SAINTwriter Assessment Report
Transcription
SAINTwriter Assessment Report
SAINTwriter Assessment Report Report Generated: July 27, 2010 1.0 Background The E-Government Act (Public Law 107-347) passed by the 107th Congress and signed into law by the President in December 2002 recognized the importance of information security to the economic and national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA) requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source. The first phase of the FISMA Implementation Project focuses on the development and updating of the security standards and guidance required to effectively implement the provisions of the legislation. The implementation of NIST standards and guidance will help agencies create and maintain robust information security programs and effectively manage risk to agency operations, agency assets, and individuals. The second phase of the FISMA Implementation Project is focused on providing information system implementation and assessment reference materials for building common understanding in applying the NIST suite of publications supporting the Risk Management Framework (RMF). One of key aspects phase two is the use of support tools, checklists, etc: (ii) Support Tools Initiative: for defining criteria for common reference programs, materials, checklists, (i.e NVD, SCAP, etc.), technical guides, automated tools and techniques supporting implementation and assessment of SP 800-53-based security controls. Collectively, the FISMA project strives to combine standards and guidelines with the use of technologies, tools and techniques to provide a holistic approach to information security. 2.0 Security Controls The Office of Management and Budget (OMB) M-09-29, dated August 20, 2009, specifies that: Agencies are required to use FIPS 200/NIST Special Publication 800-53 for the specification of security controls and NIST Special Publications 800-37 and 800-53A for the assessment of security control effectiveness. FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, is a mandatory federal standard developed by NIST in response to FISMA. To comply with the federal standard, organizations must first determine the security category of their information system in accordance with FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, derive the information system impact level from the security category in accordance with FIPS 200, and then apply the appropriately tailored 1 set of baseline security controls in NIST Special Publication 800-53, Security Controls for Federal Information Systems and Organizations. Organizations have flexibility in applying the baseline security controls in accordance with the guidance provided in Special Publication 800-53. This allows organizations to tailor the relevant security control baseline so that it more closely aligns with their mission and business requirements and environments of operation. FIPS 200 and NIST Special Publication 800-53, in combination, help ensure that appropriate security requirements and security controls are applied to all federal information and information systems. An organizational assessment of risk validates the initial security control selection and determines if any additional controls are needed to protect organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation. The resulting set of security controls establishes a level of security due diligence for the organization. NIST SP 800-53 specifies the security controls by unique Identifier, Family and Class (Reference SP800-83, Revision 3, Section 2.1, Table 1-1, SECURITY CONTROL CLASSES, FAMILIES, AND IDENTIFIERS) 3.0 Consensus Audit Guidelines (CAG) A central tenet of the US Comprehensive National Cybersecurity Initiative (CNCI) is that 'offense must inform defense' (source: http://www.sans.org/critical-security-controls/cag.pdf) In other words, knowledge of actual attacks that have compromised systems provides the essential foundation on which to construct effective defenses. The US Senate Homeland Security and Government Affairs Committee moved to make this same tenet central to the Federal Information Security Management Act in drafting the U.S. ICE Act of 2009 (the new FISMA). That new proposed legislation calls upon Federal agencies to (and on the White House to ensure that they): monitor, detect, analyze, protect, report, and respond against known vulnerabilities, attacks, and exploitations. and .continuously test and evaluate information security controls and techniques to ensure that they are effectively implemented. The CAG, maintained by SANS (http://www.sans.org/), contains the list of Twenty Critical Controls for Effective Cyber Defense (source: http://www.sans.org/critical-security-controls/user-tools.php. ). The CAG, in contrast to security guidelines and controls within NIST SP 800-53, seeks to identify a subset of security control activities that CISO.s, CIO.s and IG.s can focus on as their top, shared priority for cyber security based on attacks occurring today and those anticipated in the future. Each control maps to specific corresponding areas within SP 800-53. Within that guideline, the CAG describes Critical Control 10: Continuous Vulnerability Assessment and Remediation. Critical Control 10 maps to the following technical controls within SP 800-53, revision 3, Appendix D, Table D-1: Security Control Baselines: CA-7 -- Continuous Monitoring Enhanced Supplemental Guidelines: Examples of vulnerability mitigation procedures are contained in Information Assurance Vulnerability Alerts. RA-3 -- Risk Assessment (Control: The Organization) A. Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits; B. Documents risk assessment results in [Selection: security plan; risk assessment report; 2 [Assignment: organization-defined document]]; C. Reviews risk assessment results [Assignment: organization-defined frequency]; and D. Updates the risk assessment [Assignment: organization-defined frequency] or whenever there are significant changes to the information system or environment of operation (including the identification of new threats RA-5 -- Vulnerability Scanning (Control: The Organization) Scans for vulnerabilities in the information system and hosted applications [Assignment organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system/applications are identified and reported; Employs vulnerability scanning tools and techniques that promote interoperability among tools and automate parts of the vulnerability management process by using standards for: Enumerating platforms, software flaws, and improper configurations; Formatting and making transparent, checklists and test procedures; and Measuring vulnerability impact; RA-5 -- Vulnerability Scanning (Control: Enhancements) (1) The organization employs vulnerability scanning tools that include the capability to readily update the list of information system vulnerabilities scanned. (2) The organization updates the list of information system vulnerabilities scanned [Assignment: organization-defined frequency] or when new vulnerabilities are identified and reported. (5) The organization includes privileged access authorization to [Assignment: organization-identified information system components] for selected vulnerability scanning activities to facilitate more thorough scanning. (6) The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities. This control and the specified technical controls within NIST 800-53 are the focus of this report. 4.0 Introduction On July 13, 2010, at 10:51 AM, a heavy vulnerability assessment was conducted using the SAINT 7.4.3 vulnerability scanner. The scan discovered a total of one live host, and detected 22 critical problems, 95 areas of concern, and 40 potential problems. The hosts and problems detected are discussed in greater detail in the following sections. 5.0 Summary The following vulnerability severity levels are used to categorize the vulnerabilities: CRITICAL PROBLEMS Vulnerabilities which pose an immediate threat to the network by allowing a remote attacker to directly gain read or write access, execute commands on the target, or create a denial of service. AREAS OF CONCERN 3 Vulnerabilities which do not directly allow remote access, but do allow privilege elevation attacks, attacks on other targets using the vulnerable host as an intermediary, or gathering of passwords or configuration information which could be used to plan an attack. POTENTIAL PROBLEMS Warnings which may or may not be vulnerabilities, depending upon the patch level or configuration of the target. Further investigation on the part of the system administrator may be necessary. SERVICES Network services which accept client connections on a given TCP or UDP port. This is simply a count of network services, and does not imply that the service is or is not vulnerable. The sections below summarize the results of the scan. 5.1 Vulnerabilities by Severity This section shows the overall number of vulnerabilities and services detected at each severity level. 5.2 Hosts by Severity This section shows the overall number of hosts detected at each severity level. The severity level of a host is defined as the highest vulnerability severity level detected on that host. 4 5.3 Vulnerabilities by Class This section shows the number of vulnerabilities detected in each of the following classes. Class Web Mail File Transfer Login/Shell Print Services RPC DNS Databases Networking/SNMP Windows OS Passwords Other Description Vulnerabilities in web servers, CGI programs, and any other software offering an HTTP interface Vulnerabilities in SMTP, IMAP, POP, or web-based mail services Vulnerabilities in FTP and TFTP services Vulnerabilities in ssh, telnet, rlogin, rsh, or rexec services Vulnerabilities in lpd and other print daemons Vulnerabilities in Remote Procedure Call services Vulnerabilities in Domain Name Services Vulnerabilities in database services Vulnerabilities in routers, switches, firewalls, or any SNMP service Missing hotfixes or vulnerabilities in the registry or SMB shares Missing or easily guessed user passwords Any vulnerability which does not fit into one of the above classes 5 6.0 Overview The following tables present an overview of the hosts discovered on the network and the vulnerabilities contained therein. 6.1 Host List This table presents an overview of the hosts discovered on the network. Host Name Netbios Name IP Address Host Type 10.7.0.2 SAINTLAB02 10.7.0.2 Windows 2000 SP2 6.2 Vulnerability List 6 Critical Problems 22 Areas of Concern 95 Potential Problems 40 This table presents an overview of the vulnerabilities detected on the network. Host Name 10.7.0.2 Severity Vulnerability / Service Class CVE critical Web CVE-2001-0333 CVE-2010-1556 10.7.0.2 10.7.0.2 critical critical Folder traversal in IIS (Double Decoding) IPP Service integer overflow multiple vulnerabilities in IIS 5.0 Web Web no yes 10.7.0.2 critical Windows OS 10.7.0.2 critical Web CVE-2003-0718 CVE-2010-1556 no 10.7.0.2 critical Microsoft Internet Information Services FTP Server Remote Buffer Overflow WebDAV XML message handler denial of service buffer overflow in IIS 5.0 WebDAV CVE-2008-1446 CVE-2010-1556 CVE-2002-0071 CVE-2002-0072 CVE-2002-0073 CVE-2002-0074 CVE-2002-0075 CVE-2002-0079 CVE-2002-0147 CVE-2002-0148 CVE-2002-0149 CVE-2002-0150 CVE-2010-1556 CVE-2009-2521 CVE-2009-3023 CVE-2010-1556 Web yes 10.7.0.2 critical Microsoft mail server vulnerabilities, smtpsvc.dll dated 2001-5-4 Mail 10.7.0.2 critical Mail 10.7.0.2 critical denial of service in Windows SMTP service vulnerable Microsoft mail server version: 5.0.2195.2966 10.7.0.2 critical Other 10.7.0.2 critical Databases CVE-2000-1209 CVE-2010-1556 no 10.7.0.2 critical critical CVE-2006-3440 CVE-2006-3441 CVE-2010-1556 CVE-2010-0478 CVE-2010-1556 10.7.0.2 critical CVE-2007-3039 CVE-2010-1556 yes 10.7.0.2 critical CVE-2007-2228 CVE-2010-1556 no 10.7.0.2 critical CVE-2006-3439 CVE-2010-1556 yes 10.7.0.2 critical CVE-2008-4250 CVE-2010-1556 yes 10.7.0.2 critical CVE-2005-4560 CVE-2010-1556 yes 10.7.0.2 critical vulnerable version of SMB Server (MS10-012) Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS no 10.7.0.2 vulnerable Microsoft NNTP version: 5.0.2195.2966 SQL Server account sa has no password Windows DNS Resolution Remote Code Execution Windows Media Unicast Service transport information buffer overflow Windows Message Queuing validation vulnerability Windows RPC authentication denial of service Windows Server Service Buffer Overrun Windows Server Service MS08-067 buffer overflow Windows WMF gdi32.dll vulnerability CVE-2001-0241 CVE-2001-0500 CVE-2003-0109 CVE-2010-1556 CVE-2010-0024 CVE-2010-0025 CVE-2010-1556 CVE-2010-1689 CVE-2010-1690 CVE-2002-0055 CVE-2003-1106 CVE-2010-1556 CVE-2010-0024 CVE-2010-0025 CVE-2010-1556 CVE-2010-1689 CVE-2010-1690 CVE-2004-0574 CVE-2010-1556 no 10.7.0.2 critical vulnerable version of SMB Server (MS10-012) dated 2001-5-8 Windows OS 10.7.0.2 critical 10.7.0.2 critical 10.7.0.2 concern WINS Could Allow Remote Code Execution pointer corruption vulnerability in WINS replication service ASP.NET application folder information disclosure Windows OS Windows OS Web CVE-2010-0020 CVE-2010-0021 CVE-2010-0022 CVE-2010-0231 CVE-2010-1556 CVE-2010-0020 CVE-2010-0021 CVE-2010-0022 CVE-2010-0231 CVE-2010-1556 CVE-2009-1923 CVE-2009-1924 CVE-2010-1556 CVE-2004-0567 CVE-2004-1080 CVE-2010-1556 CVE-2006-1300 CVE-2010-1556 Mail 7 Exploit Available? yes yes no no no no yes no no yes no 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 concern concern concern concern Web server allows cross-site tracing DNS cache snooping vulnerability DNS server allows zone transfers vulnerabilities in IIS 5 Web