On Tuesday, June 14, Microsoft issued information on 12 new security updates. Symantec Security Response has identified
eight vulnerabilities as the most serious and more detailed information is included at the bottom of this email.
Symantec Security Response has highlighted the following three vulnerabilities as critical:
· Microsoft Vulnerability in SMB -- Microsoft Security Bulletin MS05-027
· Microsoft Cumulative Security Update for Internet Explorer -- Microsoft Security Bulletin MS05-025
· Microsoft Vulnerability in HTML Help -- Microsoft Security Bulletin MS05-026
“Malicious use of both known and newly discovered software vulnerabilities continues to be a concern for both consumers
and enterprises,” said David Cole, director of product management, Symantec Security Response. “Remaining diligent about
deploying appropriate patches and implementing best security practices is the best prevention against new and
established security risks.”
Symantec recommends the following actions for enterprises:
· Evaluate the possible impact of these vulnerabilities to their critical systems.
· Plan for required responses including patch deployment and implementation of security best practices using the
appropriate security solutions.
· Take proactive steps to protect the integrity of networks and information.
· Verify that appropriate data backup processes and safeguards are in place and effective.
· Remind users to exercise caution in opening all unknown or unexpected e-mail attachments and in following web links
from unknown or unverified sources.
Symantec recommends the following actions for consumers:
· Regularly run Windows Update and install the latest security updates to keep software up to date.
· Avoid opening unknown or unexpected e-mail attachments or following web links from unknown or unverified sources.
· Consider using an Internet security solution such as Norton Internet Security to protect against today's known and
tomorrow's unknown threats.
Symantec’s security experts will closely monitor further information related to these vulnerabilities and will provide
updates and security content as necessary. Information can be found at
http://www.microsoft.com/technet/security/bulletin/ms05-jun.mspx.
SMB Vulnerability
· Microsoft Vulnerability in SMB -- Microsoft Security Bulletin MS05-027 - This buffer overflow vulnerability in
Microsoft SMB protocol implementation could allow for remote code execution and result in a complete system compromise.
This vulnerability can be exploited against remote servers by anonymous attackers across the Internet. Symantec Security
Response has identified this vulnerability to be critical.
Client-side Vulnerabilities
· Microsoft Cumulative Security Update for Internet Explorer -- Microsoft Security Bulletin MS05-025 - This buffer
overflow vulnerability in malformed PNG image processing could allow for malicious code execution. Web-based attacks
could pose the highest risk as IE renders these images automatically, and there are many ways for an attacker to embed
malicious images in content processed by Internet Explorer. E-mail attacks are slightly more difficult to carry out
because they require the victim to manually open an e-mail attachment containing the image. Symantec Security Response
has identified this vulnerability as critical.
An additional new vulnerability in the IE cumulative update is a variant of an existing attack. The vulnerability allows
attackers to read the contents of XML files on the client host and could result in sensitive information being disclosed
to attackers.
· Microsoft Vulnerability in HTML Help -- Microsoft Security Bulletin MS05-026 - This “data validation error”
vulnerability in HTML Help could allow for remote code execution. This vulnerability, which is exploitable through the
InfoTech protocol, can also result in execution of code on the client system. HTML e-mail attacks are possible depending
on the Outlook/Outlook Express settings and product version. Symantec Security Response has identified this
vulnerability as critical.
· Microsoft Vulnerability in Interactive Training - Microsoft Security Bulletin MS05-031 - This is a buffer overflow
vulnerability in Interactive Training software. This vulnerability impacts machines with the Step-by-Step Interactive
Training software, a component commonly installed on OEM systems, and could result in remote code execution. A user
would have to open a malicious bookmark link file delivered via e-mail, hosted on a Web site, etc. Symantec Security
Response has identified this vulnerability as important.
· Outlook Express NNTP Response Parsing Vulnerability - Microsoft Security Bulletin MS05-030 - This buffer overflow
vulnerability in client processing of server NNTP responses could allow for remote code execution. Minimal user
interaction is required to exploit this vulnerability. Symantec Security Response has identified it as important.
Phishing Vulnerabilities
· Microsoft Agent Vulnerability -- Microsoft Security Bulletin MS05-032 - This vulnerability may be used to trick a
victim into trusting hostile Internet content through the spoofing of security dialogs. However, the user must still
manually perform some action, as presented in the false dialog. Symantec Security Response has identified this
vulnerability as moderate.
· Outlook Web Access Script Injection Vulnerability - Microsoft Security Bulletin MS05-029 - This vulnerability is due
to an input validation error in Microsoft Outlook Web Access and allows for attackers to cause script code to be
embedded in its web-based interface. This allows for cross-site scripting style attacks and may assist in phishing
attacks against Outlook Web Access users. Symantec Security Response has identified this vulnerability as important.
Web Client Service Vulnerability
· Vulnerability in Web Client Service - Microsoft Security Bulletin MS05-028 - This buffer overflow vulnerability could
result in a complete system compromise. It is exploitable remotely, however valid authentication credentials are
required. The service is disabled in Windows Server 2003. Symantec Security Response has identified this vulnerability
as important.
ENDS