[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[MS] Mehrere Schwachstellen im Internet Explorer - MS09-054



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgende Warnung des Microsoft Product Security
Notification Service. Wir geben diese Informationen unveraendert an Sie
weiter.

CVE-2009-1547 - Schwachstelle im Internet Explorer bei der Bearbeitung
von HTML-Responses

  Im Internet Explorer existiert eine Schwachstelle bei der Bearbeitung
  von Header-Informationen aus Datenstroemen (data stream header). Davon
  betroffen ist die Implementierung des "Content-Encoding:deflate"
  Headers. Ein entfernter Angreifer kann diese Schwachstelle mittels
  einer speziell konstruierten Web-Seite ausnutzen, um beliebige Befehle
  mit den Rechten des Benutzers auszufuehren.

CVE-2009-2530 / CVE-2009-2531 - Schwachstellen im Internet Explorer beim
Zugriff auf Objekte

  Aufgrund einer Schwachstelle im Internet Explorer beim Aufruf des
  Copy-Constructors fuer bestimmte DOM-Objekte wird ein noch verwendeter
  Speicherbereich fehlerhafterweise bereits freigegeben. Ein entfernter
  Angreifer kann diese Schwachstelle mittels einer speziell
  konstruierten Web-Seite ausnutzen, um beliebige Befehle mit den
  Rechten des Benutzers auszufuehren.

CVE-2009-2529 - Schwachstelle im Internet Explorer bei der Bearbeitung
von HTML-Komponenten

  Eine HTML-Komponente ist praktisch ein Objekt, das eine HTML-Seite mit
  Methoden zum Zugriff darauf buendelt. Die Komponenten unterstuetzen
  beispielsweise den dynamischen Aufbau und Aenderungen von HTML-Seiten.
  Im Internet Explorer existiert eine Schwachstelle bei der Validierung
  von Argumenten durch HTML-Komponenten. Ein entfernter Angreifer kann
  diese Schwachstelle mittels einer speziell konstruierten Web-Seite
  ausnutzen, um beliebige Befehle mit den Rechten des Benutzers
  auszufuehren.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Internet Explorer 5.01
  Internet Explorer 6
  Internet Explorer 7
  Internet Explorer 8

  Microsoft Windows 2000 Service Pack 4
  Windows XP (x86, x64)
  Windows Server 2003 (x86, x64 und Itanium)
  Windows Server 2008 (x86, x64 und Itanium)
  Windows Vista (x86, x64)
  Windows 7 (x86, x64)
  Windows Server 2008 R2 (x64 und Itanium)

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

Hersteller Advisory:
  http://www.microsoft.com/technet/security/bulletin/ms09-054.mspx


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,
Jan Kohlrausch (CSIRT), Phone +49 40 808077-555

DFN-CERT Services GmbH, https://www.dfn-cert.de,  Phone  +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805,  Ust-IdNr.:  DE 232129737
Sachsenstrasse 5,   20097 Hamburg/Germany, CEO: Dr. Klaus-Peter Kossakowski

                                     CarmentiS - Early Warning Expertise
                                               https://www.carmentis.org

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2009.1403
             Cumulative Security Update for Internet Explorer
                              14 October 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Internet Explorer
Publisher:         Microsoft
Operating System:  Windows 2000
                   Windows XP
                   Windows Server 2003
                   Windows Vista
                   Windows Server 2008
                   Windows 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2009-2531 CVE-2009-2530 CVE-2009-2529
                   CVE-2009-1547  

Original Bulletin: 
   http://www.microsoft.com/technet/security/bulletin/ms09-054.mspx

- - --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS09-054 - Critical

Cumulative Security Update for Internet Explorer (974455)

Published: October 13, 2009

Version: 1.0

General Information

Executive Summary

  This security update resolves three privately reported vulnerabilities and 
  one publicly disclosed vulnerability in Internet Explorer. The 
  vulnerabilities could allow remote code execution if a user views a specially 
  crafted Web page using Internet Explorer. Users whose accounts are configured 
  to have fewer user rights on the system could be less impacted than users who 
  operate with administrative user rights.

  This security update is rated Critical for all supported releases of Internet 
  Explorer: Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 
  Service Pack 1, Internet Explorer 7, and Internet Explorer 8. For more 
  information, see the subsection, Affected and Non-Affected Software, in this 
  section.

  The security update addresses these vulnerabilities by modifying the way that 
  Internet Explorer processes data stream headers, validates arguments, and 
  handles objects in memory. 

  Recommendation. The majority of customers have automatic updating enabled and 
  will not need to take any action because this security update will be 
  downloaded and installed automatically. Customers who have not enabled 
  automatic updating need to check for updates and install this update 
  manually. For information about specific configuration options in automatic 
  updating, see Microsoft Knowledge Base Article 294871.

  For administrators and enterprise installations, or end users who want to 
  install this security update manually, Microsoft recommends that customers 
  apply the update immediately using update management software, or by checking 
  for updates using the Microsoft Update service.

  See also the section, Detection and Deployment Tools and Guidance, later in 
  this bulletin.

