US-CERT Technical Cyber Security Alert TA05-221A -- Microsoft Windows and Internet Explorer Vulnerabilities

10/08/05, US-CERT Technical Cyber Security Alert TA05-221A -- Microsoft Windows and Internet Explorer Vulnerabilities
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: US-CERT Technical Cyber Security Alert TA05-221A -- Microsoft Windows and Internet Explorer Vulnerabilities
From: CERT Advisory <cert-advisory@cert.org>
Date: Tue, 9 Aug 2005 19:16:24 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

           Technical Cyber Security Alert TA05-221A
   Microsoft Windows and Internet Explorer Vulnerabilities

   Original release date: August 09, 2005
   Last revised: --
   Source: US-CERT

Systems Affected

     * Microsoft Windows
     * Microsoft Internet Explorer

   For more complete information, refer to the Microsoft Security
   Bulletin Summary for August, 2005.

Overview

   Microsoft has released updates that address critical vulnerabilities
   in Windows and Internet Explorer. Exploitation of these
   vulnerabilities could allow a remote, unauthenticated attacker to
   execute arbitrary code or cause a denial of service on an affected
   system.

I. Description

   Microsoft Security Bulletins for August, 2005 address vulnerabilities
   in Windows and Internet Explorer. Further information is available in
   the following Vulnerability Notes:

   VU#965206 - Microsoft Internet Explorer JPEG rendering library
   vulnerable to buffer overflow

   Microsoft Internet Explorer contains a flaw related to JPEG image
   rendering that may allow an attacker to remotely execute arbitrary
   code.
   (CAN-2005-1988)


   VU#959049 - Several COM objects cause memory corruption in Internet
   Explorer

   Microsoft Internet Explorer allows instantiation of non-ActiveX COM
   objects, which may allow an attacker to execute arbitrary code or
   crash Internet Explorer.
   (CAN-2005-1990)


   VU#998653 - Microsoft Plug and Play contains a buffer overflow
   vulnerability 

   Microsoft Plug and Play contains a flaw in the handling of message
   buffers that may result in a local or remote denial-of-service
   condition and arbitrary code execution.
   (CAN-2005-1983)


   VU#490628 - Microsoft Remote Desktop Protocol service contains an
   unspecified vulnerability

   An input validation error in the Microsoft Remote Desktop Protocol
   (RDP) service may allow a remote attacker to cause a denial-of-service
   condition.
   (CAN-2005-1218)


   VU#220821 - Microsoft Print Spooler service contains a buffer overflow

   A buffer overflow in the Microsoft Print Spooler service may allow a
   remote attacker to execute arbitrary code on a vulnerable system.
   (CAN-2005-1984)

II. Impact

   Exploitation of these vulnerabilities may allow a remote,
   unauthenticated attacker to execute arbitrary code with SYSTEM
   privileges or with the privileges of the user. If the user is logged
   on with administrative privileges, the attacker could take complete
   control of an affected system. An attacker may also be able to cause a
   denial of service.

III. Solution

Apply Updates

   Microsoft has provided the updates for these vulnerabilities in the
   Security Bulletins and on the Microsoft Update site.

Workarounds

   Please see the individual Vulnerability Notes for workarounds.

Appendix A. References

     * Microsoft Security Bulletin Summary for August, 2005 -
       <http://www.microsoft.com/technet/security/bulletin/ms05-aug.mspx>

     * US-CERT Vulnerability Note VU#965206 -
       <http://www.kb.cert.org/vuls/id/965206>

     * US-CERT Vulnerability Note VU#959049 -
       <http://www.kb.cert.org/vuls/id/959049>

     * US-CERT Vulnerability Note VU#998653 -
       <http://www.kb.cert.org/vuls/id/998653>

     * US-CERT Vulnerability Note VU#490628 -
       <http://www.kb.cert.org/vuls/id/490628>

     * US-CERT Vulnerability Note VU#220821 -
       <http://www.kb.cert.org/vuls/id/220821>

     * CAN-2005-1988 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1988>

     * CAN-2005-1990 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1990>

     * CAN-2005-1983 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1983>

     * CAN-2005-1218 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1218>

     * CAN-2005-1984 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1984>

     * Microsoft Update - <https://update.microsoft.com/microsoftupdate>

     * Microsoft Update Overview -
       <http://www.microsoft.com/technet/prodtechnol/microsoftupdate/defa
       ult.mspx>
   _________________________________________________________________

   Feedback can be directed to the US-CERT Technical Staff.

   Please send mail to cert@cert.org with the subject:

   "TA05-221A Feedback VU#959049"
   _________________________________________________________________

   This document is available at

   <http://www.us-cert.gov/cas/techalerts/TA05-221A.html>
   _________________________________________________________________

   Produced 2005 by US-CERT, a government organization.
   _________________________________________________________________

   Terms of use:

   <http://www.us-cert.gov/legal.html>
   _________________________________________________________________

   Revision History

   August 09, 2005: Initial Release



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQvk4zxhoSezw4YfQAQKraAf/b5uL0gaNUl6kICwCTHqpvqik4vW/k6h6
6wmx8K/r1cxQibBE4+3JZ0TxTLaa3nJIDoX7Q/MQxvlOowDd2OMh73Lf/Vm3+myj
V+IMm1bq7EjgJ5o3AbailAzHYwuju+SGNODS8X94BtLkVVlTE6kT4It9FU6oV0Wf
ktkJkuMUxc6tvvi/QutC8Xi5mZZS9FgpAZxJthZhEZ94Qq1ftMrjQeFnEQnzEGLs
kT0CA7pNb8PReO19s9gfdiLiEPhHhBx0A9HFC3+1K7/FurYFblXmVaPi9iMdeIdF
JSGbequI70AjZnl8PcLj22wngqPKez25SvBZemg4HBEdSYA3mBWK1g==
=kIj8
-----END PGP SIGNATURE-----

Previous message sorted by date: US-CERT Technical Cyber Security Alert TA05-210A -- Cisco IOS IPv6 Vulnerability
Next message sorted by date: US-CERT Technical Cyber Security Alert TA05-224A -- VERITAS Backup Exec Uses Hard-Coded Authentication Credentials
Previous message sorted by thread: US-CERT Technical Cyber Security Alert TA05-210A -- Cisco IOS IPv6 Vulnerability
Next message by thread: US-CERT Technical Cyber Security Alert TA05-224A -- VERITAS Backup Exec Uses Hard-Coded Authentication Credentials
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Aug 2005