INDEPENDENT NEWS

Microsoft security update - Mon, 2 Aug 2004

Published: Tue 3 Aug 2004 02:09 PM
Symantec Security Response: Microsoft security update
Mon, 2 Aug 2004
On Friday (US time), Microsoft announced a cumulative security update for Microsoft Internet Explorer impacting both consumer and enterprise users. The update is replacing a recent cumulative update provided in Microsoft Security Bulletin MS04-004. (http://www.microsoft.com/technet/security/bulletin/ms04-025.mspx)
This Microsoft update resolves several newly discovered product vulnerabilities - all of these vulnerabilities are rated critical. If a user is logged on with administrative privileges, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system, including installing programs such as spyware and backdoors, viewing, changing, or deleting data, and creating new accounts with full privileges.
"With the widespread use of Microsoft Internet Explorer in both the enterprise and consumer environments, it is critical that security patches be applied immediately", said Alfred Huger, senior director, Symantec Security Response. "Symantec has already seen exploits in the wild taking advantage of at least one of these vulnerabilities."
Symantec Security Response is monitoring these vulnerabilities through its Managed Security Services as well as through its DeepSight Early Warning Solutions. Symantec Security Response will also be monitoring for any potential new exploits leveraging these vulnerabilities.
Please see below for detailed summaries of these updates. If you'd like to speak with a Symantec security expert regarding any of these vulnerabilities, please contact Rachael Joel on 09 303 3862, 021 403 504 or rachaelj@botica.co.nz.
1. Navigation Method Cross-Domain Vulnerability (CAN-2004-0549) Overview/Risk: At this time, Symantec Security Response views this vulnerability as the most critical. Symantec has already seen exploits in the wild that leverage this vulnerability.
A remote code execution vulnerability exists in Internet Explorer because of the way it handles navigation methods.
An attacker could exploit the vulnerability by constructing a malicious web page that could potentially allow remote code execution if a user visited a malicious Web site. If a user is logged on with administrative privileges, this could allow the attacker to take complete control of an affected system.
However, in a Web-based attack, the attacker would have to persuade the user to visit a malicious Web site, typically by getting them to clink on a link. Also, users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
Systems impacted include Internet Explorer 5.5 SP2, Internet Explorer 6, Internet Explorer 6 SP1 (All versions earlier than Windows Server 2003), and Internet Explorer 6 for Windows Server 2003 (including 64-bit Edition).
Symantec Security Response has rated this threat at a High risk.
2. Malformed BMP File Buffer Overrun Vulnerability (CAN-2004-0556) Overview/Risk: A buffer overrun vulnerability exists in the processing of BMP image file formats that could allow remote code execution on an affected system.
In a Web-based attack, the attacker would have to persuade the user to visit a malicious Web site, typically by getting them to click on a link. Also, users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
Systems impacted include Internet Explorer 5.01 SP2, SP3 and SP4, Internet Explorer 5.5 SP2, Internet Explorer 6.
Symantec Security Response has rated this threat at a High risk.
3. Malformed GIF File Double Free Vulnerability (CAN-2003-1048) Overview/Risk: A buffer overrun vulnerability exists in the processing of GIF image file formats that could allow remote code execution on an affected system.
In a Web-based attack, the attacker would have to persuade the user to visit a malicious Web site, typically by getting them to clink on a link. Also, users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
Systems impacted include Internet Explorer 5.01 SP2, SP3 and SP4, Internet Explorer 5.5 SP2, Internet Explorer 6, Internet Explorer 6 SP1 (All versions earlier than Windows Server 2003), and Internet Explorer 6 for Windows Server 2003 (including 64-bit Edition).
Symantec Security Response rates this threat as a High risk.
ENDS

Next in Business, Science, and Tech

Sailors To Revolutionise Our Understanding Of Pacific Biodiversity
By: Citizens of the Sea
Making A Splash With Online Safety: Netsafe Launches New Flagship Programme For Kids
By: Netsafe
Flood Resilience PhD Student Widi Auliagisni Named Future Thinker Of The Year 2024
By: NZGBC
European Free Trade Agreement A Game-changer For Canterbury
By: Business Canterbury
Business Canterbury Urges Council To Cut Costs, Not Ambition For City
By: Business Canterbury
Wellington Airport On Track For Net Zero Emissions By 2028
By: Wellington Airport Limited
View as: DESKTOP | MOBILE © Scoop Media