Re: Alert: Microsoft Security Bulletin MS05-022 - Vulnerability in MSN Messenger Could Lead to Remote Code Execution (896597)

From: Russ (Russ.Cooper_at_RC.ON.CA)
Date: 04/13/05

  • Next message: Robin Keir: "MS05-019 breaks TCP raw socket sends"
    Date:         Wed, 13 Apr 2005 07:31:42 -0400
    To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
    
    

    I'm not sure why the TinyURL was broken for the MSN Messenger 6.2 patch yesterday (MS05-022), but it was.

    Here is the advisory again with the TinyURL corrected. My apologies.

    Cheers,
    Russ

    Microsoft Security Bulletin MS05-022:
    Vulnerability in MSN Messenger Could Lead to Remote Code Execution
    (896597)

    Bulletin URL:
    <http://www.microsoft.com/technet/security/Bulletin/MS05-022.mspx>

    Version Number: 1.0
    Issued Date: Tuesday, April 12, 2005
    Impact of Vulnerability: Remote Code Execution
    Maximum Severity Rating: Critical
    Patch(es) Replaced: This bulletin replaces a prior security update. See the frequently asked questions (FAQ) section of this bulletin for the complete list.
    Caveats: None

    Tested Software:
    Affected Software:
    ------------------
    * MSN Messenger 6.2 MSN Messenger 6.2
    <http://tinyurl.com/6favy>

    Technical Description:
    ----------------------
    * MSN Messenger Vulnerability - CAN-2005-0562: A remote code execution vulnerability exists in MSN Messenger that could allow an attacker who successfully exploited this vulnerable to take complete control of the affected system.

    This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.1928.12470)

    Cheers,
    Russ Cooper - Senior Scientist - Cybertrust/NTBugtraq Editor

    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    --
    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
    --
    

  • Next message: Robin Keir: "MS05-019 breaks TCP raw socket sends"

    Relevant Pages