Alert: Microsoft Security Bulletin MS05-008 - Vulnerability in Windows Shell Could Allow Remote Code Execution (890047)

From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: 02/08/05

  • Next message: Russ Cooper: "Alert: Microsoft Security Bulletin MS05-009 - Vulnerability in PNG Processing Could Allow Remote Code Execution (890261)"
    Date:         Tue, 8 Feb 2005 13:32:33 -0500
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    Microsoft Security Bulletin MS05-008:
    Vulnerability in Windows Shell Could Allow Remote Code Execution (890047)

    Bulletin URL:
    <http://www.microsoft.com/technet/security/bulletin/MS05-008.mspx>

    Version Number: 1.0
    Issued Date: Tuesday, February 08, 2005
    Impact of Vulnerability: Remote Code Execution
    Maximum Severity Rating: Important
    Patch(es) Replaced: None
    Caveats: None Important: The update for the 'Drag-and-Drop Vulnerability' (CAN-2005-0053) comes in two parts. It is addressed in part in this security bulletin. This security bulletin, together with security bulletin MS05-014, makes up the update for CAN-2005-0053. These updates do not have to be installed in any particular order. However, we recommend that you install both updates.

    Tested Software:
    Affected Software:
    ------------------
    * Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
    <http://tinyurl.com/3sy94>
    * Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
    <http://tinyurl.com/5kdy6>
    * Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium)
    <http://tinyurl.com/4o755>
    * Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
    <http://tinyurl.com/6ywfn>
    * Microsoft Windows Server 2003
    <http://tinyurl.com/55qjm>
    * Microsoft Windows Server 2003 for Itanium-based Systems Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) - Review the FAQ section of this bulletin for details about these operating systems. Windows Server 2003 (all versions)
    <http://tinyurl.com/6ywfn>

    Technical Description:
    ----------------------
    * Drag-and-Drop Vulnerability - CAN-2005-0053 A privilege elevation vulnerability exists in Windows because of the way that Windows handles drag-and-drop events. An attacker could exploit the vulnerability by constructing a malicious Web page. This malicious Web page could potentially allow an attacker to save a file on the user's system if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, user interaction is required to exploit this vulnerability.

    This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1837.24459)

    Cheers,
    Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor

    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    

  • Next message: Russ Cooper: "Alert: Microsoft Security Bulletin MS05-009 - Vulnerability in PNG Processing Could Allow Remote Code Execution (890261)"

    Relevant Pages

    • SecurityFocus Microsoft Newsletter #83
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability ... Microsoft Internet Explorer History List Script Injection ... Microsoft Windows 2000 Lanman Denial of Service Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #242
      ... MICROSOFT VULNERABILITY SUMMARY ... PostNuke Blocks Module Directory Traversal Vulnerability ... Groove Networks Groove Virtual Office COM Object Security By... ... The Microsoft Windows IPV6 TCP/IP stack is prone to a "loopback" condition initiated by sending a TCP packet with the "SYN" flag set and the source address and port spoofed to equal the destination source and port. ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #44
      ... Subject: SecurityFocus Microsoft Newsletter #44 ... MS Visual Studio RAD Support Buffer Overflow Vulnerability ... Microsoft Windows 2000 SMTP Improper Authentication Vulnerability ... Microsoft Windows 2000 Telnet Multiple Sessions DoS Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #77
      ... MICROSOFT VULNERABILITY SUMMARY ... Novell GroupWise Web Root Disclosure Vulnerability ... Microsoft Windows NT Security Policy Bypass Vulnerability ... CVS Server Global Variable Denial Of Service Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #176
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
      (Focus-Microsoft)