DNS DNS Web 10.7.0.2 concern Web 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern Microsoft IIS Authentication Method Disclosed Microsoft IIS WebDAV Request Directory Security Bypass Internet Explorer ADODB.Connection ActiveX Object Memory Corruption Internet Explorer August 2006 CSU fixes 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern Internet Explorer COM Objects Instantiation vulnerability Internet Explorer COM object memory corruption Internet Explorer Cascading Style Sheets vulnerability Windows OS Windows OS Windows OS 10.7.0.2 concern Internet Explorer Create Text Range code injection Windows OS 10.7.0.2 concern Internet Explorer DHTML method memory corruption Windows OS 10.7.0.2 concern Internet Explorer Exception Handling Memory Corruption vulnerability Windows OS 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern Internet Explorer JPEG buffer overflow Internet Explorer JS remote code execution Internet Explorer JS stack overflow 10.7.0.2 concern Internet Explorer JavaScript vulnerability Windows OS Windows OS Windows OS Windows OS 10.7.0.2 concern 10.7.0.2 concern Internet Explorer Nested OBJECT tag memory corruption Internet Explorer PNG buffer overflow Windows OS Windows OS Web Windows OS Windows OS 8 CVE-2010-1556 CVE-2010-1556 CVE-1999-0532 CVE-2010-1556 CVE-2000-0770 CVE-2001-0151 CVE-2001-0241 CVE-2001-0500 CVE-2001-0507 CVE-2002-0869 CVE-2002-1180 CVE-2002-1181 CVE-2002-1182 CVE-2003-0223 CVE-2003-0224 CVE-2003-0225 CVE-2003-0226 CVE-2006-0026 CVE-2010-1556 CVE-2002-0419 CVE-2010-1556 no no yes yes CVE-2009-1122 CVE-2009-1535 CVE-2010-1556 CVE-2006-5559 CVE-2010-1556 no CVE-2004-1166 CVE-2006-3280 CVE-2006-3450 CVE-2006-3451 CVE-2006-3637 CVE-2006-3638 CVE-2006-3639 CVE-2006-3640 CVE-2010-1556 CVE-2006-4193 CVE-2006-4219 CVE-2010-1556 CVE-2005-2127 CVE-2010-1556 no CVE-2004-0216 CVE-2004-0727 CVE-2004-0839 CVE-2004-0841 CVE-2004-0842 CVE-2004-0843 CVE-2004-0844 CVE-2004-0845 CVE-2010-1556 CVE-2006-1185 CVE-2006-1186 CVE-2006-1188 CVE-2006-1189 CVE-2006-1190 CVE-2006-1191 CVE-2006-1192 CVE-2006-1245 CVE-2006-1359 CVE-2006-1388 CVE-2010-1556 CVE-2005-0053 CVE-2005-0054 CVE-2005-0055 CVE-2005-0056 CVE-2010-1556 CVE-2005-4089 CVE-2006-1303 CVE-2006-1626 CVE-2006-2218 CVE-2006-2382 CVE-2006-2383 CVE-2006-2384 CVE-2006-2385 CVE-2010-1556 CVE-2005-1988 CVE-2005-1989 CVE-2005-1990 CVE-2010-1556 CVE-2006-1313 CVE-2010-1556 no CVE-2006-0753 CVE-2006-0830 CVE-2010-1556 CVE-2005-1790 CVE-2005-2829 CVE-2005-2830 CVE-2005-2831 CVE-2010-1556 CVE-2006-1992 CVE-2006-2094 CVE-2006-2111 CVE-2010-1556 CVE-2002-0648 CVE-2005-1211 CVE-2010-1556 no no no no no yes no no yes no yes no no 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 10.7.0.2 concern concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern Internet Explorer URL parsing buffer overflow Internet Explorer VBScript and JScript decoding vulnerability Internet Explorer VML Remote Code Execution Internet Explorer VML buffer overflow (MS07-004) Internet Explorer vulnerable VML version dated 2001-5-8 Jscript.dll buffer overflow vulnerability Windows 2000 IE6 VML vulnerable version, vgx.dll dated 2001-5-8 Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS CVE-2005-0553 CVE-2005-0554 CVE-2005-0555 CVE-2010-1556 CVE-2008-0083 CVE-2010-1556 yes CVE-2006-4868 CVE-2010-1556 yes CVE-2007-0024 CVE-2010-1556 yes CVE-2007-1749 CVE-2010-1556 no CVE-2009-1920 CVE-2010-1556 no CVE-2007-5348 CVE-2008-3012 CVE-2008-3013 CVE-2008-3014 CVE-2010-1556 CVE-2004-0573 CVE-2010-1556 no WordPerfect Converter buffer overflow Microsoft outlook ATL vulnerability (MS09-037) Windows OS Windows OS CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-1556 CVE-2010-0816 CVE-2010-1556 yes Outlook Express Could Allow Remote Code Execution (MS10-030) Microsoft SQL Server Distributed Management Objects Buffer Overflow Microsoft SQL Server vulnerable version, sqlservr.exe dated 2000-8-6 Windows OS Databases CVE-2007-4814 CVE-2010-1556 yes Databases no Login/Shell Mail CVE-2007-5348 CVE-2008-3012 CVE-2008-3013 CVE-2008-3014 CVE-2008-3015 CVE-2010-1556 CVE-2009-1930 CVE-2010-1556 CVE-2006-2386 CVE-2010-1556 Telnet Authentication Reflection Outlook Express Contact Record vulnerability Outlook Express Windows Address Book vulnerability Outlook Express vulnerable version, inetcomm.dll dated 2001-5-8 Mail CVE-2006-0014 CVE-2010-1556 no Mail CVE-2006-2111 CVE-2007-2225 CVE-2007-2227 CVE-2007-3897 CVE-2010-1556 CVE-2008-4253 CVE-2010-1556 no Microsoft VB6 FlexGrid ActiveX control vulnerable version dated 1999-9-7 Elevation of Privilege Vulnerabilities in Windows (MS09-012) Elevation of Privilege Vulnerabilities in Windows (MS10-015) Jet Database Engine vulnerable version, msjet40.dll dated 2001-5-8 Kodak Image Viewer remote code execution Microsoft Agent ACF memory corruption Microsoft Agent URL parsing vulnerability Microsoft Agent vulnerable version, agentdpv.dll dated 2001-5-8 Microsoft Data Access Component vulnerability Microsoft Image Color Management System vulnerable version, mscms.dll dated 2001-5-8 Other CVE-2008-1436 CVE-2009-0078 CVE-2010-1556 CVE-2010-0232 CVE-2010-0233 CVE-2010-1556 CVE-2005-0944 CVE-2007-6026 CVE-2008-1092 CVE-2010-1556 CVE-2007-2217 CVE-2010-1556 no CVE-2006-3445 CVE-2010-1556 no CVE-2007-1205 CVE-2010-1556 no CVE-2007-3040 CVE-2010-1556 yes CVE-2006-0003 CVE-2010-1556 yes CVE-2008-2245 CVE-2010-1556 no Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS 9 no no no yes no no no yes yes 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern Microsoft Paint Integer Overflow vulnerability Microsoft Windows DHTML remote code execution vulnerability (MS09-046) Microsoft Windows vulnerable version, msconv97.dll dated 2001-5-8 NetBIOS Name Service information disclosure Vulnerability in the OpenType Compact Font Format Driver Could Allow Elevation of Privilege Vulnerable MFC Library FileFind Class file mfc42.dll Vulnerable MFC Library FileFind Class file mfc42u.dll Windows 2000 GDI vulnerable version, gdi32.dll dated 2001-5-8 Windows OS Windows OS CVE-2010-0028 CVE-2010-1556 no CVE-2009-2519 CVE-2010-1556 no Windows OS CVE-2009-2506 CVE-2010-1556 no Windows OS Windows OS CVE-2003-0661 CVE-2010-1556 no CVE-2010-0819 CVE-2010-1556 no Windows OS Windows OS Windows OS CVE-2007-4916 CVE-2010-1556 no CVE-2007-4916 CVE-2010-1556 no yes Windows Authenticode Signature Verification (MS10-019) version, wintrust.dll dated 2001-5-8 Windows CSRSS Local (MS10-011) vulnerable version, csrsrv.dll dated 2001-5-8 Windows CSRSS remote code execution Windows Cabinet File Viewer (MS10-019) version, cabview.dll dated 2001-5-8 Windows DNS Client Spoofing vulnerability Windows DNS Server Spoofing vulnerability Windows DNS Spoofing vulnerability Windows OS CVE-2008-1083 CVE-2008-1087 CVE-2008-2249 CVE-2008-3465 CVE-2010-1556 CVE-2010-0486 CVE-2010-1556 Windows OS CVE-2010-0023 CVE-2010-1556 no Windows OS Windows OS CVE-2006-6696 CVE-2006-6797 CVE-2010-1556 CVE-2010-0487 CVE-2010-1556 no Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS 10 CVE-2008-1447 CVE-2010-1556 no CVE-2008-1447 CVE-2008-1454 CVE-2010-1556 CVE-2008-0087 CVE-2010-1556 no CVE-2010-0250 CVE-2010-1556 no CVE-2010-0018 CVE-2010-1556 no CVE-2007-3034 CVE-2010-1556 no CVE-2007-1912 CVE-2010-1556 no CVE-2006-1591 CVE-2010-1556 no CVE-2009-3677 CVE-2010-1556 no CVE-2006-3444 CVE-2010-1556 no CVE-2007-1206 CVE-2010-1556 no CVE-2005-2827 CVE-2010-1556 no CVE-2009-3675 CVE-2010-1556 no CVE-2007-5352 CVE-2010-1556 no Windows DirectShow AVI Filter buffer overflow Windows Embedded OpenType Font Engine Vulnerability Windows GDI image handling buffer overflow Windows Help File Handling Heap Buffer Overflow Windows Help File Image Processing Heap Buffer Overflow Windows Internet Authentication Service vulnerabilities Windows Kernel privilege elevation (ms06-049) vulnerability Windows Kernel privilege elevation (ms07-022) vulnerability Windows Kernel privilege elevation vulnerability Windows LSASS IPSEC Denial-of-Service Vulnerability Windows LSASS vulnerability no no no 10.7.0.2 concern Windows MPEG layer 3 codec vulnerable version, l3codecx.ax dated 2001-5-8 Windows Media Player plug-in EMBED vulnerability Windows Media decompression vulnerabilities Windows OLE Automation remote code execution vulnerability Windows RPC Marshalling Engine vulnerability Windows SMB Client vulnerabilities (MS10-020) Windows OS CVE-2010-0480 CVE-2010-1556 no 10.7.0.2 concern Windows OS Windows OS Windows OS Windows OS Windows OS CVE-2006-0005 CVE-2010-1556 yes 10.7.0.2 concern CVE-2010-1556 CVE-2010-1879 CVE-2010-1880 CVE-2007-0065 CVE-2007-2224 CVE-2010-1556 CVE-2009-0568 CVE-2010-1556 no 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern no Windows SMB Remote Code Execution Windows Services for UNIX setuid privilege elevation Windows Shell Handler vulnerability CVE-2007-3036 CVE-2010-1556 no CVE-2010-0027 CVE-2010-1556 no Windows VB script vulnerable version, vbscript.dll dated 2001-5-8 Windows WMA Voice codec vulnerability Windows atl.dll vulnerable (MS09-037) Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS CVE-2009-3676 CVE-2010-0269 CVE-2010-0270 CVE-2010-0476 CVE-2010-0477 CVE-2010-1556 CVE-2008-4038 CVE-2010-1556 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern CVE-2010-0483 CVE-2010-1556 no 10.7.0.2 concern no concern Windows dhtmled.ocx vulnerable (MS09-037) Windows OS 10.7.0.2 concern 10.7.0.2 concern Windows kernel GDI validation vulnerabilities Windows kernel desktop validation vulnerabilities Windows OS Windows OS 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 concern Windows kernel embedded font vulnerabilities Windows kernel multiple privilege elevation vulnerabilities (MS10-032) Windows kernel property validation vulnerabilities Windows kernel user mode callback vulnerability Windows kernel vulnerable (MS10-021) version, ntoskrnl.exe dated 2001-5-8 Windows OS Windows OS Windows OS Windows OS Windows OS CVE-2009-0555 CVE-2009-2525 CVE-2010-1556 CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-1556 CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-1556 CVE-2009-0081 CVE-2009-0082 CVE-2009-0083 CVE-2010-1556 CVE-2009-1123 CVE-2009-1124 CVE-2009-1125 CVE-2009-1126 CVE-2010-1556 CVE-2009-1127 CVE-2009-2513 CVE-2009-2514 CVE-2010-1556 CVE-2010-0484 CVE-2010-0485 CVE-2010-1255 CVE-2010-1556 CVE-2008-2250 CVE-2008-2251 CVE-2008-2252 CVE-2010-1556 CVE-2008-1084 CVE-2010-1556 10.7.0.2 concern 10.7.0.2 no 10.7.0.2 concern 10.7.0.2 concern 10.7.0.2 potential 10.7.0.2 potential Windows OS Windows OS Windows OS Other CVE-2010-1556 no 10.7.0.2 potential Windows kernel vulnerable version, ntoskrnl.exe dated 2001-5-8 Windows media file processing vulnerable (MS09-038) Possible buffer overflow in Active Directory AV Information: AntiVirus software not found (AVG Symantec McAfee TrendMicro) possible vulnerability in Apple Filing Protocol 2.0 CVE-2010-0234 CVE-2010-0235 CVE-2010-0236 CVE-2010-0237 CVE-2010-0238 CVE-2010-0481 CVE-2010-0482 CVE-2010-0810 CVE-2010-1556 CVE-2009-2515 CVE-2009-2516 CVE-2009-2517 CVE-2010-1556 CVE-2009-1545 CVE-2009-1546 CVE-2010-1556 CVE-2003-0507 CVE-2010-1556 CVE-2004-0430 CVE-2010-1556 no Other 11 no no no yes yes no no no no no no no no no 10.7.0.2 potential Cookie Injection vulnerabilities in IE Web 10.7.0.2 10.7.0.2 potential potential DNS server allows recursive queries guessable read community string 10.7.0.2 10.7.0.2 potential potential 10.7.0.2 potential 10.7.0.2 potential ICMP timestamp requests enabled Internet Explorer Modal Dialog zone bypass Internet Explorer Travel Log vulnerability Internet Explorer cross-domain vulnerabilities DNS Networking /SNMP Other Windows OS Windows OS Windows OS 10.7.0.2 potential Internet Explorer patch needed Windows OS 10.7.0.2 potential Other 10.7.0.2 potential Possible vulnerability in LDAP over SSL Is your LDAP secure? 