Alert: Microsoft Security Bulletin MS05-001 - Vulnerability in HTML Help Could Allow Code Execution (890175)
From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: Tue, 11 Jan 2005 13:41:20 -0500 To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Microsoft Security Bulletin MS05-001:
Vulnerability in HTML Help Could Allow Code Execution (890175)
Version Number: 1.0
Issued Date: Tuesday, January 11, 2005
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Patch(es) Replaced: None
Caveats: Microsoft Knowledge Base Article 890175 documents the currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues. Windows NT Server 4.0 and Windows NT 4.0 Terminal Server Edition are not affected by default. However, if you have installed Internet Explorer 6.0 Service Pack 1, which is the only supported version of Internet Explorer for Windows NT Server 4.0 and Windows NT 4.0 Terminal Server Edition, you will have the affected component on your system. An update is available for these configurations: see the download for Internet Explorer 6 Service Pack 1 under Affected Components.
* Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows XP 64-Bit Edition Service Pack 1
* Microsoft Windows XP 64-Bit Edition Version 2003
* Microsoft Windows Server 2003
* Microsoft Windows Server 2003 64-Bit Edition Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me) - Review the FAQ section of this bulletin for details about these operating systems.
* Internet Explorer 6.0 Service Pack 1 when installed on Microsoft Windows NT Server 4.0 Service Pack 6a or Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
* HTML Help ActiveX control Cross Domain Vulnerability - CAN-2004-1043: A cross-domain vulnerability exists in HTML Help ActiveX control that could allow information disclosure or remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a malicious Web page that could potentially allow remote code execution if a user visited that page. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1837.24459)
Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor
-- NTBugtraq Editor's Note: Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered. --