Microsoft security alert.
October 9, 2007
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 9 vulnerabilities that were fixed in 6 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 6 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Kodak Image Viewer Could Allow Remote Code Execution (MS07-055)
- Severity
- Critical 4
- Qualys ID
- 115641
- Vendor Reference
- MS07-055
- CVE Reference
- CVE-2007-2217
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
Kodak Image Viewer is vulnerable to a remote code execution issue due to insufficient handling of crafted image files.
A vulnerable version of Kodak Image Viewer exists on the target host
- Consequence
-
A remote attacker can exploit the vulnerability by constructing a specially crafted image that allows remote code execution if a user visits a Web site, views a crafted email message, or opens an email attachment.
An attacker who successfully exploits this vulnerability would gain the same user rights as the local user
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=29763117-c2dc-4746-b31e-0b27350118e6Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=be52f740-e9c9-4228-95c0-00995213bbd0Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9a5c9e5d-4908-48bf-9346-745b4c6f6d4eRefer to Micrsoft Security Bulletin MS07-055 for further details.
-
Security Update for Outlook Express and Windows Mail (MS07-056)
- Severity
- Urgent 5
- Qualys ID
- 90414
- Vendor Reference
- MS07-056
- CVE Reference
- CVE-2007-3897
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
A remote code execution vulnerability exists in Outlook Express and Windows Mail for Microsoft Vista, due to an incorrectly handled malformed NNTP response.
An attacker could exploit the vulnerability by constructing a specially crafted Web page. If a user views the Web page, the vulnerability could allow remote code execution.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October 2007 Monthly Security Updates are Now Available on the ECE (KB941202)
- Consequence
- An attacker who successfully exploits this vulnerability could gain the same user rights as the logged-on user.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (Outlook Express 5.5 Service Pack 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5AA009C9-4EDC-4F34-989B-0493549649E8Microsoft Windows 2000 Service Pack 4 (Outlook Express 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=b537115d-611c-4486-960c-08d2df450579Windows XP Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=3ed7f466-78c7-4251-ba24-8ae71ad54e18Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=6468a552-2194-4866-97d5-ff77ae205eeaWindows Server 2003 Service Pack 1 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=708926e4-f8af-4533-8747-22d6536ebd66Windows Server 2003 Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=708926e4-f8af-4533-8747-22d6536ebd66Windows Server 2003 x64 Edition (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=26720f5a-d7e9-44b9-9330-2e9faa4af0d9Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=26720f5a-d7e9-44b9-9330-2e9faa4af0d9Windows Server 2003 with SP1 for Itanium-based Systems (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=a8844fbb-5b2c-41f3-80f1-dce563aa7cb7Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=a8844fbb-5b2c-41f3-80f1-dce563aa7cb7Windows Vista (Windows Mail):
http://www.microsoft.com/downloads/details.aspx?FamilyId=b6ac8d93-adc3-4ec3-bad1-4990bd7d52b4For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS07-056.
-
Cumulative Security Update for Internet Explorer (MS07-057)
- Severity
- Critical 4
- Qualys ID
- 100052
- Vendor Reference
- MS07-057
- CVE Reference
- CVE-2007-1091, CVE-2007-3826, CVE-2007-3892, CVE-2007-3893
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
This critical security update resolves vulnerabilities involving Internet Explorer which may allow remote code execution.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October 2007 Monthly Security Updates are Now Available on the ECE (KB939653)
- Consequence
-
These vulnerabilities can be exploited by an attacker by constructing a specially crafted Web page. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
The vulnerabilities are addressed by not allowing the browser window content to persist after navigation has occurred. Also the script error exception handling is modified so that no attempt is made to access the freed memory.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 5.01 Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=95827F3F-A984-4E34-A949-D16A0614121AMicrosoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=DF3BA596-7C5B-4151-9884-6957AA884AABWindows XP Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=513A8320-6D36-4FC9-A38A-867192B55B53Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=AE8A26D8-1910-4B8C-8A73-6E2FA6B5B29FWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4AEFAA38-8757-4E6E-8924-57CABD1C2FC3Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=88ABA9DD-653B-4CDF-A513-CCA32A7D7E41Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=309A8F10-C7EA-4961-A969-092B0C4D7BBCWindows XP Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4CA0AC93-BF51-40FE-A1BA-CB3E0A36D8B5Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=DBD284D0-2664-42A4-AD16-A0535244C81CWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=0A31C451-32F4-4551-AE45-D600F8B3B11BFor a complete list of patch download links, please refer to Micrsoft Security Bulletin MS07-057.
-
RPC Could Allow Denial of Service (MS07-058)
- Severity
- Serious 3
- Qualys ID
- 90412
- Vendor Reference
- MS07-058
- CVE Reference
- CVE-2007-2228
- CVSS Scores
- Base 7.8 / Temporal 5.8
- Description
-
A denial of service vulnerability exists in the remote procedure call (RPC) facility due to a failure in communicating with the NTLM security provider when performing authentication of RPC requests.
An anonymous attacker could exploit the vulnerability by sending a specially crafted RPC authentication request to a computer over the network.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October 2007 Monthly Security Updates are Now Available on the ECE (KB933729)
- Consequence
- An attacker who successfully exploits this vulnerability could cause the computer to stop responding and automatically restart.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=6c7fb9a8-1d8d-4307-b5c6-bc6c28ee09deWindows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1fee539c-ab86-4298-b6f4-22ce31ee7b8bWindows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=ac7bd100-0a03-426b-adc8-0516c602a280Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=011593a0-f37e-4578-bee1-a985639b521bWindows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=e9bb8df5-f39e-4473-9d0c-e84430c7f859Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=492ae87c-047c-45c1-ad04-ee36352de85bWindows Vista:
http://www.microsoft.com/downloads/details.aspx?FamilyId=ceca7f8c-7b56-48fc-8c17-87ffadf25629Windows Vista x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=7625f5a4-2921-41ce-986d-4cc0c264135cRefer to Micrsoft Security Bulletin MS07-058 for further details.
-
Windows SharePoint Could Result in Elevation of Privilege (MS07-059)
- Severity
- Serious 3
- Qualys ID
- 90413
- Vendor Reference
- MS07-059
- CVE Reference
- CVE-2007-2581
- CVSS Scores
- Base 4.3 / Temporal 3.4
- Description
- A security vulnerability exists in Windows Sharepoint Services Version 3.0 and Office Sharepoint Server 2007. This may result in elevation of privilege and information disclosure to the attacker.
- Consequence
-
This vulnerability is present in the affected software beacuse of the way it validates URL-encoded requests.
This may allow an attacker to run an arbitrary script that could result in elevation of privilege within the SharePoint site, as opposed to elevation of privilege within the workstation or server environment. Also, information disclosure is possible as it may allow an attacker to run arbitrary script to modify a user's cache.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows Server 2003 Service Pack 1 (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=76FC2225-2802-46E5-A294-A842E3841877Windows Server 2003 Service Pack 2 (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=76FC2225-2802-46E5-A294-A842E3841877Windows Server 2003 x64 Edition (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=667335DD-DF2E-4F14-A130-5758701BE055Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=667335DD-DF2E-4F14-A130-5758701BE055Microsoft Office SharePoint Server 2007:
http://www.microsoft.com/downloads/details.aspx?FamilyId=AAEA9695-F541-4C4C-9107-81EAD5CFC8C9Microsoft Office SharePoint Server 2007 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1D319164-D133-4493-BE27-1AEDA62362C4Refer to Microsoft Security Bulletin MS07-059 for further details.
-
Microsoft Word Could Allow Remote Code Execution (MS07-060)
- Severity
- Critical 4
- Qualys ID
- 110065
- Vendor Reference
- MS07-060
- CVE Reference
- CVE-2007-3899
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
Microsoft Word is vulnerable to remote code execution due to insufficent handling of malformed strings within a crafted Word file.
A vulnerable version of Word exists on the target host.
- Consequence
- If these vulnerabilities are successfully exploited, a remote attacker could run arbitrary code as the logged on user.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office 2000 Service Pack 3 (Microsoft Word 2000 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=8B3072FB-5933-47F7-A498-13A93E268E57Microsoft Office XP Service Pack 3 (Microsoft Word 2002 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D6B787BB-03FF-4F67-8B69-6011FB18BA75Microsoft Office 2004 for Mac:
http://www.microsoft.com/mac/downloads.aspx#Office2004Refer to Micrsoft Security Bulletin MS07-060 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.18.71-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 115641
- 90414
- 100052
- 90412
- 90413
- 110065
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.