10.7.0.2 potential Mail 10.7.0.2 potential Authentication flaw in Microsoft mail server Microsoft SQL Server vulnerable version: 8.00.194 10.7.0.2 potential Databases 10.7.0.2 potential Possible vulnerability in MS SQL Server Resolution Service Possible vulnerability in Microsoft Terminal Server 10.7.0.2 potential 10.7.0.2 potential Windows OS Mail 10.7.0.2 potential NetBIOS share enumeration using null session Outlook Express MHTML vulnerability Outlook Express NNTP buffer overflow Other Databases Other Mail 12 CVE-2004-0866 CVE-2004-0869 CVE-2010-1556 CVE-2010-1556 CVE-1999-0516 CVE-1999-0517 CVE-2010-1556 CVE-1999-0524 CVE-2010-1556 CVE-2003-1048 CVE-2004-0549 CVE-2004-0566 CVE-2010-1556 CVE-2003-1025 CVE-2003-1026 CVE-2003-1027 CVE-2010-1556 CVE-2003-0814 CVE-2003-0815 CVE-2003-0816 CVE-2003-0817 CVE-2003-0823 CVE-2010-1556 CVE-2003-0113 CVE-2003-0114 CVE-2003-0115 CVE-2003-0116 CVE-2003-0309 CVE-2003-0344 CVE-2003-0530 CVE-2003-0531 CVE-2003-0532 CVE-2003-0701 CVE-2003-0809 CVE-2003-0838 CVE-2003-1025 CVE-2003-1026 CVE-2003-1027 CVE-2003-1326 CVE-2003-1328 CVE-2010-1556 CVE-2001-0502 CVE-2010-1556 no CVE-2002-1378 CVE-2002-1379 CVE-2010-1556 CVE-2001-0504 CVE-2002-0054 CVE-2010-1556 CVE-1999-0652 CVE-1999-0999 CVE-2000-0199 CVE-2000-0202 CVE-2000-0402 CVE-2000-0485 CVE-2000-0603 CVE-2000-1081 CVE-2000-1082 CVE-2000-1083 CVE-2000-1084 CVE-2000-1085 CVE-2000-1086 CVE-2000-1087 CVE-2000-1088 CVE-2001-0344 CVE-2001-0542 CVE-2001-0879 CVE-2002-0056 CVE-2002-0154 CVE-2002-0186 CVE-2002-0187 CVE-2002-0624 CVE-2002-0641 CVE-2002-0642 CVE-2002-0644 CVE-2002-0645 CVE-2002-0695 CVE-2002-0721 CVE-2002-0859 CVE-2002-0982 CVE-2002-1123 CVE-2002-1137 CVE-2002-1138 CVE-2002-1145 CVE-2003-0230 CVE-2003-0231 CVE-2003-0232 CVE-2010-1556 CVE-2002-0649 CVE-2002-0650 CVE-2002-0729 CVE-2010-1556 CVE-2000-1149 CVE-2001-0663 CVE-2001-0716 CVE-2002-0863 CVE-2002-0864 CVE-2005-1218 CVE-2010-1556 CVE-2010-1556 no CVE-2004-0380 CVE-2010-1556 no CVE-2005-1213 CVE-2010-1556 yes no no no no no no no no no yes yes no no 10.7.0.2 10.7.0.2 potential potential 10.7.0.2 10.7.0.2 potential potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 potential 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 service service service service service service service service service service service service service service service service Outlook Express patch needed chargen could be used in UDP bomb SMTP may be a mail relay SNMP is enabled and may be vulnerable Mail Networking /SNMP Mail Networking /SNMP non-administrative users can act as part of the operating system non-administrative users can bypass traverse checking non-administrative users can replace a process level token auditing is disabled Windows OS Windows OS Windows OS Windows OS DNS Windows DNS lack of entropy spoofing attack Collaboration Data Objects vulnerability FTP Client vulnerability Jet Database Engine buffer overflow Jet Database Engine input validation problems Microsoft Agent spoofing vulnerability Network Connection Manager vulnerability Windows 2000 VM ByteCode Verifier vulnerability Windows COM+ command execution vulnerability Windows HyperTerminal buffer overflow Windows Message Queuing vulnerability Windows RPC mutual authentication spoofing 17/TCP 17/UDP 42/TCP 88/TCP 88/UDP 464/TCP 464/UDP 548/TCP 563/TCP 1028/TCP 1030/UDP 1031/TCP 1053/TCP 1054/UDP 1056/UDP 1059/TCP Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS Windows OS CVE-2002-1179 CVE-2010-1556 CVE-1999-0103 CVE-2010-1556 no no CVE-1999-0512 CVE-2010-1556 CVE-1999-0615 CVE-2002-0012 CVE-2002-0013 CVE-2002-0053 CVE-2002-0796 CVE-2002-0797 CVE-2010-1556 CVE-1999-0534 CVE-2010-1556 no no CVE-1999-0534 CVE-2010-1556 no CVE-1999-0534 CVE-2010-1556 no CVE-1999-0575 CVE-2010-1556 no CVE-2007-3898 CVE-2010-1556 no CVE-2005-1987 CVE-2010-1556 no CVE-2005-2126 CVE-2010-1556 no CVE-2004-0197 CVE-2010-1556 no CVE-2005-0944 CVE-2010-1556 yes CVE-2005-1214 CVE-2010-1556 no CVE-2005-2307 CVE-2010-1556 no CVE-2003-0111 CVE-2010-1556 no CVE-2005-1978 CVE-2005-1979 CVE-2005-1980 CVE-2005-2119 CVE-2010-1556 CVE-2004-0568 CVE-2010-1556 no CVE-2005-0059 CVE-2010-1556 yes CVE-2006-2380 CVE-2010-1556 no no no no no no no no no no no no no no no no no no no 13 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service service 1063/UDP 1068/UDP 1073/UDP 1081/UDP 1090/TCP 1091/TCP 1101/UDP 1102/UDP 1104/TCP 1105/TCP 1106/UDP 1110/TCP 1111/TCP 1112/UDP 1113/TCP 1128/UDP 1129/UDP 1135/TCP 1138/UDP 1144/TCP 1150/UDP 1240/UDP 1369/UDP 1415/UDP 1433/TCP 1434/UDP 1638/UDP 1645/UDP 1646/UDP 1718/UDP 1719/UDP 1755/TCP 1755/UDP 1801/TCP 1801/UDP 1813/UDP 2101/TCP 2103/TCP 2107/TCP 3268/TCP 3269/TCP 3372/TCP 3389/TCP 6666/TCP 7007/TCP DNS FTP FTP (with anonymous) NNTP (Usenet news) SMB SMTP SNMP WWW WWW (Secure) no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no 14 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 service service service service service service service service service service service service service service service service service service service service service service service service service service service info info info 10.7.0.2 info 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 10.7.0.2 info info info info info WWW (non-standard port 5406) XDM (X login) bootpc (68/UDP) bootps (67/UDP) chargen (19/TCP) chargen:UDP (19/UDP) daytime (13/TCP) daytime (13/UDP) discard (9/TCP) discard (9/UDP) domain (53/UDP) echo (7/TCP) echo (7/UDP) eklogin (2105/TCP) isakmp (500/UDP) ldap (389/TCP) ldap (389/UDP) microsoft-ds (445/TCP) microsoft-ds (445/UDP) name (42/UDP) netbios-dgm (138/UDP) netbios-ns (137/UDP) ntp (123/UDP) printer (515/TCP) radius (1812/UDP) ssl-ldap (636/TCP) tftp (69/UDP) Netbios Attribute: Domain Controller Netbios Attribute: Master Browser Netbios Attribute: Messenger Service Netbios Attribute: Primary Domain Controller Share: ADMIN$ Share: C$ Share: E$ Share: NETLOGON Share: SYSVOL no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no no 7.0 Details The following sections provide details on the specific vulnerabilities detected on each host. 7.1 10.7.0.2 IP Address: 10.7.0.2 Scan time: Jul 13 10:51:48 2010 Host type: Windows 2000 SP2 Netbios Name: SAINTLAB02 Folder traversal in IIS (Double Decoding) Severity: Critical Problem CVE: CVE-2001-0333 CVE-2010-1556 Impact 15 An attacker could send a specially constructed request which crashes the server or executes arbitrary code with the privileges of the web server. Resolutions Install the patches referenced in Microsoft Security Bulletins 03-018, 06-034 (for Windows 2000), 08-006 (for Windows 2003 and XP), and 08-062. For IIS 5.1, also install the patches referenced in 07-041. Note that the patch referenced in Microsoft Security Bulletin 02-050 must also be installed if client side certificates are to function. IIS 4.0 users should also install the patch referenced in Microsoft Security Bulletin 04-021 or disable the permanent redirection option under the Home Directory tab in the web site properties. Where can I read more about this? Technical Details Service: http Sent: GET /scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir+c:\ HTTP/1.0 Host: 10.7.0.2 User-Agent: Mozilla/4.0 Connection: Keep-alive Received: HTTP/1.1 200 OK And: 04/03/2008 11:41a <DIR> ASFRoot IPP Service integer overflow Severity: Critical Problem CVE: CVE-2008-1446 CVE-2010-1556 Impact An attacker could send a specially constructed request which crashes the server or executes arbitrary code with the privileges of the web server. Resolutions Install the patches referenced in Microsoft Security Bulletins 03-018, 06-034 (for Windows 2000), 08-006 (for Windows 2003 and XP), and 08-062. For IIS 5.1, also install the patches referenced in 07-041. Note that the patch referenced in Microsoft Security Bulletin 02-050 must also be installed if client side certificates are to function. IIS 4.0 users should also install the patch referenced in Microsoft Security Bulletin 04-021 or disable the permanent redirection option under the Home Directory tab in the web site properties. Where can I read more about this? More information on Integer Overflow in IPP Service is available at Microsoft Security Bulletin 08-062. 16 Technical Details Service: netbios IIS .printer is running and Msw3prt.dll older than 2008-9-8 multiple vulnerabilities in IIS 5.0 Severity: Critical Problem CVE: CVE-2002-0071 CVE-2002-0072 CVE-2002-0073 CVE-2002-0074 CVE-2002-0075 CVE-2002-0079 CVE-2002-0147 CVE-2002-0148 CVE-2002-0149 CVE-2002-0150 CVE-2010-1556 Impact An attacker could send a specially constructed request which crashes the server or executes arbitrary code with the privileges of the web server. Resolutions Install the patches referenced in Microsoft Security Bulletins 03-018, 06-034 (for Windows 2000), 08-006 (for Windows 2003 and XP), and 08-062. For IIS 5.1, also install the patches referenced in 07-041. Note that the patch referenced in Microsoft Security Bulletin 02-050 must also be installed if client side certificates are to function. IIS 4.0 users should also install the patch referenced in Microsoft Security Bulletin 04-021 or disable the permanent redirection option under the Home Directory tab in the web site properties. Where can I read more about this? More information on the multiple vulnerabilities in IIS 4.0 through 5.1 is available in CERT Advisory 2002-09, Microsoft Security Bulletin 02-018, Microsoft Security Bulletin 02-062, and Microsoft Security Bulletin 03-018. More information on the buffer overflows in IIS 5.0 is available from Microsoft Security Bulletins 01-023 and 01-033, CERT advisories 2001-10 and 2001-13. General information on securing IIS 5.0 can be found in the IIS 5 security checklist. Technical Details Service: http Sent: GET /n0nexi5tent_fi1e.html HTTP/1.0 Received: ?document.write( '<A HREF="' + escape(urlresult) + '">' + displayresult + "</a>"); Microsoft Internet Information Services FTP Server Remote Buffer Overflow Severity: Critical Problem CVE: CVE-2009-2521 CVE-2009-3023 CVE-2010-1556 Impact Vulnerabilities in IIS allow privilege elevation, and code execution. 17 Resolution For the FTP Server Remote Buffer Overflow vulnerability, patch as designated in Microsoft Security Bulletin 09-053. Where can I read more about this? The FTP Server Remote Buffer Overflow vulnerability was reported in Microsoft Security Bulletin 09-053. The FTP Server Remote Buffer Overflow was reported in Bugtraq ID 36189. Technical Details Service: http IIS FTP server running and IIS 5 detected and KB975254 not applied WebDAV XML message handler denial of service Severity: Critical Problem CVE: CVE-2003-0718 CVE-2010-1556 Impact An attacker could send a specially constructed request which crashes the server, executes arbitrary code with the privileges of the web server, bypasses access restrictions on WebDAV server, or reveals the source code of ASP pages. Resolutions Install the patch referenced in Microsoft Security Bulletin 04-030 on all platforms, and 03-007 on Windows 2000 prior to service pack 4 and Windows XP prior to service pack 2. Note that the latest patch does not currently fix the IIS 5.1 WebDAV source disclosure vulnerability. Where can I read more about this? The IIS 5.1 WebDAV source code disclosure vulnerability was reported in Bugtraq ID 14764. More information on the WebDAV XML message handler denial of service is available in Microsoft Security Bulletin 04-030. Technical Details Service: http buffer overflow in IIS 5.0 WebDAV Severity: Critical Problem CVE: CVE-2001-0241 CVE-2001-0500 CVE-2003-0109 CVE-2010-1556 Impact An attacker could send a specially constructed request which crashes the server, executes arbitrary code with the privileges of the web server, bypasses access restrictions on WebDAV server, or reveals the source code of ASP pages. 18 Resolutions Install the patch referenced in Microsoft Security Bulletin 04-030 on all platforms, and 03-007 on Windows 2000 prior to service pack 4 and Windows XP prior to service pack 2. Note that the latest patch does not currently fix the IIS 5.1 WebDAV source disclosure vulnerability. Where can I read more about this? The IIS 5.1 WebDAV source code disclosure vulnerability was reported in Bugtraq ID 14764. More information on the WebDAV buffer overflow is available in CERT Advisory 2003-09 and Microsoft Security Bulletin 03-007. Technical Details Service: http Microsoft mail server vulnerabilities, smtpsvc.dll dated 2001-5-4 Severity: Critical Problem CVE: CVE-2010-0024 CVE-2010-0025 CVE-2010-1556 CVE-2010-1689 CVE-2010-1690 Impact A remote attacker could crash the mail service or gain user-level privileges to the service, including the ability to use the server as a mail relay. Resolution To fix the MX Record Denial of Service and Memory Allocation vulnerabilities, apply the patch referenced in Microsoft Security Bulletin 10-024. To fix the vulnerabilities in the Windows Server 2003 mail service, apply the patch referenced in Microsoft Security Bulletin 04-035. To fix the Windows 2000 mail server vulnerabilities, apply Windows 2000 service pack 4. If service pack 4 cannot be applied immediately, apply the patches referenced in Microsoft Security Bulletins 01-037, 02-011, and 02-012, and Microsoft Knowledge Base Article 330716. Note that bulletins 02-011 and 02-012 reference the same patch, which fixes two problems. Where can I read more about this? See Microsoft Security Bulletins 01-037, 02-011, 02-012, 04-035, and 10-024, and Microsoft Knowledge Base Article 330716. The predictable DNS query ID and missing validation of DNS responses were posted to Full Disclosure. Technical Details Service: smtp Microsoft SMTP service running and smtpsvc.dll older than 2010-3-2 19 denial of service in Windows SMTP service Severity: Critical Problem CVE: CVE-2002-0055 CVE-2003-1106 CVE-2010-1556 Impact A remote attacker could crash the mail service or gain user-level privileges to the service, including the ability to use the server as a mail relay. Resolution To fix the MX Record Denial of Service and Memory Allocation vulnerabilities, apply the patch referenced in Microsoft Security Bulletin 10-024. To fix the vulnerabilities in the Windows Server 2003 mail service, apply the patch referenced in Microsoft Security Bulletin 04-035. To fix the Windows 2000 mail server vulnerabilities, apply Windows 2000 service pack 4. If service pack 4 cannot be applied immediately, apply the patches referenced in Microsoft Security Bulletins 01-037, 02-011, and 02-012, and Microsoft Knowledge Base Article 330716. Note that bulletins 02-011 and 02-012 reference the same patch, which fixes two problems. Where can I read more about this? See Microsoft Security Bulletins 01-037, 02-011, 02-012, 04-035, and 10-024, and Microsoft Knowledge Base Article 330716. The predictable DNS query ID and missing validation of DNS responses were posted to Full Disclosure. Technical Details Service: smtp Received: 220 saintlab02.saintlab.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Tue, 13 Jul 2010 10:48:01 -0400 vulnerable Microsoft mail server version: 5.0.2195.2966 Severity: Critical Problem CVE: CVE-2010-0024 CVE-2010-0025 CVE-2010-1556 CVE-2010-1689 CVE-2010-1690 Impact A remote attacker could crash the mail service or gain user-level privileges to the service, including the ability to use the server as a mail relay. Resolution To fix the MX Record Denial of Service and Memory Allocation vulnerabilities, apply the patch referenced in Microsoft Security Bulletin 10-024. To fix the vulnerabilities in the Windows Server 2003 mail service, apply the patch referenced in Microsoft Security Bulletin 04-035. 