MinorRev: Microsoft Security Bulletin MS04-024 - Vulnerability in Windows Shell Could Allow Remote Code Execution (839645)
From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: Tue, 13 Jul 2004 21:46:59 -0400 To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Microsoft Security Bulletin MS04-024:
Vulnerability in Windows Shell Could Allow Remote Code Execution (839645)
Reason for Revision: Updated file manifest information for the Windows XP Packages
Version Number: 1.2
Issued Date: Tuesday, July 13, 2004
Revision Date: Tuesday, July 13, 2004
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Patch(es) Replaced: This update replaces MS03-027 on Windows XP. This update does not replace MS03-027 on Windows NT 4.0, on Windows 2000, or on Windows Server 2003.
* Microsoft Windows NT. Workstation 4.0 Service Pack 6a
* Microsoft Windows NT Server 4.0 Service Pack 6a
* Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
* Microsoft Windows NT. Workstation 4.0 Service Pack 6a and NT Server 4.0 Service Pack 6a with Active Desktop
* Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service Pack 3, Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP and Microsoft Windows XP Service Pack 1
* Microsoft Windows XP 64-Bit Edition Service Pack 1
* Microsoft Windows XP 64-Bit Edition Version 2003
* Microsoft Windows Server(tm) 2003
* Microsoft Windows Server 2003 64-Bit Edition Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me) - Review the FAQ section of this bulletin for details about these operating systems.
* Windows Shell Vulnerability - CAN-2004-0420: A remote code execution vulnerability exists in the way that the Windows Shell launches applications. An attacker could exploit the vulnerability if a user visited a malicious Web site. If a user is logged on with administrative privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system. However, user interaction is required to exploit this vulnerability.
* v1.0 - 7/13/2004: Bulletin published
* v1.1 - 7/13/2004: Updated mitigating factors
* v1.2 - 7/13/2004: Updated file manifest information for the Windows XP Packages
This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1642.17968)
Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor
NTBugtraq Editor's Note:
Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.