Patch Tuesday Yields Banner Crop of 12 Fixes, 8 of

advertisement
Patch Tuesday Yields Banner Crop of 12 Fixes, 8 of Them Critical
by Alex Woodie
<a target="new" href="http://www.microsoft.com">Microsoft</a> made fixes available for 12 new
security vulnerabilities yesterday in the biggest Patch Tuesday event in recent memory. Nine of the new
security bulletins directly affect the Windows operating system, with the rest affecting the .NET
framework, Windows Media Player and MSN Messenger, and the combination of Microsoft's Portal and
Office. Microsoft said eight of these vulnerabilities are critical, meaning they pose the highest security
threats, and should be patched immediately.
Yesterday's bounty brought at least six new patches for flaws affecting Windows Server 2003, Microsoft's
flagship server operating system, and six more for Windows XP Service Pack 2, the latest security-related
release of the client OS. Microsoft even found time to fix six new flaws in the aging Windows NT 4.0,
support for which was supposed to have ended on December 31.
While many news sites reported there were 13 new patches, there were really only 12, provided you could
get to the Web site to download them. At several times yesterday, Microsoft's TechNet Security Web site
yielded the dreaded "404-Page Not Found" message instead of the specific security bulletins. The problem
was soon fixed. A company spokesperson said Microsoft was not aware of any problems with its Web site.
Here's a rundown on the 12 security flaws and patches that Microsoft announced yesterday:
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-004.mspx">Security
Bulletin MS05-004</a> describes an "important" canonicalization vulnerability in ASP.NET that could
allow an attacker to bypass the security of a Web site and gain unauthorized access to the system.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-005.mspx">Security
Bulletin MS05-005</a> describes a "critical" buffer overrun vulnerability that could allow remote code
execution in Office, Works, Project, and Visio.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-006.mspx">Security
Bulletin MS05-006</a> describes a "moderate" cross-site scripting and spoofing vulnerability in
SharePoint Services for Windows Server 2003 that could enable an attacker to convince a user to run a
malicious script.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-007.mspx">Security
Bulletin MS05-007</a> describes an "important" named-pipe vulnerability in Windows XP Service Pack 1
and SP2 and Windows XP 64-Bit Edition SP1 for Itanium that could allow attackers to remotely read the
user names of users who have an open connection to an available shared resource.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-008.mspx">Security
Bulletin MS05-008</a> describes an "important" privilege elevation vulnerability that could allow
attackers to take complete control of computers running Windows Server 2003, Windows Server 2003 for
Itanium, Windows XP SP1 and SP2, 64-bit Itanium versions of Windows XP, and Windows 2000 SP3 and
SP4.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-009.mspx">Security
Bulletin MS05-009</a> fixes a "critical" PNG processing vulnerability in Windows Media Player 9 Series
and Windows Messenger version 5.0 that could lead to remote code execution.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-010.mspx">Security
Bulletin MS05-010</a> describes a "critical" vulnerability in the License Logging service of Windows
Server 2003, Windows Server 2003 for Itanium, Windows NT Server 4.0 SP6a, NT 4.0 Terminal Server
SP6, and Windows 2000 Server SP3 and SP4 that could allow an attacker to gain complete control over the
affected server.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-011.mspx">Security
Bulletin MS05-011</a> fixes a "critical" vulnerability with the Server Message Block (SMB) protocol that
could allow remote code execution on Windows Server 2003, Windows Server 2003 for Itanium, Windows
2000 Server SP3 and SP4, Windows XP SP1 and SP2, Windows XP 64-Bit Edition SP1 for Itanium, and
Microsoft Windows XP 64-Bit Edition Version 2003 for Itanium.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-012.mspx">Security
Bulletin MS05-012</a> describes "critical" OLE and COM vulnerabilities that span many different
Microsoft products, including Windows Server 2003, Exchange Server 2002 SP3, Windows XP SP2, and
recent versions of the Office suite, and could enable an attacker to take complete control of an affected
system.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-013.mspx">Security
Bulletin MS05-013</a> describes a "critical" vulnerability in the DHTML Editing Component ActiveX
control that could allow remote code execution Windows Server 2003, Windows Server 2003 Itanium,
Windows XP SP1 and SP2, two 64-bit versions of XP for Itanium, Windows 2000 SP3 and SP4, and
Windows 98, Windows ME, and Windows SE.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-014.mspx">Security
Bulletin MS05-014</a> fixes a "critical" privilege elevation vulnerability in Internet Explorer 6.0 that
could allow an attacker to gain complete control over an affected system.
<a target="new" href="http://www.microsoft.com/technet/security/bulletin/ms05-015.mspx">Security
Bulletin MS05-015</a> addresses a "critical" Hyperlink Object Library vulnerability in Windows Server
2003, the Itanium version of Windows Server 2003 and Windows XP, Windows XP SP1 and SP2,
Windows 2000 SP3 and SP4, and Windows 98, ME, and SE.
Microsoft will discuss all of these patches and vulnerabilities in a special two-hour Webcast today at 11:00
a.m. PT. You can register for the Webcast on Microsoft's <a target="new"
href="http://www.microsoft.com/technet/default.mspx">TechNet Security Web page</a>.
Download