[prev in list] [next in list] [prev in thread] [next in thread] 

List:       ntbugtraq
Subject:    Alert: Microsoft Security Bulletin MS04-025 - Cumulative Security Update for Internet Explorer (8678
From:       Russ Cooper <Russ.Cooper () TRUSECURE ! CA>
Date:       2004-07-30 16:45:06
Message-ID: 33673E294083364AB67C85A4245FE3541BC94C () muskie ! rc ! on ! ca
[Download RAW message or body]

Microsoft Security Bulletin MS04-025:
Cumulative Security Update for Internet Explorer (867801)

Bulletin URL:
<http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>

Version Number: 1.0
Issued Date: Friday, July 30, 2004
Impact of Vulnerability: Remote Code Execution
Maximum Severity Rating: Critical
Patch(es) Replaced: This update replaces the one that is provided in Microsoft \
                Security Bulletin MS04-004, which is itself a cumulative update.
Caveats: This update does not include hotfixes for Internet Explorer provided since \
the release of MS04-004. Customers who have received hotfixes from Microsoft or their \
support providers since the release of MS04-004 should review the FAQ section for \
this update to determine how this update might impact their operating systems.

Tested Software:
Affected Software:
------------------
* Microsoft Windows NT. Workstation 4.0 Service Pack 6a
* Microsoft Windows NT Server 4.0 Service Pack 6a
* Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
* Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service Pack 3, \
                Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP and Microsoft Windows XP Service Pack 1
* Microsoft Windows XP 64-Bit Edition Service Pack 1
* Microsoft Windows XP 64-Bit Edition Version 2003
* Microsoft Windows Server. 2003
* Microsoft Windows Server 2003 64-Bit Edition
* Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft \
Windows Millennium Edition (Me) - Review the FAQ section of this bulletin for details \
about these operating systems.

Affected Components:
--------------------
* Internet Explorer 5.01 Service Pack 2:
<http://tinyurl.com/5bn54>
* Internet Explorer 5.01 Service Pack 3:
<http://tinyurl.com/4fh93>
* Internet Explorer 5.01 Service Pack 4:
<http://tinyurl.com/67ty5>
* Internet Explorer 5.5 Service Pack 2:
<http://tinyurl.com/4xurj>
* Internet Explorer 6:
<http://tinyurl.com/5q9jl>
* Internet Explorer 6 Service Pack 1:
<http://tinyurl.com/4u3nk>
* Internet Explorer 6 Service Pack 1 (64-Bit Edition):
<http://tinyurl.com/6mffm>
* Internet Explorer 6 for Windows Server 2003:
<http://tinyurl.com/3ql3r>
* Internet Explorer 6 for Windows Server 2003 (64-Bit Edition):
<http://tinyurl.com/5zwst>

Technical Description:
----------------------
* Navigation Method Cross-Domain Vulnerability - CAN-2004-0549: A remote code \
execution vulnerability exists in Internet Explorer because of the way that it \
handles navigation methods. An attacker could exploit the vulnerability by \
constructing a malicious web page that could potentially allow remote code execution \
if a user visited a malicious Web site. An attacker who successfully exploited this \
vulnerability could run malicious script code in the Local Machine security zone in \
Internet Explorer. If a user is logged on with administrative privileges, this could \
allow the attacker to take complete control of an affected system.

* Malformed BMP File Buffer Overrun Vulnerability - CAN-2004-0566: A buffer overrun \
vulnerability exists in the processing of BMP image file formats that could allow \
remote code execution on an affected system. If the user is logged on with \
administrative privileges an attacker who successfully exploited this vulnerability \
could take complete control of the affected system. Users whose accounts are \
configured to have fewer privileges on the system would be at less risk than users \
who operate with administrative privileges.

* Malformed GIF File Double Free Vulnerability - CAN-2003-1048: Abuffer overrun \
vulnerability exists in the processing of GIF image file formats that could allow \
remote code execution on an affected system. If the user is logged on with \
administrative privileges, an attacker who successfully exploited this vulnerability \
could take complete control of the affected system. Users whose accounts are \
configured to have fewer privileges on the system would be at less risk than users \
who operate with administrative privileges.

This email is sent to NTBugtraq automagically as a service to my subscribers. \
(v4.01.1664.40858)

Cheers,
Russ - Senior Scientist - TruSecure Corporation/NTBugtraq Editor

-----
NTBugtraq Editor's Note:

Want to reply to the person who sent this message? This list is configured such that \
just hitting reply is going to result in the message coming to the list, not to the \
individual who sent the message. This was done to help reduce the number of Out of \
Office messages posters received. So if you want to send a reply just to the poster, \
you'll have to copy their email address out of the message and place it in your TO: \
                field.
-----


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic