Alert: Microsoft Security Bulletin MS04-038 - Cumulative Security Update for Internet Explorer (834707)

From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: 10/12/04

  • Next message: Russ Cooper: "MajorRev: v2.0 Microsoft Security Bulletin MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution (833987)"
    Date:         Tue, 12 Oct 2004 13:24:53 -0400
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Microsoft Security Bulletin MS04-038:
    Cumulative Security Update for Internet Explorer (834707)

    Bulletin URL:
    <http://www.microsoft.com/technet/security/bulletin/MS04-038.mspx>

    Version Number: 1.0
    Issued Date: Tuesday, October 12, 2004
    Impact of Vulnerability: Remote Code Execution
    Maximum Severity Rating: Critical
    Patch(es) Replaced: This update replaces the update that is included with Microsoft Security Bulletin MS04-025. That update is also a cumulative update.
    Caveats: Microsoft Knowledge Base Article 834707 documents the currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues. This update may not include hotfixes that have been released since the release of MS04-004 or MS04-025. Customers who have received hotfixes from Microsoft or from their support providers since the release of MS04-004 or MS04-025 should review the FAQ section for this update to determine how this update might affect their operating systems. This update contains several functionality and security changes which are documented in the FAQ section for this update.

    Tested Software:
    Affected Software:
    ------------------
    * Microsoft Windows NT Server 4.0 Service Pack 6a
    * Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
    * Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
    * Microsoft Windows XP, Microsoft Windows XP Service Pack 1, and Microsoft Windows XP Service Pack 2
    * Microsoft Windows XP 64-Bit Edition Service Pack 1
    * Microsoft Windows XP 64-Bit Edition Version 2003
    * Microsoft Windows Server 2003
    * Microsoft Windows Server 2003 64-Bit Edition
    * Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me) - Review the FAQ section of this bulletin for details about these operating systems.

    Affected Components:
    --------------------
    * Internet Explorer 5.01 Service Pack 3 on Windows 2000 SP3:
    <http://tinyurl.com/5w2j8>
    * Internet Explorer 5.01 Service Pack 4 on Windows 2000 SP4:
    <http://tinyurl.com/52tn7>
    * Internet Explorer 5.5 Service Pack 2 on Microsoft Windows Me:
    <http://tinyurl.com/6s8f9>
    * Internet Explorer 6 on Windows XP:
    <http://tinyurl.com/3lgxq>
    * Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 3, on Microsoft Windows 2000 Service Pack 4, on Microsoft Windows XP, or on Microsoft Windows XP Service Pack 1:
    <http://tinyurl.com/5drps>
    * Internet Explorer 6 Service Pack 1 on Microsoft Windows NT Server 4.0 Service Pack 6a, on Microsoft Windows NT Server 4.0 Terminal Service Edition Service Pack 6, on Microsoft Windows 98, on Microsoft Windows 98 SE, or on Microsoft Windows Me:
    <http://tinyurl.com/4hltr>
    * Internet Explorer 6 for Windows XP Service Pack 1 (64-Bit Edition):
    <http://tinyurl.com/6axlt>
    * Internet Explorer 6 for Windows Server 2003:
    <http://tinyurl.com/5se7c>
    * Internet Explorer 6 for Windows Server 2003 64-Bit Edition and Windows XP 64-Bit Edition Version 2003:
    <http://tinyurl.com/4w8bb>
    * Internet Explorer 6 for Windows XP Service Pack 2:
    <http://tinyurl.com/6ok3d>

    Technical Description:
    ----------------------
    * CSS Heap Memory Corruption Vulnerability - CAN-2004-0842: A remote code execution vulnerability exists in Internet Explorer that could allow remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a malicious Web Page that could potentially allow remote code execution if a user visited a malicious Web site. An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, significant user interaction is required to exploit this vulnerability.

    * Similar Method Name Redirection Cross Domain Vulnerability - CAN-2004-0727: A vulnerability in the cross domain security model exists in Internet Explorer because of the way that Internet Explorer handles navigation methods by functions that have similar names. An attacker could exploit this vulnerability by constructing a malicious Web page that could potentially allow remote code execution if a user visited a malicious Web site. An attacker who successfully exploited this vulnerability could run malicious script code in the Local Machine security zone in Internet Explorer or access information in a different domain. In the worst case, if a user is logged on with administrative privileges, an attacker who successfully exploited this vulnerability could take complete control of an affected system.

    * Install Engine Vulnerability - CAN-2004-0216: Aremote code execution vulnerability exists in Inseng.dll that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could take complete control of the affected system.

    * Drag and Drop Vulnerability - CAN-2004-0839: A privilege elevation vulnerability exists in Internet Explorer because of the way that Internet Explorer handles Drag and Drop events. An attacker could exploit the vulnerability by constructing a malicious Web page that could potentially allow an attacker to save a file on the user's system if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. User interaction is required to exploit this vulnerability.

    * Address Bar Spoofing on Double Byte Character Set Systems Vulnerability - CAN-2004-0844: Aspoofing vulnerability exists in Internet Explorer's processing of URLs on Double Byte Character Set systems. This vulnerability could result in an incorrect URL being listed in the Address bar that is not the actual Web page that is displayed by Internet Explorer.

    * Plug-in Navigation Address Bar Spoofing Vulnerability - CAN-2004-0843: Aspoofing vulnerability exists in Internet Explorer's processing of Plug-in navigations. This vulnerability could result in an incorrect URL being listed in the Address bar that is not the actual Web page that is appearing in Internet Explorer.

    * Script in Image Tag File Download Vulnerability - CAN-2004-0841: A privilege elevation vulnerability exists in the way that Internet Explorer process script in image tags. An attacker could exploit the vulnerability by constructing a malicious Web Page that could potentially allow an attacker to save a file on the user's system if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. User interaction is required to exploit this vulnerability.

    * SSL Caching Vulnerability - CAN-2004-0845: A spoofing vulnerability exists in the way that Internet Explorer validates cached content from SSL protected Web sites. This vulnerability could allow an attacker to run script of their choice on security-enhanced Web sites.

    This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1664.40858)

    Cheers,
    Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor

    --
    NTBugtraq Editor's Note:
    Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.
    --
    

  • Next message: Russ Cooper: "MajorRev: v2.0 Microsoft Security Bulletin MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution (833987)"

    Relevant Pages