[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[MS] Schwachstelle im Windows Hilfe-System - MS04-015



-----BEGIN PGP SIGNED MESSAGE-----

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgende Warnung des Microsoft Product Security
Notification Service. Wir geben diese Informationen unveraendert an Sie
weiter.

Bitte beachten Sie, dass diese Schwachstelle zwar der Schwachstelle in
MS04-011 sehr aehnlich ist, sich aber von dieser unterscheidet.

Der Help und Support Center (HSC) bietet Online-Hilfe an und kann durch
"hcp://" URLs aufgerufen werden. Der HSC beinhaltet einige HTML und
JavaScript Dateien, die in der "My Computer" Zone ausgefuehrt werden.

CAN-2004-0199 - Schwachstelle im Help und Support Center

  Ein Angreifer kann durch durch eine entsprechend konstruierte "HCP://"
  URL den DVD Upgrade Dialog im Help und Support Center mit einer selbst
  vorgegebenen URL aufrufen. Durch diese Schwachstelle wird dann
  nachfolgend Skriptcode des Angreifers mit den Rechten des Benuzters
  ausgefuehrt("My Computer" Zone).

  Die Schwachstelle kann durch eine entsprechend konstruierte HTML Seite
  oder HTML E-Mail ausgenutzt werden. Allerdings ist fuer das Ausnuzten
  mehrfache Interaktion des Benutzers beim DVD Upgrade Dialog
  erforderlich.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Windows XP and Windows XP Service Pack 1 
  Windows XP 64-Bit Edition Service Pack 1 
  Windows XP 64-Bit Edition Version 2003 
  Windows Server 2003 
  Windows Server 2003 64-Bit Edition

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt:
Falls der Help und Support Center Service deaktiviert ist, beachten
Sie bitte den Knowledge Base Article 841996:

  http://support.microsoft.com/default.aspx?scid=kb;en-us;841996

Patches:

Microsoft Windows XP und Microsoft Windows XP SP1 (englisch)

 ftp://ftp.cert.dfn.de/pub/vendor/microsoft/winxp/Security_Bulletins/WindowsXP-KB840374-x86-ENU.EXE

Microsoft Windows XP und Microsoft Windows XP SP1 (deutsch)

 ftp://ftp.cert.dfn.de/pub/vendor/microsoft/winxp/Security_Bulletins/WindowsXP-KB840374-x86-DEU.EXE

Microsoft Windows XP 64-Bit Edition Service Pack 1 (englisch)
Microsoft Windows XP 64-Bit Edition Version 2003 (englisch)

ftp://ftp.cert.dfn.de/pub/vendor/microsoft/winxp/Security_Bulletins/WindowsXP-KB840374-IA64-ENU.EXE

Microsoft Windows Server 2003 (englisch)

 ftp://ftp.cert.dfn.de/pub/vendor/microsoft/win2003/Security_Bulletins/WindowsServer2003-KB840374-x86-ENU.EXE

Microsoft Windows Server 2003 (deutsch)

 ftp://ftp.cert.dfn.de/pub/vendor/microsoft/win2003/Security_Bulletins/WindowsServer2003-KB840374-x86-DEU.EXE

Microsoft Windows Server 2003 64-Bit Edition (englisch)

 ftp://ftp.cert.dfn.de/pub/vendor/microsoft/win2003/Security_Bulletins/WindowsServer2003-KB840374-IA64-ENU.EXE

Microsoft Windows Server 2003 64-Bit Edition (deutsch)

ftp://ftp.cert.dfn.de/pub/vendor/microsoft/win2003/Security_Bulletins/WindowsServer2003-KB840374-IA64-DEU.EXE


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,


           Jan Kohlrausch, DFN-CERT

- --
Jan Kohlrausch (CSIRT), DFN-CERT Services GmbH
Web: https://www.dfn-cert.de/, Phone: +49-40-808077-555
PGP RSA/2048, A5DD03D1, A2 55 1C 51 0A 30 3E 78  5B 40 DA B7 14 F7 C9 E8


- -----BEGIN PGP SIGNED MESSAGE-----

********************************************************************
Title: Microsoft Windows Security Bulletin Summary for 
       May 2004
Issued: May 11, 2004
Version Number: 1.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winmay04.mspx

********************************************************************

Summary:
========
Included in this advisory are updates for newly discovered 
vulnerabilities in Microsoft Windows. These vulnerabilities,
broken down by severity are: 

** Important Security Bulletins

   MS04-015 - Vulnerability in Help and Support Center Could Allow
              Remote Code Execution (840374)

