CRIME FW: US-CERT Technical Cyber Security Alert TA04-104A -- Multiple Vulnerabilities in Microsoft Products

From: George Heuston (GeorgeH@private)
Date: Wed Apr 14 2004 - 09:46:46 PDT

  • Next message: May Richard: "RE: CRIME Save a Chatlog... Go to Prison?"

    -----Original Message-----
    From: US-CERT Technical Alerts [mailto:technical-alerts@us-cert.gov] 
    Sent: Tuesday, April 13, 2004 7:19 PM
    To: technical-alerts@us-cert.gov
    Subject: US-CERT Technical Cyber Security Alert TA04-104A -- Multiple
    Vulnerabilities in Microsoft Products 
    
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Multiple Vulnerabilities in Microsoft Products
    
       Original release date: April 13, 2004
       Last revised: --
       Source: US-CERT
    
    Systems Affected
    
         * Microsoft Windows Operating Systems
    
         * Microsoft Windows Remote Procedure Call (RPC) and Distributed
           Component Object Model (DCOM) subsystems
    
         * Microsoft Windows MHTML Protocol Handler
    
         * Microsoft Jet Database Engine
    
    Overview
    
       Microsoft Corporation has released a series of security bulletins
       affecting most users of the Microsoft Windows operating system. Users
       of systems running Microsoft Windows are strongly encouraged to visit
       the "Windows Security Updates for April 2004" site at
    
     
    <https://www.microsoft.com/security/security_bulletins/200404_windows.
       asp>
    
       and take actions appropriate to their system configurations.
    
    I. Description
    
       Microsoft has released four security bulletins listing a number of
       vulnerabilities which affect a variety of Microsoft Windows software
       packages. The following section summarizes the issues identified in
       their bulletins.
    
    Summary of Microsoft Bulletins for April 2004
    
      Security Bulletin MS04-011: Security Update for Microsoft Windows
    (835732)
    
       This bulletin addresses 14 vulnerabilities affecting the systems
       listed below. There are several new vulnerabilities address by this
       bulletin, and several updates to previously reported vulnerabilities.
    
       Impact
    
         Remote attackers could execute arbitrary code on vulnerable
    systems.
    
       Systems affected
    
         * Windows NT Workstation 4.0
         * Windows NT Server 4.0
         * Windows NT Server 4.0, Terminal Server Edition
         * Windows 2000
         * Windows XP
         * Windows Server 2003
    
       Vulnerability identifiers
    
       The following table outlines these issues and is based on Microsoft's
       Security Bulletin:
    
       Vulnerability Title |US-CERT ID |CVE ID       | Impact of
    Vulnerability
     
    --------------------+-----------+-------------+------------------------
       LSASS Vulnerability |VU#753212  |CAN-2003-0533| Remote Code Execution
       LDAP Vulnerability  |VU#639428  |CAN-2003-0663| Denial of Service
       PCT Vulnerability   |VU#586540  |CAN-2003-0719| Remote Code Execution
       Winlogon Vulnerabili|VU#471260  |CAN-2003-0806| Remote Code Execution
       Metafile Vulnerabili|VU#547028  |CAN-2003-0906| Remote Code Execution
       Help and Support Cen|VU#260588  |CAN-2003-0907| Remote Code Execution
       Utility Manager Vuln|VU#526084  |CAN-2003-0908| Privilege Elevation
       Windows Management V|VU#206468  |CAN-2003-0909| Privilege Elevation
       Local Descriptor Tab|VU#122076  |CAN-2003-0910| Privilege Elevation
       H.323 Vulnerability |VU#353956  |CAN-2004-0117| Remote Code Execution
       Virtual DOS Machine |VU#783748  |CAN-2004-0118| Privilege Elevation
       Negotiate SSP Vulner|VU#638548  |CAN-2004-0119| Remote Code Execution
       SSL Vulnerability   |VU#150236  |CAN-2004-0120| Denial of Service
       ASN.1 "Double Free" |VU#255924  |CAN-2004-0123  Remote Code Execution
    
    
      Security Bulletin MS04-012: Cumulative Update for Microsoft RPC/DCOM
       (828741)
    
       This  bulletin  addresses  several  new  vulnerabilities affecting
    the
       systems  listed  below. These vulnerabilities are in Microsoft
    Windows
       Remote  Procedure  Call  (RPC)  and Distributed Component Object
    Model
       (DCOM).
    