20 To fix the Windows 2000 mail server vulnerabilities, apply Windows 2000 service pack 4. If service pack 4 cannot be applied immediately, apply the patches referenced in Microsoft Security Bulletins 01-037, 02-011, and 02-012, and Microsoft Knowledge Base Article 330716. Note that bulletins 02-011 and 02-012 reference the same patch, which fixes two problems. Where can I read more about this? See Microsoft Security Bulletins 01-037, 02-011, 02-012, 04-035, and 10-024, and Microsoft Knowledge Base Article 330716. The predictable DNS query ID and missing validation of DNS responses were posted to Full Disclosure. Technical Details Service: smtp Received: 220 saintlab02.saintlab.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Tue, 13 Jul 2010 10:48:01 -0400 vulnerable Microsoft NNTP version: 5.0.2195.2966 Severity: Critical Problem CVE: CVE-2004-0574 CVE-2010-1556 Impact A remote attacker could take control of the server. Resolution Install the appropriate patch referenced in Microsoft Security Bulletin 04-036. Where can I read more about this? See Microsoft Security Bulletin 04-036. Technical Details Service: nntp SQL Server account sa has no password Severity: Critical Problem CVE: CVE-2000-1209 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on the server. Resolution Set a password for the "sa" account in Microsoft SQL Server. A non-guessable password which is at least eight characters long and composed of letters, digits, and non-alphanumeric characters is recommended. Where can I read more about this? For more information on this vulnerability, see US-CERT Vulnerability Note VU#635463. 21 For more information on securing Microsoft SQL Server, see the SQL Server security page. Technical Details Service: 1433:TCP Windows DNS Resolution Remote Code Execution Severity: Critical Problem CVE: CVE-2006-3440 CVE-2006-3441 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name DNS Resolution Remote Code Execution Description Fixes vulnerabilities in the Winsock Hostname functionality and a DNS Resolution Client Buffer Overrun. (CVE 2006-3440 CVE 2006-3441) Fix Bulletin 2000: 920683 06-041 XP: 920683 2003: 920683 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios dnsapi.dll older than 2006-6-24 Windows Media Unicast Service transport information buffer overflow Severity: Critical Problem CVE: CVE-2010-0478 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. 22 The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows Media Unicast Service Fixes a remote code execution transport information buffer overflow vulnerability in handling transport information packets. (CVE 2010-0478) Fix 2000: 980858 Bulletin 10-025 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: 1755:TCP MMS version = 4.1.0.3920 Windows Message Queuing validation vulnerability Severity: Critical Problem CVE: CVE-2007-3039 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Fix 23 Bulletin Message Queuing validation vulnerability Fixes a buffer overflow in Message 2000: 937894 Queuing which could allow remote XP: 937894 command execution for Windows 2000 and privilege elevation for Windows XP. (CVE 2007-3039) 07-065 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios mqutil.dll is out of date indicating Windows Message Queueing validation vulnerability and at least one of ports 2103:TCP, 2105:TCP, or 2107:TCP is open Windows RPC authentication denial of service Severity: Critical Problem CVE: CVE-2007-2228 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows RPC Authentication denial Fixes vulnerability in Windows RPC of service for Windows that allows for a denial of service to be caused in the RPC authentication. (CVE 2007-2228) Fix 2000: 933729 XP: 933729 2003: 933729 Vista: 933729 Bulletin 07-058 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details 24 Service: netbios rpcrt4.dll older than 2007-7-7 Windows Server Service Buffer Overrun Severity: Critical Problem CVE: CVE-2006-3439 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Server Service Buffer Overrun Description Fixes a vulnerability which could allow command execution on a buffer overrun on the Server Service (CVE 2006-3439) Fix Bulletin 2000: 921883 06-040 XP: 921883 2003: 921883 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: 445:TCP Sent netrpPathCanonicalize call, response indicates patch not applied Windows Server Service MS08-067 buffer overflow Severity: Critical Problem CVE: CVE-2008-4250 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install 25 the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows Server Service MS08-067 Fixes a buffer overflow in the buffer overflow Windows Server service which could allow remote attackers to take complete control of the computer. (CVE 2008-4250) Fix 2000: 958644 XP: 958644 2003: 958644 Vista: 958644 2008: 958644 Bulletin 08-067 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: 445:TCP NetprPathCompare returned 0 Windows WMF gdi32.dll vulnerability Severity: Critical Problem CVE: CVE-2005-4560 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows WMF gdi32.dll vulnerability Description Fixes a remote code execution vulnerability which exists in the Graphics Rendering Engine 26 Fix Bulletin 2000: 912919 06-001 XP: 912919 2003: 912919 or because of the way that it handles SP2 Windows Metafile (WMF) images. An attacker could exploit the vulnerability to take complete control of the affected system by constructing a specially crafted WMF image which is read by a user on the system. (CVE 2005-4560) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios gdi32.dll older than 2005-12-25 vulnerable version of SMB Server (MS10-012) Severity: Critical Problem CVE: CVE-2010-0020 CVE-2010-0021 CVE-2010-0022 CVE-2010-0231 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Multiple vulnerabilities (MS10-012) Fixes 4 vulnerabilities announced in Microsoft bulletin MS10-012, the most critical of which could allow remote code execution. The vulnerabilities are due to weak entropy used in encryption, bounds checking on path names, and null pointers. (CVE 2010-0020 CVE 27 Fix 2000 (all versions): 971468 XP: 971468 2003 (all versions): 971468 Vista (all Bulletin 10-007 2010-0021 CVE 2010-0022 CVE 2010-0231) versions): 971468 Windows 7 (all versions): 971468 2008 (all versions): 971468 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: 445:TCP Duplicate NTLM negotiation keys detected vulnerable version of SMB Server (MS10-012) dated 2001-5-8 Severity: Critical Problem CVE: CVE-2010-0020 CVE-2010-0021 CVE-2010-0022 CVE-2010-0231 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Multiple vulnerabilities (MS10-012) Fixes 4 vulnerabilities announced in Microsoft bulletin MS10-012, the most critical of which could allow remote code execution. The vulnerabilities are due to weak entropy used in encryption, bounds checking on path names, and null pointers. (CVE 2010-0020 CVE 2010-0021 CVE 2010-0022 CVE 2010-0231) 28 Fix 2000 (all versions): 971468 XP: 971468 2003 (all versions): 971468 Vista (all versions): 971468 Bulletin 10-007 Windows 7 (all versions): 971468 2008 (all versions): 971468 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios srv.sys older than 2009-12-1 WINS Could Allow Remote Code Execution Severity: Critical Problem CVE: CVE-2009-1923 CVE-2009-1924 CVE-2010-1556 Impact A remote attacker could execute arbitrary code on the WINS server. Resolution Install the fix referenced in Microsoft Security Bulletin 09-039. It is also advisable to use IPsec, block port 42 at the firewall, or disable WINS if it is not needed. These workarounds are addressed in Microsoft Knowledge Base Article 890710. Where can I read more about this? The Remote Code Execution vulnerabilities were reported in Microsoft Security Bulletin 09-039. Technical Details Service: 42:TCP Target running WINS service and accepts malformed requests pointer corruption vulnerability in WINS replication service Severity: Critical Problem CVE: CVE-2004-0567 CVE-2004-1080 CVE-2010-1556 Impact A remote attacker could execute arbitrary code on the WINS server. Resolution Install the fix referenced in Microsoft Security Bulletin 09-039. 29 It is also advisable to use IPsec, block port 42 at the firewall, or disable WINS if it is not needed. These workarounds are addressed in Microsoft Knowledge Base Article 890710. Where can I read more about this? The pointer corruption vulnerability in WINS replication was reported in Secunia Advisory SA13328. and Microsoft Security Bulletin 04-045. The name validation buffer overflow was reported in Microsoft Security Bulletin 04-045. Technical Details Service: wins ASP.NET application folder information disclosure Severity: Area of Concern CVE: CVE-2006-1300 CVE-2010-1556 Impact An attacker could gain unauthorized access to password-protected pages on the web server or create a cross-site scripting attack. Resolution For ASP.NET version 2, the fixes described in Microsoft Security Bulletins 06-033 and 06-056 should also be installed. Where can I read more about this? The Application folder information disclosure was reported in Microsoft Security Bulletin 06-033. Technical Details Service: 5406:TCP Sent: GET /app_code\invalid-file.txt HTTP/1.1 Host: 10.7.0.2:5406 User-Agent: Mozilla/4.0 Connection: Keep-alive Received: // res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm Web server allows cross-site tracing Severity: Area of Concern CVE: CVE-2010-1556 Impact A malicious web site could cause a user to reveal sensitive information through a specially crafted link to the vulnerable server. Resolution 30 Cross-site tracing can be fixed by disabling the TRACE request method. If this is not an option for your web server, install a vendor fix or use one of the following workarounds: Microsoft IIS: Use URL Scan to filter both TRACE and TRACK requests. Apache: Enable the mod_rewrite module, and add the following lines to the configuration file: RewriteEngine On RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule .* - [F] iPlanet: Disabling the TRACE request method currently requires making a change to a shared object library. See the White Paper for details. BEA WebLogic Server and Express: Upgrade and apply the appropriate patch described in the BEA Advisory BEA04-48.01. Sun Java System Application Server Upgrade to enterprise edition 8.2 or higher when available. Where can I read more about this? Sun Java System Application Server cross-site tracing was reported in Bugtraq ID 37995, and US-CERT Vulnerability Note VU#867593. Mac OS cross-site tracing was reported in Apple article HT3937. Cross-site tracing was reported in a White Paper from White Hat Security. Technical Details Service: http Sent: TRACE / HTTP/1.0 Cookie: SAINTtest Received: Cookie: SAINTtest DNS cache snooping vulnerability Severity: Area of Concern CVE: CVE-2010-1556 Impact An attacker could determine what Internet domains have been recently visited. Sensitive information, such as what bank a company uses, could be inferred from this information. Resolution Follow the recommendations described in the paper DNS Cache Snooping. Where can I read more about this? More information on DNS Cache Snooping is available in the paper DNS Cache Snooping. Technical Details 31 Service: domain Received: 5 answers from remote DNS server DNS server allows zone transfers Severity: Area of Concern CVE: CVE-1999-0532 CVE-2010-1556 Impact Attackers could collect information about the domain. Resolution Configure the primary DNS server to allow zone transfers only from secondary DNS servers. In BIND, this can be done in an allow-transfer block in the options section of the named.conf file. Where can I read more about this? Information on DNS zone transfers can be found here. Information on securing DNS can be found here. Technical Details Service: dns Received:; <<>> DiG 9.5.0b2 <<>> @10.7.0.2 SAINTLAB.com axfr; (1 server found);; global options: printcmdSAINTLAB.com.\x09\x093600\x09IN\x09SOA\x09saintlab02.SAINTLAB.com. admin. 38 900 600 86400 3600SAINTLAB.com.\x09\x09600\x09IN\x09A\x0910.7.0.2SAINTLAB.com.\x09\x093600\x09IN\x09NS\ x09saintlab02.SAINTLAB.com.440183c6-def4-4912-8f3d-1db3d6f4cdbf._msdcs.SAINTLAB.com. 600 IN CNAME saintlab02.SAINTLAB.com._kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs.SAINTLAB.com. 600 IN SRV 0 100 88 saintlab0 vulnerabilities in IIS 5 Severity: Area of Concern CVE: CVE-2000-0770 CVE-2001-0151 CVE-2001-0241 CVE-2001-0500 CVE-2001-0507 CVE-2002-0869 CVE-2002-1180 CVE-2002-1181 CVE-2002-1182 CVE-2003-0223 CVE-2003-0224 CVE-2003-0225 CVE-2003-0226 CVE-2006-0026 CVE-2010-1556 Impact An attacker could send a specially constructed request which crashes the server or executes arbitrary code with the privileges of the web server. Resolutions Install the patches referenced in Microsoft Security Bulletins 03-018, 06-034 (for Windows 2000), 08-006 (for Windows 2003 and XP), and 08-062. 