             - Affected Software: 
               - Windows XP and Windows XP Service Pack 1 
               - Windows XP 64-Bit Edition Service Pack 1 
               - Windows XP 64-Bit Edition Version 2003 
               - Windows Server 2003 
               - Windows Server 2003 64-Bit Edition
             - Impact: Remote Code Execution
             - Version Number: 1.0  


Update Availability:
===================
Updates are available to fix these vulnerabilities.
For additional information, including Technical Details, 
Workarounds, answers to Frequently Asked Questions, and Update 
Deployment Information please read the Microsoft Windows Security 
Bulletin Summary for this month at:
http://www.microsoft.com/technet/security/bulletin/winmay04.mspx

Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
charge for support calls associated with security updates. 
International customers can get support from their local Microsoft 
subsidiaries. Phone numbers for international support can be found 
at: http://support.microsoft.com/common/international.aspx
 
Additional Resources:
=====================
* Microsoft has created a free monthly e-mail newsletter containing
  valuable information to help you protect your network. This
  newsletter provides practical security tips, topical security
  guidance, useful resources and links, pointers to helpful
  community resources, and a forum for you to provide feedback
  and ask security-related questions.
  You can sign up for the newsletter at:

  http://www.microsoft.com/technet/security/secnews/default.mspx

* Microsoft has created a free e-mail notification service that
  serves as a supplement to the Security Notification Service
  (this e-mail). It provides timely notification of any minor
  changes or revisions to previously released Microsoft Security
  Bulletins. This new service provides notifications that are
  written for IT professionals and contain technical information
  about the revisions to security bulletins.
  Visit http://www.microsoft.com to subscribe to this service:

  - Click on Subscribe at the top of the page.
  - This will direct you via Passport to the Subscription center.
  - Under Newsletter Subscriptions you can sign up for the
    "Microsoft Security Notification Service: Comprehensive Version".

* Join Microsoft's webcast for a live discussion of the technical
  details of the this months security bulletins and steps you 
  can take to protect your environment. Details about the live 
  webcast can be found at:
  http://go.microsoft.com/fwlink/?LinkId=27513

  The on-demand version of the webcast will be available 24 hours 
  after the live webcast at: 
  http://go.microsoft.com/fwlink/?LinkId=27513

* Protect your PC: Microsoft has provided information on how you 
  can help protect your PC at the following locations: 

  http://www.microsoft.com/security/protect/

  If you receive an e-mail that claims to be distributing a 
  Microsoft security update, it is a hoax that may be distributing a 
  virus. Microsoft does not distribute security updates via e-mail. 
  You can learn more about Microsoft's software distribution 
  policies here:

 http://www.microsoft.com/technet/security/topics/policy/swdist.mspx

Acknowledgments:
================
Microsoft thanks the following for working with us to protect 
customers:

 * Donnie Werner of ExploitLabs.com for reporting the DVD 
   upgrade issue that has been addressed as part of the MS04-015
   security update.(http://www.exploitlabs.com)

Revisions: 
==========
* V1.0 May 11, 2004: Bulletin Created. 
********************************************************************
Protect your PC: Microsoft has provided information on how you 
can help protect your PC at the following locations: 
http://www.microsoft.com/security/protect/

If you receive an e-mail that claims to be distributing a 
Microsoft security update, it is a hoax that may be distributing a 
virus. Microsoft does not distribute security updates via e-mail. 
You can learn more about Microsoft's software distribution 
policies here:
http://www.microsoft.com/technet/security/topics/policy/swdist.mspx
********************************************************************

********************************************************************
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT 
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING 
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE 
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, 
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL 
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN 
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY 
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING 
LIMITATION MAY NOT APPLY.
********************************************************************

- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQEVAwUBQKERpY0ZSRQxA/Ur
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (SunOS)
Comment: Processed by Mailcrypt 3.5.8 <http://mailcrypt.sourceforge.net/>

iQEVAwUBQKHtdeI9ttyl3QPRAQHyegf/dOErNVhQP6iwzY6w7TfzKglewKqS9NJl
EKSqBjCiYOGOffimUPmaXvmtgPzZ79BPLU/fK9Z157aQodnvFfsvqqE+lZd2ovKs
LE3TQ2NtS0qwXZPIJ9wQANmmznvgUaKEuQPAD+dmf5OIhHGXRvrifvEK06iuuF5I
h0lpYROx67/zRmR9TLFjFULWd1ly26u2I8EgSJIS0heQTj7le0D3b6SuCQKHq7Z3
QKW2ZYw45FR2t/OKV1LBEBDr9/1oPk1pU6djEeKRwEnOtMK42c8cSbCM6up22Het
el6GJZZRb41M1KinWfbTNwwyXK1lvofcEtuOnksRLRoaJDBPQauQPA==
=txIa
-----END PGP SIGNATURE-----