerable server as a backend. Also, the DNS Server and
Client issues could help attackers spoof legitimate sites, greatly enhancing
their ability to phish sensitive information from unsuspecting victims.

 

Microsoft’s summary of the July releases can be found here:
www.microsoft.com/technet/security/bulletin/ms08-jul.mspx



 

1. MS08-040
<http://www.microsoft.com/technet/security/Bulletin/MS08-040.mspx>
Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege
(941203)

 

CVE-2008-0085 (BID <http://www.securityfocus.com/bid/30083>  30083)
Microsoft SQL Server Memory Page Reuse Information Disclosure Vulnerability
(MS Rating: Important / Symantec Urgency Rating: 6.1/10)

 

An information disclosure vulnerability affects SQL Server due to how it
manages memory page reuse. An attacker with ‘database operator’ access can
exploit this issue to gain access to potentially sensitive information.
Information obtained may aid in further attacks.

Affects: SQL Server 7.0 SP4, SQL Server 2000 SP4, SQL Server 2000
Itanium-based Edition SP4, SQL Server 2005 SP1 and SP2, SQL Server 2005 x64
Edition SP1 and SP2, SQL Server 2005 with SP1 and SP2 for Itanium-based
Systems, Microsoft Data Engine (MSDE) 1.0 SP4, Microsoft SQL Server 2000
Desktop Engine (MSDE 2000) SP4, Microsoft SQL Server 2005 Express Edition
SP1 and SP2, Microsoft SQL Server 2005 Express Edition with Advanced
Services SP1 and SP2, Microsoft SQL Server 2000 Desktop Engine (WMSDE),
Windows Internal Database (WYukon) SP2, and Windows Internal Database
(WYukon) x64 Edition SP2


CVE-2008-0086 (BID <http://www.securityfocus.com/bid/30082>  30082)
Microsoft SQL Server Convert Function Remote Memory Corruption Vulnerability
(MS Rating: Important / Symantec Urgency Rating: 6.4/10)


A local privilege-escalation vulnerability affects SQL Server when
converting SQL expressions from one data type to another. An attacker with
authenticated access to the application could exploit this issue to execute
arbitrary code with SYSTEM privileges. This issue may be remotely
exploitable if an attacker can exploit latent SQL-injection vulnerabilities
in web-based applications that use the vulnerable SQL server as a backend.

 

Affects: SQL Server 2000 SP4, SQL Server 2000 Itanium-based Edition SP4,
Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) SP4, and Server 2000
Desktop Engine (WMSDE)


CVE-2008-0107 (BID <http://www.securityfocus.com/bid/30119>  30119)
Microsoft SQL Server On-Disk Data Structures Remote Memory Corruption
Vulnerability (MS Rating: Important / Symantec Urgency Rating: 6.4/10)

 

A local privilege-escalation vulnerability affects SQL Server due to how it
validates data structures on disk files. An authenticated attacker could
exploit this issue to execute arbitrary code with SYSTEM privileges.

 

Affects: SQL Server 7.0 SP4, SQL Server 2000 SP4, SQL Server 2000
Itanium-based Edition SP4, SQL Server 2005 SP1 and SP2, SQL Server 2005 x64
Edition SP1 and SP2, SQL Server 2005 with SP1 and SP2 for Itanium-based
Systems, Microsoft Data Engine (MSDE) 1.0 SP4, Microsoft SQL Server 2000
Desktop Engine (MSDE 2000) SP4, Microsoft SQL Server 2005 Express Edition
SP1 and SP2, Microsoft SQL Server 2005 Express Edition with Advanced
Services SP1 and SP2, Microsoft SQL Server 2000 Desktop Engine (WMSDE),
Windows Internal Database (WYukon) SP2, and Windows Internal Database
(WYukon) x64 Edition SP2


CVE-2008-0106 (BID <http://www.securityfocus.com/bid/30118>  30118)
Microsoft SQL Server INSERT Statement Remote Memory Corruption Vulnerability
(MS Rating: Important / Symantec Urgency Rating: 6.4/10)

 

A local privilege-escalation vulnerability affects SQL Server when
processing ‘insert’ statements. An authenticated attacker can exploit this
issue to execute arbitrary code with SYSTEM privileges. This issue may be
remotely exploitable if an attacker can exploit latent SQL-injection
vulnerabilities in web-based applications that use the vulnerable SQL server
as a backend.

