[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 530/05 - Microsoft - July 05 Security Bulletins



 
-----BEGIN PGP SIGNED MESSAGE-----

- - - ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 530/05 dated 12.07.05  Time: 20:39
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- - - ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- - - ----------------------------------------------------------------------------------

Title
=====
Microsoft Security Bulletins - July 2005 
http://www.microsoft.com/technet/security/bulletin/ms05-jul.mspx

Detail
====== 
Microsoft have released the following 'Critical' advisories. 

1. http://www.microsoft.com/technet/security/Bulletin/MS05-035.mspx
Microsoft Security Bulletin MS05-035
Vulnerability in Microsoft Word Could Allow Remote Code Execution (903672)

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical

The vulnerability is caused due to a boundary error within the parsing 
of fonts. This can be exploited to cause a stack-based buffer overflow by 
tricking a user into opening a specially crafted Word document.

Affected Software:
Microsoft Office 2000 Software Service Pack 3(KB895333) Word 2000
Microsoft Office XP Software Service Pack 3 (KB895589) Word 2002

Microsoft Works Suites:
Microsoft Works Suite 2000 (KB895333) (same as Microsoft Office 2000 link)
Microsoft Works Suite 2001 (KB895333) (same as Microsoft Office 2000 link)
Microsoft Works Suite 2002 (KB895589) (same as the Microsoft Office XP link)
Microsoft Works Suite 2003 (KB895589) (same as the Microsoft Office XP link)
Microsoft Works Suite 2004 (KB895589) (same as the Microsoft Office XP link)

2. http://www.microsoft.com/technet/security/Bulletin/MS05-036.mspx
Microsoft Security Bulletin MS05-036
Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical

The vulnerability is caused due to a boundary error within the color management 
module when validating ICC profile format tags. This can be exploited to cause 
a buffer overflow by e.g. tricking a user into visiting a malicious web site or 
view a malicious e-mail message containing a specially crafted image file.

Affected Software:
Microsoft Windows 2000 Service Pack 4 
Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 
Microsoft Windows XP Professional x64 Edition 
Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 
Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 
with SP1 for Itanium-based Systems 
Microsoft Windows Server 2003 x64 Edition 
Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows 
Millennium Edition (ME) - Review the FAQ section of this bulletin for details about 
these operating systems.

3. http://www.microsoft.com/technet/security/Bulletin/MS05-037.mspx
Microsoft Security Bulletin MS05-037
Vulnerability in JView Profiler Could Allow Remote Code Execution (903235)

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical

An attacker could exploit the vulnerability by constructing a malicious Web page that 
could potentially allow remote code execution if a user visited the malicious Web site. 
An attacker who successfully exploited this vulnerability could take complete control 
of an affected system.

Affected Software:
Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft 
Windows Millennium Edition (ME)

Affected Components:
JView Profiler
Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4
Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, or 
on Microsoft Windows XP Service Pack 1
Internet Explorer 6 for Microsoft Windows XP Service Pack 2
Internet Explorer 6 for Microsoft Windows Server 2003 and Microsoft Windows 
Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows 
Server 2003 with SP1 for Itanium-based Systems
Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition
Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition 
Internet Explorer 5.5 Service Pack 2 on Microsoft Windows Millennium Edition
Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, on Microsoft 
Windows 98 SE or on Microsoft Windows Millennium Edition 

- - - ----------------------------------------------------------------------------------
For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- - - ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Microsoft Corporation for the 
information contained in this Briefing. 
- - - ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- - - ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQCVAwUBQtQco4pao72zK539AQGNPAQAmXnu0hC5EICZ46Ia/hKZKfprjlHRuAU/
X23dZhfkBGfFomgUwgXk0Sdv0FGo3G4/Ls37yKllAmLtXzQVYpsDBaiHGZ+kR01C
D9S+FPb2LN4mQ0tznpNvUTFx5SIX2GTbZMVjEqsY7h6uE6Rb0i30FWq5tun+NCNi
0CZGr6nai1Q=
=Gz1t
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________