       Impact
    
         Remote attackers could execute arbitrary code on vulnerable
    systems.
    
       Systems affected
    
         * Windows NT Workstation 4.0
         * Windows NT Server 4.0
         * Windows NT Server 4.0, Terminal Server Edition
         * Windows 2000
         * Windows XP
         * Windows Server 2003
    
       Vulnerability identifiers
    
       The  following table outlines these issues and is based on
    Microsoft's
       Security Bulletin:
    
       Vulnerability Title |US-CERT ID |CVE ID       | Impact of
    Vulnerability
     
    --------------------+-----------+-------------+------------------------
       RPC Runtime Library |VU#547820  |CAN-2003-0813| Remote Code Execution
       RPCSS Service Vulner|VU#417052  |CAN-2004-0116| Denial of Service
       RPC over HTTP Vulner|VU#698564  |CAN-2003-0807| Denial of Service
       Object Identity Vuln|VU#212892  |CAN-2004-0124| Information
    Disclosure
    
    
      Security Bulletin MS04-013:Cumulative Security Update for Outlook
    Express
       (837009)
    
       This  bulletin  addresses a vulnerability affecting the systems
    listed
       below.  The vulnerability affects the Microsoft Windows MHTML
    Protocol
       handler  and any applications that use it, including Microsoft
    Outlook
       and  Internet Explorer. This vulnerability has been assigned
    VU#323070
       and CAN-2004-0380.
    
       Note:   MS04-013   includes   patches  remediating  the
    vulnerability
       described in TA04-099A.
    
       Impact
    
         Remote attackers could execute arbitrary code on vulnerable
    systems.
    
       Systems affected
    
         * Windows NT Workstation 4.0
         * Windows NT Server 4.0
         * Windows NT Server 4.0, Terminal Server Edition
         * Windows 2000
         * Windows XP
         * Windows Server 2003
         * Windows 98
         * Windows 98 Second Edition (SE)
         * Windows Millennium Edition (Windows Me)
    
       Note:  This  issue  affects  systems  with  Outlook Express
    installed.
       Outlook  Express  is installed by default on most (if not all)
    current
       versions of Microsoft Windows.
    
    
      Security Bulletin MS04-014: Vulnerability in the Microsoft Jet
    Database
       Engine Could Allow Code Execution (837001)
    
       This  bulletin  addresses a vulnerability affecting the systems
    listed
       below.  There  is  a  buffer overflow vulnerability in Microsoft's
    Jet
       Database  Engine (Jet). An attacker could take control of a
    vulnerable
       system,  including installing programs; viewing, changing, or
    deleting
       data;  or  creating  new  accounts  that  have  full  privileges.
    This
       vulnerability has been assigned VU#740716 and CAN-2004-0197.
    
       Impact
    
         Remote attackers could execute arbitrary code on vulnerable
    systems.
    
       Systems affected
    
         * Windows NT Workstation 4.0
         * Windows NT Server 4.0
         * Windows NT Server 4.0, Terminal Server Edition
         * Windows 2000
         * Windows XP
         * Windows Server 2003
    
    
    Update to TA04-099A
    
       Microsoft  has  released  a  patch  that  addresses  the
    cross-domain
       vulnerability  discussed  in  TA04-099A:  "Vulnerability  in
    Internet
       Explorer  ITS  Protocol  Handler".  US-CERT  is tracking this issue
    as
       VU#323070.   This   reference  number  corresponds  to  CVE
    candidate
       CAN-2004-0380.
    
       The  patches  and  further  information  about  the  vulnerability
    are
       available  in Microsoft Security Bulletin MS04-013. MS04-013 is
    titled
       "Cumulative  Security  Update for Outlook Express". Since most (if
    not
       all)  current  Windows  systems  have  Outlook  Express  installed
    by
       default, and the MHTML protocol handler is part of the Outlook
    Express
       software  package,  most  (if  not  all)  Windows  systems  should
    be
       considered vulnerable.
    
       TA04-099A and VU#323070 focused on the ITS protocol handlers;
    however,
       the latent vulnerability appears to be in the MHTML handler shipped
    as
       part of Outlook Express. These documents have been updated.
    
    II. Impact
    
       Several  of  the issues identified by Microsoft have been described
    as
       "Critical" in nature.Each bulletin contains at least one
    vulnerability
       which may allow remote attackers to execute arbitrary code on
    affected
       systems. The privileges gained would depend on the security context
    of
       the software and vulnerability exploited.
    