32 For IIS 5.1, also install the patches referenced in 07-041. Note that the patch referenced in Microsoft Security Bulletin 02-050 must also be installed if client side certificates are to function. IIS 4.0 users should also install the patch referenced in Microsoft Security Bulletin 04-021 or disable the permanent redirection option under the Home Directory tab in the web site properties. Where can I read more about this? More information on the ASP upload vulnerability is available in Microsoft Security Bulletin 06-034. More information on the multiple vulnerabilities in IIS 4.0 through 5.1 is available in CERT Advisory 2002-09, Microsoft Security Bulletin 02-018, Microsoft Security Bulletin 02-062, and Microsoft Security Bulletin 03-018. More information on the buffer overflows in IIS 5.0 is available from Microsoft Security Bulletins 01-023 and 01-033, CERT advisories 2001-10 and 2001-13. General information on securing IIS 5.0 can be found in the IIS 5 security checklist. More information on the other vulnerabilities was reported in Microsoft Security Bulletins 00-057, 01-016, and 01-044. Technical Details Service: http IIS 5 detected and KB917537 not applied Microsoft IIS Authentication Method Disclosed Severity: Area of Concern CVE: CVE-2002-0419 CVE-2010-1556 Impact An attacker could determine which authentication scheme is required for confidential web pages. This can be used for brute force attacks against known User IDs. Resolutions Use Fix information in Considerations for IIS authentication. Where can I read more about this? More information on the IIS Authorization method disclosure is available in Considerations for IIS authentication. Technical Details Service: http Sent: GET / HTTP/1.1 Host: 10.7.0.2 Authorization: Negotiate TlRMTVNTUAABAAAAB4IAoAAAAAAAAAAAAAAAAAAAAAA= Received: 401 Unauthorized returned indicating NTLM Authentication 33 Microsoft IIS WebDAV Request Directory Security Bypass Severity: Area of Concern CVE: CVE-2009-1122 CVE-2009-1535 CVE-2010-1556 Impact An attacker could send a specially constructed request which crashes the server, executes arbitrary code with the privileges of the web server, bypasses access restrictions on WebDAV server, or reveals the source code of ASP pages. Resolutions Install the patch referenced in Microsoft Security Bulletin 04-030 on all platforms, and 03-007 on Windows 2000 prior to service pack 4 and Windows XP prior to service pack 2. Note that the latest patch does not currently fix the IIS 5.1 WebDAV source disclosure vulnerability. For the IIS WebDAV Authentication Bypass vulnerability, patch as designated in the Microsoft Security Bulletin 09-020. Where can I read more about this? The IIS WebDAV Authentication Bypass vulnerability was reported in Microsoft Security Bulletin 09-020. The IIS 5.1 WebDAV source code disclosure vulnerability was reported in Bugtraq ID 14764. Technical Details Service: http Sent: POST /%25%34%39%25%34%39%25%35%33%25%34%31%25%36%34%25%36%64%25%36%39%25%36 %65%25%32%66%25%36%34%25%36%35%25%36%36%25%36%31%25%37%35%25%36%63%25%3 7%34%25%32%65%25%36%31%25%37%33%25%37%30%2500postinfo.html HTTP/1.0 IF: Host: 10.7.0.2:80 Received: HTTP/1.1 501 Not Implemented Internet Explorer ADODB.Connection ActiveX Object Memory Corruption Severity: Area of Concern CVE: CVE-2006-5559 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) 34 (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. To fix the ADODB.connection vulnerability, install the fix at MS07-009. or mitigate the impact by setting the kill bit for the following CLSID: 00000514-0000-0010-8000-00AA006D2EA4. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. More information on the ADODB.connection vulnerability is reported in US-CERT Vulnerability Note VU#589272 and Bugtraq ID 20704. Technical Details 35 Service: netbios msado15.dll older than 2006-12-15 Internet Explorer August 2006 CSU fixes Severity: Area of Concern CVE: CVE-2004-1166 CVE-2006-3280 CVE-2006-3450 CVE-2006-3451 CVE-2006-3637 CVE-2006-3638 CVE-2006-3639 CVE-2006-3640 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. 36 For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2006-6-28 Internet Explorer COM Objects Instantiation vulnerability Severity: Area of Concern CVE: CVE-2006-4193 CVE-2006-4219 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object 37 Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. To mitigate the impact of the ActiveX instantiation heap memory corruption, set the kill bit for the following CLSIDs: 3BC4F3A3-652A-11D1-B4D4-00C04FC2DB8D 4682C82A-B2FF-11D0-95A8-00A0C92B77A9 8E71888A-423F-11D2-876E-00A0C9082467 E2E9CAE6-1E7B-4B8E-BABD-E9BF6292AC29 233A9694-667E-11D1-9DFB-006097D50408 BE4191FB-59EF-4825-AEFC-109727951E42 6E3197A3-BBC3-11D4-84C0-00C04F7A06E5 606EF130-9852-11D3-97C6-0060084856D4 F849164D-9863-11D3-97C6-0060084856D4 Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. More information on the ActiveX instantiation heap memory corruption may be found at XSec Security Advisories: XSec-06-02, XSec-06-03, XSec-06-04, XSec-06-06, XSec-06-08. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2006-7-4 Internet Explorer COM object memory corruption Severity: Area of Concern CVE: CVE-2005-2127 CVE-2010-1556 38 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. 39 The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2005-9-30 Internet Explorer Cascading Style Sheets vulnerability Severity: Area of Concern CVE: CVE-2004-0216 CVE-2004-0727 CVE-2004-0839 CVE-2004-0841 CVE-2004-0842 CVE-2004-0843 CVE-2004-0844 CVE-2004-0845 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} 40 Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios urlmon.dll older than 2004-9-22 Internet Explorer Create Text Range code injection Severity: Area of Concern CVE: CVE-2006-1185 CVE-2006-1186 CVE-2006-1188 CVE-2006-1189 CVE-2006-1190 CVE-2006-1191 CVE-2006-1192 CVE-2006-1245 CVE-2006-1359 CVE-2006-1388 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) 41 (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Information on the createTextRange vulnerability may be found in Bugtraq ID 17196. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2006-3-17 Internet Explorer DHTML method memory corruption Severity: Area of Concern CVE: CVE-2005-0053 CVE-2005-0054 CVE-2005-0055 CVE-2005-0056 CVE-2010-1556 42 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. 43 The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2005-1-6 Internet Explorer Exception Handling Memory Corruption vulnerability Severity: Area of Concern CVE: CVE-2005-4089 CVE-2006-1303 CVE-2006-1626 CVE-2006-2218 CVE-2006-2382 CVE-2006-2383 CVE-2006-2384 CVE-2006-2385 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} 44 Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2006-5-18 Internet Explorer JPEG buffer overflow Severity: Area of Concern CVE: CVE-2005-1988 CVE-2005-1989 CVE-2005-1990 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, 45 Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2005-7-17 Internet Explorer JS remote code execution Severity: Area of Concern CVE: CVE-2006-1313 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: 46 (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios jscript.dll older than 2006-5-10 47 Internet Explorer JS stack overflow Severity: Area of Concern CVE: CVE-2006-0753 CVE-2006-0830 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. 48 Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. More information on the Stack overflow vulnerability may be found in Bugtraq ID 16687. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios jscript.dll older than 2005-1-1 Internet Explorer JavaScript vulnerability Severity: Area of Concern CVE: CVE-2005-1790 CVE-2005-2829 CVE-2005-2830 CVE-2005-2831 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: 49 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. The memory overflow error on the window() function is reported in a Computer Terrorism article. Technical Details Service: netbios mshtml.dll older than 2005-11-22 Internet Explorer Nested OBJECT tag memory corruption Severity: Area of Concern CVE: CVE-2006-1992 CVE-2006-2094 CVE-2006-2111 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) 50 (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2006-6-1 Internet Explorer PNG buffer overflow Severity: Area of Concern CVE: CVE-2002-0648 CVE-2005-1211 CVE-2010-1556 Impact 51 A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. 52 Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2005-4-26 Internet Explorer URL parsing buffer overflow Severity: Area of Concern CVE: CVE-2005-0553 CVE-2005-0554 CVE-2005-0555 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? 53 For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios mshtml.dll older than 2005-2-23 Internet Explorer VBScript and JScript decoding vulnerability Severity: Area of Concern CVE: CVE-2008-0083 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object 54 Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios jscript.dll older than 2007-12-12 Internet Explorer VML Remote Code Execution Severity: Area of Concern CVE: CVE-2006-4868 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) 55 (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. More information on the VML buffer overflow may be found in Bugtraq ID 20096. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios vgx.dll older than 2006-9-15 Internet Explorer VML buffer overflow (MS07-004) Severity: Area of Concern CVE: CVE-2007-0024 CVE-2010-1556 56 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. 57 The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios vgx.dll older than 2006-11-1 Internet Explorer vulnerable VML version dated 2001-5-8 Severity: Area of Concern CVE: CVE-2007-1749 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. 58 Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios vgx.dll older than 2007-6-25 Jscript.dll buffer overflow vulnerability Severity: Area of Concern CVE: CVE-2009-1920 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) 59 Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios jscript.dll older than 2009-6-1 Windows 2000 IE6 VML vulnerable version, vgx.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2007-5348 CVE-2008-3012 CVE-2008-3013 CVE-2008-3014 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) 60 (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios vgx.dll older than 2008-4-27 61 WordPerfect Converter buffer overflow Severity: Area of Concern CVE: CVE-2004-0573 CVE-2010-1556 Impact An attacker could run commands on a user's computer if the user opens a malformed document. Resolution All Microsoft Office for Windows users should install the patches referenced in Microsoft Security Bulletins 08-044, 08-055, 08-069, 09-027, 09-060 (supersedes 08-015 for Outlook in Office XP and Office 2003), 10-038 (supersedes 10-017), 09-068, 09-073, 10-004, 10-003, 10-023, and 10-036. Users of Microsoft Office Outlook 2007 should also install the patch referenced in Microsoft Security Bulletin 08-026. Users of Microsoft Office 2000, 2002, and 2003 should also install the patches referenced in Microsoft Security Bulletins 07-013, and 09-074. Users of Visio 2002 and 2003 should upgrade to Visio 2007, and users of Visio 2007 should install the patches referenced in Microsoft Security Bulletin 09-005, 09-060, and 10-028. Visio 2002 users should upgrade to Visio 2007 and Office XP and Project 2002 users should install the patch referenced in Microsoft Security Bulletin 05-005. Microsoft Office X for Mac users should upgrade to Microsoft Office 2004. Microsoft Office 2004 for Mac users should upgrade to 11.5.9 or higher. Microsoft Office 2008 for Mac users should upgrade to 12.2.5 or higher. Where can I read more about this? For more information, see Microsoft Security Bulletins 04-027, 04-033, 05-005, 05-023, 05-035, 06-009, 06-010, 06-012, 06-027, 06-028, 06-037, 06-038, 06-039, 06-048, 06-054, 06-058, 06-059, 06-060, 06-061, 06-062, 07-001, 07-002, 07-013, 07-014, 07-015, 07-023, 07-024, 07-025, 07-030, 07-036, 07-037, 07-042, 07-043, 07-044, 07-060, 08-009, 08-012, 08-014, 08-016, 08-018, 08-019, 08-026, 08-027, 08-042, 08-043, 08-044, 08-051, 08-055, 08-057, 08-069, 08-072, 08-074, 09-005, 09-009, 09-010, 09-017, 09-021, 09-027, 09-030, 09-060, 09-067, 09-068, 09-073, 09-074, 10-004, 10-003, 10-017, 10-023, 10-028, 10-036, 10-038, and 10-039. Technical Details Service: netbios msconv97.dll older than 2004-2-23 Microsoft outlook ATL vulnerability (MS09-037) Severity: Area of Concern CVE: CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-1556 Impact 62 A vulnerability could allow remote attackers to bypass security restrictions and execute remote code. Resolution Apply the appropriate patch as indicated in Microsoft Security Bulletin MS10-030. Where can I read more about this? Technical Details Service: netbios msoe.dll older than 2009-7-8 Outlook Express Could Allow Remote Code Execution (MS10-030) Severity: Area of Concern CVE: CVE-2010-0816 CVE-2010-1556 Impact A vulnerability could allow remote attackers to bypass security restrictions and execute remote code. Resolution Apply the appropriate patch as indicated in Microsoft Security Bulletin MS10-030. Where can I read more about this? Technical Details Service: netbios msoe.dll older than 2010-2-1 Microsoft SQL Server Distributed Management Objects Buffer Overflow Severity: Area of Concern CVE: CVE-2007-4814 CVE-2010-1556 Impact Vulnerabilities in Microsoft SQL Server could allow a remote attacker to execute arbitrary code or crash the server. Furthermore, the server could be susceptible to the Slammer worm, which could cause a denial of service or infection of other servers. Resolution Install the appropriate cumulative patch for your version of Microsoft SQL Server as outlined in Microsoft Security Bulletin 09-004, and Microsoft Security Bulletin 08-040. To mitigate the impact of the ActiveX vulnerability, set the kill bit for the following CLSID: 10020100-E260-11CF-AE68-00AA004A34D5. For SQL Server 7.0, install the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031. For SQL Server 2000 or MSDE 2000, install SQL Server 2000 Service Pack 3 or 3a or higher and the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031, and install Microsoft Jet 4.0 Service Pack 6. 63 Where can I read more about this? For more information, see CERT Advisory 2002-22, which summarizes a number of Microsoft SQL Server vulnerabilities. For details on specific vulnerabilities, see Microsoft Security Bulletins 09-004, 08-052, 08-040, 03-031, 02-061, 02-056, 02-043, 02-040, 02-039, 02-038, 02-034, 02-030, 02-020, 02-007, 01-060, 01-032, 00-092, 00-048, 00-041, 00-035, 00-014, 99-059, CIAC Bulletins M-094 and K-026, and NGSSoftware Advisories #NISR25072002 and #NISR22002002A. The Distributed Management Objects ActiveX Buffer Overflow was reported in Bugtraq ID 25594. Technical Details Service: netbios sqldmo.dll older than 2007-2-11 Microsoft SQL Server vulnerable version, sqlservr.exe dated 2000-8-6 Severity: Area of Concern CVE: CVE-2007-5348 CVE-2008-3012 CVE-2008-3013 CVE-2008-3014 CVE-2008-3015 CVE-2010-1556 Impact Vulnerabilities in Microsoft SQL Server could allow a remote attacker to execute arbitrary code or crash the server. Furthermore, the server could be susceptible to the Slammer worm, which could cause a denial of service or infection of other servers. Resolution Install the appropriate cumulative patch for your version of Microsoft SQL Server as outlined in Microsoft Security Bulletin 09-004, and Microsoft Security Bulletin 08-040. For SQL Server 7.0, install the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031. For SQL Server 2000 or MSDE 2000, install SQL Server 2000 Service Pack 3 or 3a or higher and the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031, and install Microsoft Jet 4.0 Service Pack 6. Where can I read more about this? For more information, see CERT Advisory 2002-22, which summarizes a number of Microsoft SQL Server vulnerabilities. For details on specific vulnerabilities, see Microsoft Security Bulletins 09-004, 08-052, 08-040, 03-031, 02-061, 02-056, 02-043, 02-040, 02-039, 02-038, 02-034, 02-030, 02-020, 02-007, 01-060, 01-032, 00-092, 00-048, 00-041, 00-035, 00-014, 99-059, CIAC Bulletins M-094 and K-026, and NGSSoftware Advisories #NISR25072002 and #NISR22002002A. Technical Details Service: netbios sqlservr.exe older than 2008-8-2 64 Telnet Authentication Reflection Severity: Area of Concern CVE: CVE-2009-1930 CVE-2010-1556 Impact A remote user could execute arbitrary commands on the server, cause the telnet server to stop responding, or gain information that could be used in an attempt to find Guest accounts. Resolution Apply the patches referenced in Microsoft Security Bulletins 09-042, 01-031 and 02-004. Where can I read more about this? For more information, see Microsoft Security Bulletins 09-042, 01-031 and 02-004. Technical Details Service: netbios telnet.exe older than 2009-1-1 Outlook Express Contact Record vulnerability Severity: Area of Concern CVE: CVE-2006-2386 CVE-2010-1556 Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. Where can I read more about this? For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, and 08-015, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. Technical Details Service: netbios Inetcomm.dll older than 2006-11-1 Outlook Express Windows Address Book vulnerability Severity: Area of Concern CVE: CVE-2006-0014 CVE-2010-1556 65 Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. Where can I read more about this? For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, and 08-015, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. Technical Details Service: netbios msoe.dll older than 2006-2-21 Outlook Express vulnerable version, inetcomm.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2006-2111 CVE-2007-2225 CVE-2007-2227 CVE-2007-3897 CVE-2010-1556 Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. Where can I read more about this? For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, and 08-015, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. Technical Details 66 Service: netbios Inetcomm.dll older than 2007-8-14 Microsoft VB6 FlexGrid ActiveX control vulnerable version dated 1999-9-7 Severity: Area of Concern CVE: CVE-2008-4253 CVE-2010-1556 Impact Vulnerabilities in Microsoft Visual Studio allow for execution of arbitrary code by processing a malformed dbp, rtf or sln file. Also, an ActiveX component allows for crafted web pages to cause remote code execution. Resolution To mitigate the impact of the Microsoft VB6 ActiveX vulnerabilities, set the kill bit for the following CLSID: msdatgrd.ocx = CDE57A43-8B86-11D0-B3C6-00A0C90AEA82, msflxgrd.ocx = 6262d3a0-531b-11cf-91f6-c2863c385e30, mshflxgd.ocx = 0ECD9B64-23AA-11d0-B351-00A0C9055D8E, mscomct2.ocx = B09DE715-87C1-11d1-8BE3-0000F8754DA1, mschrt20.ocx = 3A2B370C-BA0A-11d1-B137-0000F8753F5D or update as referenced in Microsoft Security Bulletin 08-070. Where can I read more about this? The Microsoft VB6 ActiveX vulnerabilities were reported in Microsoft Security Bulletin 08-070. Technical Details Service: netbios MSFLXGRD.OCX older than 2008-10-8 Elevation of Privilege Vulnerabilities in Windows (MS09-012) Severity: Area of Concern CVE: CVE-2008-1436 CVE-2009-0078 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding 67 Microsoft Security Bulletins for patch information. Update Name Description Elevation of Privilege Vulnerabilities Fixes multiple privilege elevation in Windows vulnerabilities. (CVE 2008-4036 CVE 2008-1436 CVE 2009-0078 CVE 2009-0079 CVE 2009-0080 ) Fix 2000: 952004 XP: 952004 2003: 952004 Vista: 952004 2008: 952004 Bulletin 08-064 09-012 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios msdtcprx.dll older than 2008-6-24 Elevation of Privilege Vulnerabilities in Windows (MS10-015) Severity: Area of Concern CVE: CVE-2010-0232 CVE-2010-0233 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows kernel vulnerable version Fixes multiple vulnerabilities which allow authenticated users to elevate privileges on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. (CVE 2009-2515 CVE 2009-2516 CVE 2009-2517 CVE 2010-0232 CVE 2010-0233 ) 68 Fix 2000: 977165 XP: 977165 2003: 977165 Vista: 977165 2008: 977165 Windows 7: 977165 Bulletin 09-058 10-015 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios ntoskrnl.exe older than 2009-12-7 Jet Database Engine vulnerable version, msjet40.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2005-0944 CVE-2007-6026 CVE-2008-1092 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Jet Database Engine vulnerable version Description Fixes a vulnerability which could allow an attacker to execute arbitrary code by enticing a target user to open a crafted MDB file. (CVE 2007-6026 CVE 2008-1092 ) Fix 2000: 950749 XP: 950749 2003 SP1: 950749 Bulletin 08-028, US-CERT Vulnerability Note VU#936529 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Msjet40.dll older than 2008-3-1 Kodak Image Viewer remote code execution 69 Severity: Area of Concern CVE: CVE-2007-2217 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Kodak Image Viewer remote code execution Description Fixes a vulnerability in the Kodak Image Viewer that allows for remote code execution when viewing a crafted file. (CVE 2007-2217) Fix 2000: 923810 XP: 923810 2003: 923810 Bulletin 07-055 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios kodakimg.exe older than 2007-5-1 Microsoft Agent ACF memory corruption Severity: Area of Concern CVE: CVE-2006-3445 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new 70 critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Microsoft Agent ACF memory corruption Description Fix Microsoft Agent vulnerability causing 2000: 920213 remote code execution through XP: 920213 read of crafted .ACF files read in 2003: 920213 web page. (CVE 2006-3445) Bulletin 06-068 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios agentdpv.dll older than 2006-8-17 Microsoft Agent URL parsing vulnerability Severity: Area of Concern CVE: CVE-2007-1205 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Microsoft Agent URL parsing vulnerability Description Fixes a vulnerability in Microsoft Agent that allows remote code execution when reading a crafted URL (CVE 2007-1205) Fix 2000: 932168 XP: 932168 2003: 932168 Bulletin 07-020 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for 71 Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios agentdpv.dll older than 2007-3-7 Microsoft Agent vulnerable version, agentdpv.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2007-3040 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Microsoft Agent ActiveX remote code execution Description Fix Fixes an additional vulnerability in 2000: 938827 Microsoft Agent that allows remote code execution when reading a crafted URL. (CVE 2007-3040) Bulletin 07-051 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios agentdpv.dll older than 2007-6-22 Microsoft Data Access Component vulnerability Severity: Area of Concern CVE: CVE-2006-0003 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. 72 The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Microsoft Data Access Component A remote code execution vulnerability vulnerability exists in the RDS.Dataspace ActiveX control in ADO distributed in MDAC. Opening a file provided by an attacker (Mail or Website) allows an attacker to execute code with the rights of that user. (CVE 2006-0003) Fix Bulletin 2000: 911562 06-014 XP: 911562 2003: 911562 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios msadco.dll older than 2006-2-15 Microsoft Image Color Management System vulnerable version, mscms.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2008-2245 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. 73 Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Microsoft Image Color Management Fixes a vulnerability which could System vulnerable version allow remote command execution on Windows 2000, Windows XP and Windows Server 2003. (CVE 2008-2245) Fix 2000: 952954 XP: 952954 2003: 952954 Bulletin 08-046 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Mscms.dll older than 2008-6-23 Microsoft Paint Integer Overflow vulnerability Severity: Area of Concern CVE: CVE-2010-0028 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Microsoft Paint Integer Overflow vulnerability Description Fix Fixes a remote code execution 2000: 978706 vulnerability if a user viewed a XP: 978706 specially crafted JPEG image file (32-bit), 978706 using Microsoft Paint in Windows (64-bit) 2000, XP and Server 2003. An 2003: 978706 attacker who successfully exploited (32-bit), 978706 this vulnerability could take complete (64-bit), 978706 control of an affected system and (Itanium) 74 Bulletin 10-005 could then install programs; view, change, or delete data; or create new accounts. (CVE 2010-0028) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios mspaint.exe older than 2009-12-27 Microsoft Windows DHTML remote code execution vulnerability (MS09-046) Severity: Area of Concern CVE: CVE-2009-2519 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name DHTML Editing Component ActiveX Control Vulnerability Description Fixes a remote code execution vulnerability in the DHTML Editing Component ActiveX Control brought on by users visiting a specially crafted web page. (CVE 2009-2519) Fix Windows 2000:956844 Windows XP:956844 (32-bit), 956844 (64-bit) Windows 2003:956844 (32-bit), 956844 (64-bit), 956844 (Itanium) Bulletin 09-046 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 75 2008. Technical Details Service: netbios triedit.dll older than 2009-8-1 Microsoft Windows vulnerable version, msconv97.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2009-2506 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name WordPad and Text converters remote code execution Description Fixes Microsoft WordPad and Microsoft Office text converters memory corruption. (CVE 2008-4841 CVE 2009-0087 CVE 2009-0235 CVE 2009-2506) Fix 2000: 973904 XP: 973904 2003: 973904 Bulletin 09-010 09-073 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios msconv97.dll older than 2009-8-20 NetBIOS Name Service information disclosure Severity: Area of Concern CVE: CVE-2003-0661 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. 76 The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name NetBIOS Name Service information disclosure Description Fixes an Information Disclosure vulnerability which could allow an attacker to receive random data from the target system's memory. (CVE 2003-0661) Fix NT: 824105 2000: 824105 XP: 824105 2003: 824105 Bulletin 03-034 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: 137:UDP vulnerability in NetBT Name Service Vulnerability in the OpenType Compact Font Format Driver Could Allow Elevation of Privilege Severity: Area of Concern CVE: CVE-2010-0819 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. 77 Update Name Vulnerability in the OpenType Compact Font Format Driver Could Allow Elevation of Privilege Description Fixes a vulnerability in the Windows OpenType Compact Font Format (CFF) driver. The vulnerability could allow elevation of privilege if a user views content rendered in a specially crafted CFF font. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. (CVE 2010-0819) Fix 2000: 980218 XP: 980218 2003: 980218 Vista: 980218 2008: 980218 Windows 7: 980218 Bulletin 10-037 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios atmfd.dll older than 2010-4-12 Vulnerable MFC Library FileFind Class file mfc42.dll Severity: Area of Concern CVE: CVE-2007-4916 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Vulnerable MFC Library FileFind Class file Heap Overflow Description A Heap Overflow exists in the Microsoft Windows MFC Shared Library - FileFind Class. (CVE 2007-4916) 78 Fix To mitigate the impact of the known ActiveX vector to this Bulletin US-CERT Vulnerability Note VU#611008 vulnerability, set the kill bit for the following CLSID: F3F381A3-479541FF-8190-7AA2 A8102F85. Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios mfc42.dll older than 2007-1-1 Vulnerable MFC Library FileFind Class file mfc42u.dll Severity: Area of Concern CVE: CVE-2007-4916 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Vulnerable MFC Library FileFind Class file Heap Overflow Description A Heap Overflow exists in the Microsoft Windows MFC Shared Library - FileFind Class. (CVE 2007-4916) Where can I read more about this? 79 Fix To mitigate the impact of the known ActiveX vector to this vulnerability, set the kill bit for the following CLSID: F3F381A3-479541FF-8190-7AA2 A8102F85. Bulletin US-CERT Vulnerability Note VU#611008 For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios mfc42u.dll older than 2007-1-1 Windows 2000 GDI vulnerable version, gdi32.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2008-1083 CVE-2008-1087 CVE-2008-2249 CVE-2008-3465 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows GDI remote code execution Description Fix Fixes several vulnerabilities:(1) stack2000: 956802 overflow vulnerability in the way XP: 956802 Graphics Device Interface (GDI) 2003: 956802 handles filename parameters in Vista: 956802 EMF image files; (CVE 2008-1087) 2008: 956802 (2) heap overflow vulnerability in the way GDI handles integer calculations;(CVE 2008-1083) (3) remote code execution vulnerability in the way that GDI handles integer calculations;(CVE 2008-2249) (4) remote code execution vulnerability in the way that GDI handles file size parameters in WMF files.(CVE 2008-3465) Where can I read more about this? 80 Bulletin 08-071 08-021 For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios gdi32.dll older than 2008-10-22 Windows Authenticode Signature Verification (MS10-019) version, wintrust.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2010-0486 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows Authenticode Verification Fixes vulnerabilities which could allow remote code execution when a user modifies an existing signed executable file. (CVE 2010-0486 CVE 2010-0487 ) 81 Fix Bulletin For 10-019 Authenticode Signature Verification: 2000 978601 XP 978601 XP x64 978601 2003 978601 2003 x64 978601 Vista 978601 Vista x64 978601 2008 978601 2008 x64 978601 Windows 7 978601 Windows 7 x64 978601 Server 2008 R2 x64 978601 For Cabinet File Viewer: 2000 979309 XP 979309 XP x64 979309 2003 979309 2003 x64 979309 Vista 979309 Vista x64 979309 2008 979309 2008 x64 979309 Windows 7 979309 Windows 7 x64 979309 Server 2008 R2 x64 979309 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios wintrust.dll older than 2009-12-21 Windows CSRSS Local (MS10-011) vulnerable version, csrsrv.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2010-0023 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. 82 Update Name CSRSS Local Privilege Elevation Description Fixes a vulnerability in Client /Server Run-time Subsystem (CSRSS). (CVE 2010-0023) Fix Bulletin 2000: 978037 10-011 XP: 978037 , 978037 (64-bit) 2003: 978037 , 978037 (64-bit) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios csrsrv.dll older than 2009-12-13 Windows CSRSS remote code execution Severity: Area of Concern CVE: CVE-2006-6696 CVE-2006-6797 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows CSRSS remote code execution Description Fixes vulnerabilities in the Windows Client/Server Run-time Subsystem (CSRSS) that include remote code execution. (CVE 2006-6696 CVE 2006-6797 CVE 2007-1209) Fix 2000: 930178 XP: 930178 2003: 930178 Vista: 930178 Bulletin 07-021 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. 83 Technical Details Service: netbios winsrv.dll older than 2007-3-11 Windows Cabinet File Viewer (MS10-019) version, cabview.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2010-0487 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows Authenticode Verification Fixes vulnerabilities which could allow remote code execution when a user modifies an existing signed executable file. (CVE 2010-0486 CVE 2010-0487 ) 84 Fix Bulletin For 10-019 Authenticode Signature Verification: 2000 978601 XP 978601 XP x64 978601 2003 978601 2003 x64 978601 Vista 978601 Vista x64 978601 2008 978601 2008 x64 978601 Windows 7 978601 Windows 7 x64 978601 Server 2008 R2 x64 978601 For Cabinet File Viewer: 2000 979309 XP 979309 XP x64 979309 2003 979309 2003 x64 979309 Vista 979309 Vista x64 979309 2008 979309 2008 x64 979309 Windows 7 979309 Windows 7 x64 979309 Server 2008 R2 x64 979309 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios cabview.dll older than 2010-1-11 Windows DNS Client Spoofing vulnerability Severity: Area of Concern CVE: CVE-2008-1447 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows DNS Client Spoofing vulnerability Description Fix Fixes a vulnerability in the Windows 2000: 951748 DNS client. This vulnerability could XP: 951748 85 Bulletin 08-037 allow a remote unauthenticated 2003: 951748 attacker to quickly and reliably spoof responses and insert records into the client cache, thereby redirecting Internet traffic. (CVE 2008-1447) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios dnsapi.dll older than 2008-6-19 Windows DNS Server Spoofing vulnerability Severity: Area of Concern CVE: CVE-2008-1447 CVE-2008-1454 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows DNS Server Spoofing vulnerability Description Fixes two vulnerabilities in the Windows DNS Server. The vulnerabilities could allow spoofing by poisoning the DNS cache. (CVE 2008-1447 CVE 2008-1454) Fix 2000: 951746 2003: 951746 2008: 951746 Bulletin 08-037 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details 86 Service: netbios Dns.exe older than 2008-5-31 Windows DNS Spoofing vulnerability Severity: Area of Concern CVE: CVE-2008-0087 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows DNS Spoofing Attack vulnerability Description Fixes a vulnerability in the Windows DNS client that leads to a lack of entropy in the randomness of the choice of transaction IDs which could allow an attacker to send malicious responses to DNS requests. (CVE 2008-0087) Fix 2000: 945553 XP: 945553 2003: 945553 Vista: 945553 Bulletin 08-020 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios dnsapi.dll older than 2008-2-14 Windows DirectShow AVI Filter buffer overflow Severity: Area of Concern CVE: CVE-2010-0250 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. 87 The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name DirectShow AVI buffer overflow Description Fixes vulnerabilities in DirectShow which could allow code execution when a user opens a crafted AVI file. (CVE 2010-0250) Fix 977914 and 975560 Bulletin 10-013 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios avifil32.dll older than 2009-11-22 Windows Embedded OpenType Font Engine Vulnerability Severity: Area of Concern CVE: CVE-2010-0018 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Fix 88 Bulletin Windows Embedded OpenType Font Engine Vulnerability Fixes a remote code execution vulnerability in windows 2000, 2003, XP, VISTA, 7 and Server 2008. The vulnerability exists due to the way Windows Embedded OpenType (EOT) Font Engine decompresses specially crafted EOT fonts. (CVE 2010-0018) 2000: 972270 2003: 972270 (32-bit), 972270 (64-bit) XP: 972270 (32-bit), 972270 (64-bit) Vista: 972270 (32-bit), 972270 (64-bit) Windows 7: 972270 2008: 972270 (32-bit), 972270 (64-bit) 10-001 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios fontsub.dll older than 2009-10-13 Windows GDI image handling buffer overflow Severity: Area of Concern CVE: CVE-2007-3034 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows GDI image handling buffer overflow Description Fixes a vulnerability in the Windows graphics device interface allowing command execution when a specially crafted image is rendered. 89 Fix 2000: 938829 XP: 938829 2003: 938829 Bulletin 07-046 (CVE 2007-3034) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios gdi32.dll older than 2007-6-25 Windows Help File Handling Heap Buffer Overflow Severity: Area of Concern CVE: CVE-2007-1912 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows Help File Handling Heap Buffer Overflow Description Fix Windows 2000, XP, and 2003 are affected by a heap overflow issue when handling a specially crafted Windows Help (.hlp) file containing a malicious bitmap. (CVE 2007-1912) Bulletin Bugtraq ID 23382 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios winhlp32.exe older than 2005-4-1 Windows Help File Image Processing Heap Buffer Overflow 90 Severity: Area of Concern CVE: CVE-2006-1591 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows Help File Image Processing Heap Buffer Overflow Description Fix Windows 2000, XP, and 2003 are affected by a heap overflow issue when handling a specially crafted Windows Help (.hlp) file containing a malicious image. (CVE 2006-1591) Bulletin Bugtraq ID 17325 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios winhlp32.exe older than 2003-1-1 Windows Internet Authentication Service vulnerabilities Severity: Area of Concern CVE: CVE-2009-3677 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new 91 critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows Internet Authentication Service vulnerabilities Description Fix Fixes vulnerabilities in the Windows 2000: 974318 PEAP and MS-CHAPv2 protocol XP: 974318 implementations, which could lead to2003: 974318 remote code execution in Windows Vista: 974318 2008, privilege elevation in other 2008: 974318 server operating systems, and potential vulnerabilities in workstations. (CVE 2009-2505 CVE 2009-3677) Bulletin 09-071 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios rastls.dll older than 2009-10-7 Windows Kernel privilege elevation (ms06-049) vulnerability Severity: Area of Concern CVE: CVE-2006-3444 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows Kernel privilege elevation Fixes a vulnerability that allows an vulnerability attacker who has successfully logged into the system to take 92 Fix 2000: 920958 Bulletin 06-049 control of a host. Note: Different than MS05-055. (CVE 2006-3444) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Ntoskrnl.exe older than 2006-6-14 Windows Kernel privilege elevation (ms07-022) vulnerability Severity: Area of Concern CVE: CVE-2007-1206 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows Kernel privilege elevation Fixes a vulnerability that allows an vulnerability attacker who has successfully logged into the system to take control of a host. Note: Different than MS05-055 and MS06-049. (CVE 2007-1206) Fix 2000: 931784 XP: 931784 2003: 931784 Bulletin 07-022 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Ntoskrnl.exe older than 2007-3-3 93 Windows Kernel privilege elevation vulnerability Severity: Area of Concern CVE: CVE-2005-2827 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Fix Windows Kernel privilege elevation Fixes a vulnerability in the Windows 2000: 908523 vulnerability 2000 Kernel that allows an attacker who has successfully logged into the system to take control of a host. (CVE 2005-2827) Bulletin 05-055 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Ntoskrnl.exe older than 2005-10-4 Windows LSASS IPSEC Denial-of-Service Vulnerability Severity: Area of Concern CVE: CVE-2009-3675 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you 94 install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows LSASS IPSEC Denial-of-Service Vulnerability Description Fixes a vulnerability in the Local Security Authority Subsystem Service (LSASS) which could allow a denial of service. (CVE 2009-3675) Fix 2000: 974392 2003: 974392 (32-bit), 974392 (64-bit), 974392 (Itanium) XP: 974392 (32-bit), 974392 (64-bit) Bulletin 09-069 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios oakley.dll older than 2009-10-7 Windows LSASS vulnerability Severity: Area of Concern CVE: CVE-2007-5352 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows LSASS vulnerability Description Fix Fixes a vulnerability that could allow 2000: 943485 an attacker to gain elevated XP: 943485 95 Bulletin 08-002 privileges. (CVE 2007-5352) 2003: 943485 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios lsasrv.dll older than 2007-10-13 Windows MPEG layer 3 codec vulnerable version, l3codecx.ax dated 2001-5-8 Severity: Area of Concern CVE: CVE-2010-0480 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows MPEG layer 3 codec vulnerable Description Fixes remote code execution vulnerability in MPEG Layer-3 codecs. (CVE 2010-0480) Fix 2000: 977816, XP: 977816 (32-bit), 977816 (64-bit), 2003: 977816 (32-bit), 977816 (64-bit), VISTA: 977816 (32-bit), 977816 (64-bit), 2008: 977816 (32-bit), 977816 (64-bit) Bulletin 10-026 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. 96 Technical Details Service: netbios l3codecx.ax older than 2010-1-19 Windows Media Player plug-in EMBED vulnerability Severity: Area of Concern CVE: CVE-2006-0005 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows Media Player plug-in EMBED vulnerability Description Fix Fixes a buffer overflow which could 911564 allow command execution when a user plays media files through non-Microsoft browsers. (CVE 2006-0005) Bulletin 06-006 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios npdsplay.dll older than 2005-11-29 Windows Media decompression vulnerabilities Severity: Area of Concern CVE: CVE-2010-1556 CVE-2010-1879 CVE-2010-1880 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. 