  Known Issues. None

Affected Software

    Internet Explorer 5.01 Service Pack 4 when installed on Microsoft Windows 
    2000 Service Pack 4
    
    Internet Explorer 6 Service Pack 1 when installed on Microsoft Windows 
    2000 Service Pack 4

    Internet Explorer 6 for Windows XP Service Pack 2 and Windows XP Service 
    Pack 3

    Internet Explorer 6 for Windows XP Professional x64 Edition Service Pack 2

    Internet Explorer 6 for Windows Server 2003 Service Pack 2

    Internet Explorer 6 for Windows Server 2003 x64 Edition Service Pack 2

    Internet Explorer 6 for Windows Server 2003 with SP2 for Itanium-based 
    Systems

    Internet Explorer 7 for Windows XP Service Pack 2 and Windows XP Service 
    Pack 3

    Internet Explorer 7 for Windows XP Professional x64 Edition Service Pack 2

    Internet Explorer 7 for Windows Server 2003 Service Pack 2

    Internet Explorer 7 for Windows Server 2003 x64 Edition Service Pack 2

    Internet Explorer 7 for Windows Server 2003 with SP2 for Itanium-based 
    Systems

    Internet Explorer 7 in Windows Vista, Windows Vista Service Pack 1, and
    Windows Vista Service Pack 2

    Internet Explorer 7 in Windows Vista x64 Edition, Windows Vista x64 Edition 
    Service Pack 1, and Windows Vista x64 Edition Service Pack 2

    Internet Explorer 7 in Windows Server 2008 for 32-bit Systems and Windows 
    Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server 
    Core installation not affected)

    Internet Explorer 7 in Windows Server 2008 for x64-based Systems and 
    Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 
    2008 Server Core installation not affected)

    Internet Explorer 7 in Windows Server 2008 for Itanium-based Systems and 
    Windows Server 2008 for Itanium-based Systems Service Pack 2

    Internet Explorer 8 for Windows XP Service Pack 2 and Windows XP Service 
    Pack 3

    Internet Explorer 8 for Windows XP Professional x64 Edition Service Pack 2

    Internet Explorer 8 for Windows Server 2003 Service Pack 2

    Internet Explorer 8 for Windows Server 2003 x64 Edition Service Pack 2

    Internet Explorer 8 in Windows Vista, Windows Vista Service Pack 1, and
    Windows Vista Service Pack 2

    Internet Explorer 8 in Windows Vista x64 Edition, Windows Vista x64 Edition 
    Service Pack 1, and Windows Vista x64 Edition Service Pack 2

    Internet Explorer 8 in Windows Server 2008 for 32-bit Systems and Windows 
    Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server 
    Core installation not affected)

    Internet Explorer 8 in Windows Server 2008 for x64-based Systems and 
    Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 
    2008 Server Core installation not affected)

    Internet Explorer 8 in Windows 7 for 32-bit Systems

    Internet Explorer 8 in Windows 7 for x64-based Systems

    Internet Explorer 8 in Windows Server 2008 R2 for x64-based Systems 
   (Windows Server 2008 R2 Server Core installation not affected)

    Internet Explorer 8 in Windows Server 2008 R2 for Itanium-based Systems

Vulnerability Information
	
Data Stream Header Corruption Vulnerability - CVE-2009-1547

  A remote code execution vulnerability exists in the way that Internet 
  Explorer processes data stream headers in specific situations. An attacker 
  could exploit the vulnerability by constructing a specially crafted Web page. 
  When a user views the Web page, the vulnerability could allow remote code 
  execution. An attacker who successfully exploited this vulnerability could 
  gain the same user rights as the logged-on user. If a user is logged on with 
  administrative user rights, an attacker who successfully exploited this 
  vulnerability could take complete control of an affected system. An attacker 
  could then install programs; view, change, or delete data; or create new 
  accounts with full user rights.
	
HTML Component Handling Vulnerability - CVE-2009-2529

  A remote code execution vulnerability exists in the way that Internet 
  Explorer handles argument validation of a variable in specific situations. An 
  attacker could exploit the vulnerability by constructing a specially crafted 
  Web page. When a user views the Web page, the vulnerability could allow 
  remote code execution. An attacker who successfully exploited this 
  vulnerability could gain the same user rights as the logged-on user. If a 
  user is logged on with administrative user rights, an attacker who 
  successfully exploited this vulnerability could take complete control of an 
  affected system. An attacker could then install programs; view, change, or 
  delete data; or create new accounts with full user rights.
	
Uninitialized Memory Corruption Vulnerability - CVE-2009-2530

  A remote code execution vulnerability exists in the way Internet Explorer 
  accesses an object that has not been correctly initialized or has been 
  deleted. An attacker could exploit the vulnerability by constructing a 
  specially crafted Web page. When a user views the Web page, the 
  vulnerability could allow remote code execution. An attacker who successfully 
  exploited this vulnerability could gain the same user rights as the 
  logged-on user. If a user is logged on with administrative user rights, an 
  attacker who successfully exploited this vulnerability could take complete 
  control of an affected system. An attacker could then install programs; view, 
  change, or delete data; or create new accounts with full user rights.

Uninitialized Memory Corruption Vulnerability - CVE-2009-2531

  A remote code execution vulnerability exists in the way Internet Explorer 
  accesses an object that has not been correctly initialized or has been 
  deleted. An attacker could exploit the vulnerability by constructing a 
  specially crafted Web page. When a user views the Web page, the vulnerability 
  could allow remote code execution. An attacker who successfully exploited 
  this vulnerability could gain the same user rights as the logged-on user. If 
  a user is logged on with administrative user rights, an attacker who 
  successfully exploited this vulnerability could take complete control of an 
  affected system. An attacker could then install programs; view, change, or 
  delete data; or create new accounts with full user rights.

- - --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@xxxxxxxxxxxxxx
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@xxxxxxxxxxxxxx
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
- -----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFK1T5zNVH5XJJInbgRAl3XAJ0Trx4lPHHlLG+UZwj78DKNrK7A6QCeI9b7
iuAyxpexC2skXqnzMYhjtvE=
=vKGE
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFK1Z/dk0kIxZMiiQ8RAi51AJ9ulSMGIQSN22g2flGndvCI6aZytgCff1Oq
rrianbEmAzoWDihdmPxOQZQ=
=cNVs
-----END PGP SIGNATURE-----