    III. Solution
    
    Apply an appropriate set of updates from Microsoft
    
       Please  see  the following site for more information about
    appropriate
       remediation.
    
         Windows Security Updates for April 2004 -
    
     
    <http://www.microsoft.com/security/security_bulletins/200404_windows
         .asp>
    
    Appendix A. Vendor Information
    
       This  appendix  contains  information  provided  by  vendors  for
    this
       technical alert. As vendors report new information to US-CERT, we
    will
       update this section and note the changes in our revision history. If
    a
       particular  vendor  is  not  listed  below, we have not received
    their
       comments.
    
    Microsoft Corporation
    
         Windows Security Updates for April 2004
    
         + Microsoft Security Bulletin MS04-011 -  
            Security Update for Microsoft Windows (835732)
    
         + Microsoft Security Bulletin MS04-012 -
    	Cumulative  Update  for Microsoft RPC/DCOM (828741)
    
         + Microsoft Security Bulletin MS04-013 - 
    	Cumulative Security Update for Outlook Express (837009)
    
         + Microsoft Security Bulletin MS04-014 - 
            Vulnerability  in  the Microsoft Jet Database Engine Could
            Allow Code Execution (837001)
    
    
    Appendix B. References
    
         * Technical    Cyber    Security   Alert   TA04-099A:
    Cross-Domain
           Vulnerability   in   Outlook  Express  MHTML  Protocol  Handler
    -
           <http://www.us-cert.gov/cas/techalerts/TA04-099A.html>
    
         * US-CERT   Cyber  Security  Alert  SA04-104A:  Summary  of
    Windows
           Security Updates for April 2004 -
           <http://www.us-cert.gov/cas/alerts/SA04-104A.html>
    
         * Windows      Security     Updates     for     April     2004
    -
     
    <http://www.microsoft.com/security/security_bulletins/200404_windo
           ws.asp>
    
         * Microsoft   Security  Bulletin  MS04-011  -  Security  Update
    for
           Microsoft Windows (835732) -
     
    <http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx>
    
         * Microsoft  Security  Bulletin  MS04-012  -  Cumulative  Update
    for
           Microsoft RPC/DCOM (828741) -
     
    <http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx>
    
         * Microsoft  Security Bulletin MS04-013 - Cumulative Security
    Update
           for Outlook Express (837009) -
     
    <http://www.microsoft.com/technet/security/bulletin/MS04-013.mspx>
    
         * Microsoft  Security  Bulletin  MS04-014  -  Vulnerability  in
    the
           Microsoft  Jet Database Engine Could Allow Code Execution
    (837001)
           -
     
    <http://www.microsoft.com/technet/security/bulletin/MS04-014.mspx>
    
         * Microsoft  Security  Response  Center  Security  Bulletin
    Severity
           Rating System (Revised, November 2002) -
           <http://www.microsoft.com/technet/security/bulletin/rating.mspx>
    
         * Vulnerability  Note  VU#323070:  Outlook  Express  MHTML
    protocol
           handler  does  not  properly validate location of alternate data
    -
           <http://www.kb.cert.org/vuls/id/323070>
    
         * Vulnerability   Note   VU#547820:   Microsoft   Windows
    DCOM/RPC
           vulnerability - <http://www.kb.cert.org/vuls/id/547820>
    
         * Vulnerability   Note  VU#740716:  Microsoft  Jet  Database
    Engine
           database      request      handling      buffer     overflow
    -
           <http://www.kb.cert.org/vuls/id/740716>
         _________________________________________________________________
    
       Feedback  about  this  technical  alert  should  be  sent  to
    "US-CERT
       Technical Alert" at <mailto:cert@private>. Please include the
    Subject
       line "TA04-104A Feedback VU#667571".
         _________________________________________________________________
    
       Copyright 2004 Carnegie   Mellon   University.
    
       Terms   of   use: <http://www.us-cert.gov/legal.html>
    
       Revision History
    
       April 13, 2004: Initial release
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQFAfJtjXlvNRxAkFWARAmmUAJ4jbj7Mm8I5NdasPeDIliOCUTJutQCfaeoC
    uIhq7G9V+u7Cg0B78NzRMGk=
    =UEBC
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Wed Apr 14 2004 - 10:35:26 PDT