[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 590/03 - Microsoft Windows Security Bulletin Summary - Oct 2003



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 590/03 dated 30.10.03  Time: 09:50
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------
Title
=====
Microsoft Windows Security Bulletin Summary for October 2003.

Detail
====== 
Included in this advisory are updates for five newly discovered 
vulnerabilities in Microsoft Windows.

- ---------------------------------------------------------------------
Issued: October 15, 2003 
Updated: October 29, 2003
Version Number: 3.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp
- - --------------------------------------------------------------------
Reason for Major Revision
=========================
Subsequent to the release of the Windows Security Bulletin Summary 
for October, the following bulletins have undergone a major revision 
increment.  Please see the appropriate bulletin section of this 
email for more details.

- - - MS03-042
- - - MS03-043
- - - MS03-045

Summary:
========
Included in this advisory are updates for five newly discovered 
vulnerabilities in Microsoft Windows. These vulnerabilities, 
broken down by severity are: 

** Critical Security Bulletins

    MS03-041 - Vulnerability in Authenticode Could Allow Remote      
             
	       Code Execution (823182)

             - Affected Software: 
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition

             - Impact: Remote Code Execution
             - Version Number: 1.1 

    MS03-042 - Buffer Overflow in the Windows Troubleshooter 
	       ActiveX Control Could Allow Code Execution (826232)

             - Affected Software:
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4 

             - Impact: Remote Code Execution
             - Version Number: V2.0

     Reason for Major Revision, V2.0 October 29, 2003:
     =================================================
     Microsoft re-issued this bulletin on October 29, 2003 to 
     advise on the availability of an updated Windows 2000 patch.

     This revised patch corrects the Debug Programs
(SeDebugPrivilege)
     user right issue that some customers experienced with the 
     original patch that is discussed in Knowledge Base Article
830846.

     This problem is unrelated to the security vulnerability 
     discussed in this bulletin. Customers who have already applied 
     the patch are protected against the vulnerability discussed in 
     this bulletin.

    MS03-043 - Buffer Overrun in Messenger Service Could Allow 
	       Code Execution (828035)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition 

             - Impact: Remote Code Execution
             - Version Number: 2.0
     
     Reason for Major Revision, V2.0 October 29, 2003:
     =================================================
     Microsoft re-issued this bulletin on October 29, 2003 to 
     advise on the availability of an updated Windows 2000,
     Windows XP, and Windows Server 2003 patch.

     This revised patch corrects the Debug Programs
(SeDebugPrivilege)
     user right issue that some customers experienced with the 
     original patch that is discussed in Knowledge Base Article
830846.

     This problem is unrelated to the security vulnerability 
     discussed in this bulletin. Customers who have already applied 
     the patch are protected against the vulnerability discussed in 
     this bulletin.

    MS03-044 - Buffer Overflow in Windows Help and Support Center 
               Could lead to System Compromise (825119)

             - Affected Software:
               - Windows Millennium Edition
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition 

             - Impact: Remote Code Execution
             - Version Number: 1.1


** Important Security Bulletins

    MS03-045 - Buffer Overrun in the ListBox and in the ComboBox   
               Control Could Allow Code Execution (824141)

             - Affected Software:
               - Windows NT Workstation 4.0, Service Pack 6a
               - Windows NT Server 4.0, Service Pack 6a
               - Windows NT Server 4.0, Terminal Server Edition,  
                 Service Pack 6
               - Windows 2000, Service Pack 2
               - Windows 2000, Service Pack 3, Service Pack 4
               - Windows XP Gold, Service Pack 1
               - Windows XP 64-bit Edition
               - Windows XP 64-bit Edition Version 2003
               - Windows Server 2003
               - Windows Server 2003 64-bit Edition 

             - Impact: Remote Code Execution
             - Version Number: 3.0

     Reason for Major Revision, V3.0 October 29, 2003:
     =================================================
     Microsoft re-issued this bulletin on October 29, 2003 to 
     advise on the availability of an updated Windows XP
     patch. 

     This revised patch corrects the Debug Programs
(SeDebugPrivilege)
     user right issue that some customers experienced with the 
     original patch that is discussed in Knowledge Base Article
830846.

     This problem is unrelated to the security vulnerability 
     discussed in this bulletin. Customers who have already applied 
     the patch are protected against the vulnerability discussed in 
     this bulletin.
    
Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details, 
Workarounds, answers to Frequently Asked Questions, and Patch 
Deployment Information please read the Microsoft Windows 
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp 

Acknowledgments:
================
Microsoft thanks the following for working with us to protect 
customers:

- - - Greg Jones of KPMG UK (http://www.kpmg.co.uk) and 
     Cesar Cerrudo (cesarc56@xxxxxxxxx)
     for reporting the issue described in MS03-042. 

- - - The Last Stage of Delirium Research Group (http://lsd-pl.net)
     for reporting the issue in MS03-043. 

- - - David Litchfield of Next Generation Security Software Ltd.
     (http://www.nextgenss.com)
     for reporting the issue in MS03-044. 

- - - Brett Moore of Security-Assessment.com 
     (http://www.security-assessment.com)
     for reporting the issue in MS03-045. 

Support: 
========
Technical support is available from Microsoft Product Support 
Services at 1-866-PC SAFETY (1-866-727-2338). There is no 
charge for support calls associated with security patches.
 
Revisions: 
==========
* V1.0 October 15, 2003: Bulletin Created. 
* V2.0 October 22, 2003: Updated to include details of the 
  major revisions in MS03-045.
* V3.0 October 29, 2003: Updated to include details of the 
  major revisions in MS03-042, MS03-043, MS03-045.

********************************************************************
Protect your PC: Microsoft has provided information on how you 
can help protect your PC at the following locations: 
http://www.microsoft.com/technet/security/tips/pcprotec.asp 
Mitigation Strategies: Additional mitigation strategies and 
techniques for securing corporate infrastructures can be found 
at: http://www.microsoft.com/technet/mitigation.asp 

If you receive an e-mail that claims to be distributing a 
Microsoft security patch, it is a hoax that may be distributing a 
virus. Microsoft does not distribute security patches via e-mail. 
You can learn more about Microsoft's software distribution 
policies here:
http://www.microsoft.com/technet/security/policy/swdist.asp
********************************************************************
- - --------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT 
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING 
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE 
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, 
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL 
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN 
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY 
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING 
LIMITATION MAY NOT APPLY.

- --------------------------------------------------------------------------------
For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Microsoft for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBP6DeJopao72zK539AQGgpQP9GhaEHZhBjM4FSbwzAM9uQNWKbyJYuClc
kHs4yJaaZYRcbfCeS4RrLEJsuftl8zMSsfzHF0JmEB7K2QF9DI0nr6VBhM3CpgzM
XPdr5Z8Iq0T/ZcAuCpQaVXyCgxTMp5YpK+5qqYkzU7zlk6jYt6Cnr8FEBWpmkpv3
nianpuw+DYI=
=JLv3
-----END PGP SIGNATURE-----