Alert: Microsoft Security Bulletin MS05-007 - Vulnerability in Windows Could Allow Information Disclosure (888302)

From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: 02/08/05

  • Next message: Russ Cooper: "Alert: Microsoft Security Bulletin MS05-008 - Vulnerability in Windows Shell Could Allow Remote Code Execution (890047)"
    Date:         Tue, 8 Feb 2005 13:32:24 -0500
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Microsoft Security Bulletin MS05-007:
    Vulnerability in Windows Could Allow Information Disclosure (888302)

    Bulletin URL:
    <http://www.microsoft.com/technet/security/bulletin/MS05-007.mspx>

    Version Number: 1.0
    Issued Date: Tuesday, February 08, 2005
    Impact of Vulnerability: Information Disclosure
    Maximum Severity Rating: Important
    Patch(es) Replaced: None
    Caveats: None

    Tested Software:
    Affected Software:
    ------------------
    * Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
    <http://tinyurl.com/4vgsu>
    * Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium) Windows XP (all versions)
    <http://tinyurl.com/6nskw>

    Technical Description:
    ----------------------
    * Named Pipe Vulnerability - CAN-2005-0051: This is an information disclosure vulnerability. An attacker who successfully exploited this vulnerability could remotely read the user names for users who have an open connection to an available shared resource.

    This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1837.24459)

    Cheers,
    Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor

    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    

  • Next message: Russ Cooper: "Alert: Microsoft Security Bulletin MS05-008 - Vulnerability in Windows Shell Could Allow Remote Code Execution (890047)"

    Relevant Pages

    • SecurityFocus Microsoft Newsletter #176
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #83
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability ... Microsoft Internet Explorer History List Script Injection ... Microsoft Windows 2000 Lanman Denial of Service Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #242
      ... MICROSOFT VULNERABILITY SUMMARY ... PostNuke Blocks Module Directory Traversal Vulnerability ... Groove Networks Groove Virtual Office COM Object Security By... ... The Microsoft Windows IPV6 TCP/IP stack is prone to a "loopback" condition initiated by sending a TCP packet with the "SYN" flag set and the source address and port spoofed to equal the destination source and port. ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #44
      ... Subject: SecurityFocus Microsoft Newsletter #44 ... MS Visual Studio RAD Support Buffer Overflow Vulnerability ... Microsoft Windows 2000 SMTP Improper Authentication Vulnerability ... Microsoft Windows 2000 Telnet Multiple Sessions DoS Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #77
      ... MICROSOFT VULNERABILITY SUMMARY ... Novell GroupWise Web Root Disclosure Vulnerability ... Microsoft Windows NT Security Policy Bypass Vulnerability ... CVS Server Global Variable Denial Of Service Vulnerability ...
      (Focus-Microsoft)