 

Affects: SQL Server 2005 SP1 and SP2, SQL Server 2005 x64 Edition SP1 and
SP2, SQL Server 2005 with SP1 and SP2 for Itanium-based Systems, Microsoft
SQL Server 2005 Express Edition SP1 and SP2, and Microsoft SQL Server 2005
Express Edition with Advanced Services SP1 and SP2


2. MS08-038
<http://www.microsoft.com/technet/security/Bulletin/MS08-038.mspx>
Vulnerability in Windows Explorer Could Allow Remote Code Execution (950582)


CVE-2008-1435 (BID <http://www.securityfocus.com/bid/30109>  30109)
Microsoft Windows Explorer 'saved-search' File Remote Code Execution
Vulnerability (MS Rating: Important / Symantec Urgency Rating: 7.1/10)

 

A client-side remote code execution vulnerability affects Windows Explorer
when handling specially malformed ‘saved-search’ files. An attacker must
trick a victim into opening and saving a malicious ‘saved-search’ file
with the vulnerable application to exploit this issue. A successful exploit
will result in the execution of arbitrary code in the context of the
currently logged-in user.

Affects: Windows Vista and Windows Vista SP1, Windows Vista x64 Edition,
Windows Vista x64 Edition SP1, and Windows Server 2008 for 32-bit Systems,
x64-based Systems, and Itanium-based Systems


3. MS08-039
<http://www.microsoft.com/technet/security/Bulletin/MS08-039.mspx>
Vulnerabilities in Outlook Web Access for Exchange Server Could Allow
Elevation of Privilege (953747)


CVE-2008-2247 (BID <http://www.securityfocus.com/bid/30073>  30130)
Microsoft Outlook Web Access for Exchange Server Email Field Cross-Site
Scripting Vulnerability (MS Rating: Important / Symantec Urgency Rating:
7.1/10)

A cross-site scripting vulnerability affects Outlook Web Access for Exchange
Server. The problem occurs due to a failure to properly validate email
fields when opening mail from within a client’s OWA session. An attacker
must trick a victim into opening a specially crafted email to exploit this
issue. A successful attack will allow the attacker to execute arbitrary
actions with the permissions of the victim’s OWA session.

Affects: Microsoft Exchange Server 2003 SP2


CVE-2008-2248 (BID <http://www.securityfocus.com/bid/30130>  30078)
Microsoft Outlook Web Access for Exchange Server HTML Parsing Cross-Site
Scripting Vulnerability (MS Rating: Important / Symantec Urgency Rating:
7.1/10)


A cross-site scripting vulnerability affects Outlook Web Access for Exchange
Server. The problem occurs due to a failure to properly validate HTML when
rendering email within a client’s OWA session. An attacker must trick a
victim into opening a specially crafted email to exploit this issue. A
successful attack will allow the attacker to execute arbitrary actions with
the permissions of the victim’s OWA session.

Affects: Microsoft Exchange Server 2007, and Microsoft Exchange Server 2007
SP1


4. MS08-037
<http://www.microsoft.com/technet/security/Bulletin/MS08-037.mspx>
Vulnerabilities in DNS Could Allow Spoofing (953230)


CVE-2008-1447 (BID <http://www.securityfocus.com/bid/30131>  30131) Multiple
Vendor DNS Implementation Insufficient Socket Entropy DNS Spoofing
Vulnerability (MS Rating: Important / Symantec Urgency Rating: 6.1/10)


A vulnerability in multiple vendors implementations of the DNS protocol
allows attackers to spoof DNS responses to poison the DNS cache. The problem
occurs because of weak randomization in the Transaction ID (TXID) and UDP
port used in DNS communications. A remote attacker can exploit this issue by
sending specific queries to a vulnerable computer, and then respond with
false or misleading information.

Affects: Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows XP
Professional x64 Edition, Windows XP Professional x64 Edition SP2, Windows
Server 2003 SP1 and SP2, Windows Server 2003 x64 Edition and Windows Server
2003 x64 Edition SP2, and Windows Server 2003 with SP1 and SP2 for
Itanium-based Systems.


CVE-2008-1454 (BID <http://www.securityfocus.com/bid/30132>  30132)
Microsoft Windows DNS Server Cache Poisoning Vulnerability (MS Rating:
Important / Symantec Urgency Rating: 6.1/10)


A vulnerability in Windows DNS Server allows attackers to poison the DNS
cache, potentially redirecting users to attacker-controlled sites. The
problem occurs because under certain circumstances, a DNS server will accept
a response from a nameserver for zones outside the server’s authority.

Affects: Microsoft Windows 2000 SP4, Windows Server 2003 SP1 and SP2,
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition SP2,
Windows Server 2003 with SP1 and SP2 for Itanium-based Systems, and Windows
Server 2008 for 32-bit Systems, and x64-based Systems.

 

 

[Ph4nt0m] <http://www.ph4nt0m.org/>  

[Ph4nt0m Security Team]

                   <http://blog.ph4nt0m.org/> [EMAIL PROTECTED]

          Email:  [EMAIL PROTECTED]

          PingMe:
<http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wu
hq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> 

          === V3ry G00d, V3ry Str0ng ===

          === Ultim4te H4cking ===

          === XPLOITZ ! ===

          === #_# ===

#If you brave,there is nothing you cannot achieve.#

 

 


--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

<<inline: image001.gif>>

回复