PDA

Vollständige Version anzeigen : Microsoft Security Info vom 11.10.2005


Günther Kramer
12.10.2005, 12:54
Microsoft is releasing the following security bulletins for newly discovered vulnerabilities:


Moderate MS05-044 Microsoft Windows Tampering
Moderate MS05-045 Microsoft Windows Denial of Service
Important MS05-046 Microsoft Windows Remote Code Execution
Important MS05-047 Microsoft Windows Remote Code Execution and Local Elevation of Privilege
Important MS05-048 Microsoft Windows, Microsoft Exchange Remote Code Execution
Important MS05-049 Microsoft Windows Remote Code Execution
Critical MS05-050 Microsoft Windows Remote Code Execution
Critical MS05-051 Microsoft Windows Remote Code Execution
Critical MS05-052 Microsoft Windows Remote Code Execution

Summaries for these new bulletins may be found at the following pages:
* http://www.microsoft.com/technet/security/bulletin/ms05-oct.mspx

Customers are advised to review the information in the bulletins, test and deploy the updates immediately in their environments, if applicable.

Microsoft Windows Malicious Software Removal Tool

Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU) and the Download Center. Note that this tool will NOT be distributed using Software Update Services (SUS). Information on the Microsoft Windows Malicious Software Removal Tool can be located here:
http://go.microsoft.com/fwlink/?LinkId=40573

High-Priority Non-Security Updates on Microsoft Update (MU), Windows Update (WU), Windows Server Update Services (WSUS) and Software Update Services (SUS)

There are NO High-Priority NON-SECURITY updates being released on WU, MU, SUS and WSUS.

Microsoft will host a webcast to address customer questions on these bulletins. For more information on this webcast please see below:

Information about Microsoft's Security Bulletins
Wednesday, October 12, 2005 11:00 AM (GMT-08:00) Pacific Time (US & Canada)
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1032282125&EventCategory=4&culture=en-US&CountryCode=US

The on-demand version of the webcast will be available 24 hours after the live webcast at:
http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1032282125&EventCategory=4&culture=en-US&CountryCode=US

**********************************************************************
MS05-044
Title: Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering (905495)

Affected Software:
* Microsoft Windows XP Service Pack 1
* Microsoft Windows Server 2003
* Microsoft Windows Server 2003 for Itanium-based Systems

Affected Components:
* Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4

Non-Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 2
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

Non-Affected Components:
* Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4

Impact of Vulnerability: Tampering
Maximum Severity Rating: Moderate

Restart required: In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. For more information about the reasons why you may be prompted to restart your computer, see Microsoft Knowledge Base Article 887012

Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-044.mspx

**********************************************************************
MS05-045
Title: Vulnerability in Network Connection Manager Could Allow Denial of Service (905414)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1

Non-Affected Software:
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

Impact of Vulnerability: Denial of Service
Maximum Severity Rating: Moderate
Restart required: Yes
Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-045.mspx

**********************************************************************
MS05-046
Title: Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution (899589)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1

Non-Affected Software:
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)
* Windows Services for Netware

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important

Restart required: In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. For more information about the reasons why you may be prompted to restart your computer, see Microsoft Knowledge Base Article 887012

Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-046.mspx

**********************************************************************
MS05-047
Title: Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege (905749)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2

Non-Affected Software:
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

Impact of Vulnerability: Remote Code Execution and Local Elevation of Privilege
Maximum Severity Rating: Important
Restart required: Yes
Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-047.mspx

**********************************************************************
MS05-048
Title: Vulnerability in the Microsoft Collaboration Data Objects Could Allow Remote Code Execution (907245)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Exchange 2000 Server Service Pack 3 with the Exchange 2000 Post-Service Pack 3 Update Rollup of August 2004

Non-Affected Software:
* Microsoft Exchange Server 2003
* Microsoft Exchange Server 2003 Service Pack 1

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Restart required: Yes
Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-048.mspx

**********************************************************************
MS05-049
Title: Vulnerabilities in Windows Shell Could Allow Remote Code Execution (900725)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition

Non-Affected Software:
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME).

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Important
Restart required: Yes
Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-049.mspx

**********************************************************************
MS05-050
Title: Vulnerability in DirectShow Could Allow Remote Code Execution (904706)

Affected Software:
* Microsoft DirectX 7.0 on Microsoft Windows 2000 Service Pack 4
* Microsoft DirectX 8.1 on Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft DirectX 8.1 on Microsoft Windows XP Professional x64 Edition
* Microsoft DirectX 8.1 on Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Microsoft DirectX 8.1 on Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft DirectX 8.1 on Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) - Review the FAQ section of the bulletin for details about these operating systems.
Affected Components:
* Microsoft DirectX 8.1, 8.1a, 8.1b, 8.2 when installed on Windows 2000
* Microsoft DirectX 9.0, 9.0a, 9.0b, 9.0c when installed on Windows 2000
* Microsoft DirectX 9.0, 9.0a, 9.0b, 9.0c when installed on Windows XP
* Microsoft DirectX 9.0, 9.0a, 9.0b, 9.0c when installed on Windows Server 2003

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical

Restart required: In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart. For more information about the reasons why you may be prompted to restart your computer, see Microsoft Knowledge Base Article 887012

Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-050.mspx

**********************************************************************
MS05-051
Title: Vulnerabilities in MSDTC and COM+ Could Allow Remote Code Execution (902400)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition

Non-Affected Software:
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Restart required: Yes
Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-051.mspx

**********************************************************************
MS05-052
Title: Cumulative Security Update for Internet Explorer (896688)

Affected Software:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with Service Pack 1 for Itanium-based Systems
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) - Review the FAQ section of this bulletin for details about these operating systems.

Affected Components:
* Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4
* Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 or on Microsoft Windows XP Service Pack 1
* Internet Explorer 6 for Microsoft Windows XP Service Pack 2
* Internet Explorer 6 for Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
* Internet Explorer 6 for Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
* Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition
* Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition
* Internet Explorer 5.5 Service Pack 2 on Microsoft Windows Millennium Edition - Review the FAQ section of the bulletin for details about this version.
* Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, on Microsoft Windows 98 SE, or on Microsoft Windows Millennium Edition - Review the FAQ section of the bulletin for details about this version.

Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Restart required: Yes
Update can be uninstalled: Yes

More information on this vulnerability is available at: http://www.microsoft.com/technet/security/bulletin/MS05-052.mspx

PLEASE VISIT http://www.microsoft.com/technet/security FOR THE MOST CURRENT INFORMATION ON THESE ALERTS.

Thank you,
Microsoft PSS Security Team