97 The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows Media decompression vulnerabilities Description Fix Fixes multiple vulnerabilities in 10-033 DirectX, Windows Media Format and Encoder, and Asycfilt.dll allowing command execution when invalid compression data in media files is processed. (CVE 2010-1879 CVE 2010-1880) Bulletin 10-033 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios asycfilt.dll older than 2010-3-7 Windows OLE Automation remote code execution vulnerability Severity: Area of Concern CVE: CVE-2007-0065 CVE-2007-2224 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a 98 Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows OLE Automation remote code execution Windows OLE Automation Heap Overrun Description Fixes a vulnerability in the OLE automation which allowed for remote code execution on processing of a crafted file. (CVE 2007-2224) Fixes a heap-based buffer overflow in Object Linking and Embedding (OLE) automation that could allow remote attackers to execute arbitrary code via a crafted request. (CVE 2007-0065) Fix 2000: 921503 XP: 921503 2003: 921503 Bulletin 07-043 2000: 943055 XP: 943055 2003: 943055 Vista: 943055 08-008 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios oleaut32.dll older than 2007-12-4 Windows RPC Marshalling Engine vulnerability Severity: Area of Concern CVE: CVE-2009-0568 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows RPC Marshalling Engine vulnerability Description Fixes an elevation of privilege vulnerability by correcting the way RPC Marshalling Engine updates its internal state. (CVE 2009-0568) 99 Fix 2000: 970238 XP: 970238 2003: 970238 Vista: 970238 Bulletin 09-026 2008: 970238 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios rpcrt4.dll older than 2009-4-21 Windows SMB Client vulnerabilities (MS10-020) Severity: Area of Concern CVE: CVE-2009-3676 CVE-2010-0269 CVE-2010-0270 CVE-2010-0476 CVE-2010-0477 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows SMB Client vulnerabilities Fixes vulnerabilities which could allow remote code execution when a user initiates an SMB connection with a malicious server. (CVE 2009-3676 CVE 2010-0269 CVE 2010-0270 CVE 2010-0476 CVE 2010-0477) 100 Fix Bulletin 2000: 980232 10-020 XP: 980232, 980232 (64-bit) 2003: 980232, 980232 (64-bit), 980232 (Itanium) Vista: 980232, 980232 (64-bit) 2008: 980232, 980232 (64-bit), 980232 (Itanium) Windows 7: 980232, 980232 (64-bit) 2008 R2: 980232 (64-bit), 980232 (Itanium) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios mrxsmb.sys older than 2010-2-22 Windows SMB Remote Code Execution Severity: Area of Concern CVE: CVE-2008-4038 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows SMB Remote Code Execution Description Fixes a vulnerability in Microsoft Server Message Block (SMB) Protocol. The vulnerability could allow remote code execution on a server that is sharing files or folders. An attacker who successfully exploited this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. (CVE 2008-4038) Also fixes other two vulnerabilities. A null pointer dereference in srv.sys allows an attacker to remotely crash the system. A validated attacker can execute code as administrator. (CVE 2006-3942 CVE 2006-4696) 101 Fix 2000: 957095 XP: 957095 2003: 957095 Vista: 957095 2008: 957095 Bulletin 08-063 06-063 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios srv.sys older than 2008-8-27 Windows Services for UNIX setuid privilege elevation Severity: Area of Concern CVE: CVE-2007-3036 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows Services for UNIX 3.0 and 3.5, and Subsystem for UNIX-based Applications setuid privilege elevation Description Fix Fixes a vulnerability in Windows WS UNIX 3.0: Services for UNIX where running 939778 certain setuid binary files could allow WS UNIX 3.5: an attacker to gain elevated 938827 privileges. (CVE 2007-3036) SfUA 2003: 938827 SfUA VISTA: 938827 Bulletin 07-053 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios 102 posix.exe older than 2007-6-30 Windows Shell Handler vulnerability Severity: Area of Concern CVE: CVE-2010-0027 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Fix Windows Shell Handler vulnerability Fixes a remote code execution 2000: 975713 vulnerability in Windows 2000, XP XP: 975713 and Server 2003; if an application (32-bit), 975713 such as a Web browser passes (64-bit) specially crafted data to the 2003: 975713 ShellExecute API function through (32-bit), 975713 the Windows Shell Handler. An (64-bit), 975713 attacker who successfully exploited (Itanium) this vulnerability could take complete control of an affected system. (CVE 2010-0027) Bulletin 10-007 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios shlwapi.dll older than 2009-10-14 Windows VB script vulnerable version, vbscript.dll dated 2001-5-8 Severity: Area of Concern CVE: CVE-2010-0483 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers 103 or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows VB script vulnerable Description Fix Bulletin Fixes remote code execution Apply the 10-022 vulnerability which exists due to the appropriate patch way VB Script interacts with help files in Internet Explorer. (CVE 2010-0483) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios vbscript.dll older than 2010-3-10 Windows WMA Voice codec vulnerability Severity: Area of Concern CVE: CVE-2009-0555 CVE-2009-2525 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding 104 Microsoft Security Bulletins for patch information. Update Name Windows WMA Voice codec vulnerability Description Fixes vulnerabilities in Windows Media Runtime that could allow remote code execution (CVE 2009-0555 CVE 2009-2525) Fix Bulletin 2000, XP and 09-051 2003 (Voice codec): 969878 2000 WMF 9: 954155 2000 WMP 9: 975025 2000, XP and 2003 (Decoder): 969878 XP SP2 WMF 9, 9.5 and 11: 954155 XP (Compression Manager): 975025 2000 WMP 9: 975925 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios msaud32.acm older than 2009-8-25 Windows atl.dll vulnerable (MS09-037) Severity: Area of Concern CVE: CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. 105 Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Multiple Windows ATL vulnerability Fixes multiple vulnerabilities in Windows Active Template Library that could allow an attacker to execute arbitrary code. (CVE 2008-0015 CVE 2008-0020 CVE 2009-0901 CVE 2009-2493 CVE 2009-2494) Fix Bulletin Outlook:973354 09-037 Media 09-055 Player:973540 ATL Component:973 507 DHTML Component:973 869 ActiveX: 973525 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios atl.dll older than 2009-7-15 Windows dhtmled.ocx vulnerable (MS09-037) Severity: Area of Concern CVE: CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Fix 106 Bulletin Multiple Windows ATL vulnerability Fixes multiple vulnerabilities in Windows Active Template Library that could allow an attacker to execute arbitrary code. (CVE 2008-0015 CVE 2008-0020 CVE 2009-0901 CVE 2009-2493 CVE 2009-2494) Outlook:973354 09-037 Media 09-055 Player:973540 ATL Component:973 507 DHTML Component:973 869 ActiveX: 973525 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios dhtmled.ocx older than 2009-7-25 Windows kernel GDI validation vulnerabilities Severity: Area of Concern CVE: CVE-2009-0081 CVE-2009-0082 CVE-2009-0083 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows kernel validation Description Fixes vulnerabilities by validating input passed from user mode through the kernel component of GDI, correcting the way that the kernel validates handles, and changing the way that the Windows kernel handles specially crafted 107 Fix 2000: 958690 XP: 958690 2003: 958690 Vista: 958690 2008: 958690 Bulletin 09-006 08-061 invalid pointers. (CVE 2009-0081 CVE 2009-0082 CVE 2009-0083) Fixes vulnerabilities by correcting window property validation passed during the new window creation process, calls from multiple threads are handled, and validation of parameters passed to the Windows Kernel from user mode. (CVE 2008-2250 CVE 2008-2251 CVE 2008-2252) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios win32k.sys older than 2009-2-7 Windows kernel desktop validation vulnerabilities Severity: Area of Concern CVE: CVE-2009-1123 CVE-2009-1124 CVE-2009-1125 CVE-2009-1126 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows kernel desktop validation Fixes four vulnerabilities by vulnerabilities correcting the methods used in validating a change in kernel object, the input passed from user mode to the kernel and the argument passed to the system call. (CVE 108 Fix 2000: 968537 XP: 968537 2003: 968537 Vista: 968537 2008: 968537 Bulletin 09-025 2009-1123 CVE 2009-1124 CVE 2009-1125 CVE 2009-1126) Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios win32k.sys older than 2009-4-15 Windows kernel embedded font vulnerabilities Severity: Area of Concern CVE: CVE-2009-1127 CVE-2009-2513 CVE-2009-2514 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows kernel embedded font vulnerabilities Description Fixes a remote code execution vulnerability that could allow a remote attacker to execute arbitrary code with the permissions of the user loading a specially crafted Embedded OpenType (EOT) font. (CVE 2009-1127) (CVE 2009-2513) (CVE 2009-2514) 109 Fix 2000: 969947 XP: 969947 (32-bit), 969947 (64-bit) 2003: 969947 (32-bit), 969947 (64-bit), 969947 (Itanium) Vista: 969947 (32-bit), 969947 (64-bit) 2008: 969947 (32-bit), 969947 (64-bit), 969947 (Itanium) Bulletin 09-065 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios win32k.sys older than 2009-8-12 Windows kernel multiple privilege elevation vulnerabilities (MS10-032) Severity: Area of Concern CVE: CVE-2010-0484 CVE-2010-0485 CVE-2010-1255 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows kernel multiple privilege elevation vulnerabilities Description Fixes multiple vulnerabilities which allow authenticated users to elevate privileges on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. ( CVE 2010-0484 CVE 2010-0485 CVE 2010-1255 ) 110 Fix 2000 SP 4 979559 XP SP 2 & SP 3 979559 XP x64 SP 2 979559 Server 2003 SP 2 979559 Server 2003 x64 SP 2 979559 Server 2003 SP2 Itanium 979559 Vista SP 1 & SP 2 979559 Vista x64 SP 1 & SP 2 Bulletin 10-032 979559 Server 2008 32 SP 2 979559 Server 2008 x64 SP 2 979559 Server 2008 Itanium SP 2 979559 Windows 7 32-bit 979559 Windows 7 x64-based 979559 Server 2008 R2 x64 979559 Server 2008 R2 Itanium 979559 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios win32k.sys older than 2010-5-1 Windows kernel property validation vulnerabilities Severity: Area of Concern CVE: CVE-2008-2250 CVE-2008-2251 CVE-2008-2252 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. 111 Update Name Windows kernel validation Description Fixes vulnerabilities by validating input passed from user mode through the kernel component of GDI, correcting the way that the kernel validates handles, and changing the way that the Windows kernel handles specially crafted invalid pointers. (CVE 2009-0081 CVE 2009-0082 CVE 2009-0083) Fixes vulnerabilities by correcting window property validation passed during the new window creation process, calls from multiple threads are handled, and validation of parameters passed to the Windows Kernel from user mode. (CVE 2008-2250 CVE 2008-2251 CVE 2008-2252) Fix 2000: 958690 XP: 958690 2003: 958690 Vista: 958690 2008: 958690 Bulletin 09-006 08-061 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios win32k.sys older than 2008-9-13 Windows kernel user mode callback vulnerability Severity: Area of Concern CVE: CVE-2008-1084 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. 112 Update Name Description Windows kernel user mode callback Fixes a privilege elevation vulnerability vulnerability caused by insufficient validation of input passed from user mode to the kernel. (CVE 2008-1084) Fix 2000: 941693 XP: 941693 2003: 941693 Vista: 941693 2008: 941693 Bulletin 08-025 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios win32k.sys older than 2008-4-8 Windows kernel vulnerable (MS10-021) version, ntoskrnl.exe dated 2001-5-8 Severity: Area of Concern CVE: CVE-2010-0234 CVE-2010-0235 CVE-2010-0236 CVE-2010-0237 CVE-2010-0238 CVE-2010-0481 CVE-2010-0482 CVE-2010-0810 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows kernel vulnerable version Fixes multiple vulnerabilities which allow authenticated users to elevate privileges on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. ( CVE 2010-0232 CVE 2010-0233 CVE 2010-0234 CVE 2010-0235 113 Fix 2000 SP 4 979683 XP SP 2 & SP 3 979683 XP x64 SP 2 979683 Server 2003 SP 2 979683 Bulletin 10-021 CVE 2010-0236 CVE 2010-0237 CVE 2010-0238 CVE 2010-0481 CVE 2010-0481 CVE 2010-0482 CVE 2010-0810 ) Server 2003 x64 SP 2 979683 Server 2003 SP2 Itanium 979683 Vista 979683 Vista x64 979683 Server 2008 32 SP 2 979683 Server 2008 x64 SP 2 979683 Server 2008 Itanium SP 2 979683 Windows 7 32-bit 979683 Windows 7 x64-based 979683 Server 2008 R2 x64 979683 Server 2008 R2 Itanium 979683 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios ntoskrnl.exe older than 2010-2-14 Windows kernel vulnerable version, ntoskrnl.exe dated 2001-5-8 Severity: Area of Concern CVE: CVE-2009-2515 CVE-2009-2516 CVE-2009-2517 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows 114 Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Windows kernel vulnerable version Fixes multiple vulnerabilities which allow authenticated users to elevate privileges on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7. (CVE 2009-2515 CVE 2009-2516 CVE 2009-2517 CVE 2010-0232 CVE 2010-0233 ) Fix 2000: 977165 XP: 977165 2003: 977165 Vista: 977165 2008: 977165 Windows 7: 977165 Bulletin 09-058 10-015 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios ntoskrnl.exe older than 2009-8-1 Windows media file processing vulnerable (MS09-038) Severity: Area of Concern CVE: CVE-2009-1545 CVE-2009-1546 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. 115 Update Name Windows media file processing vulnerable Description Fixes a vulnerability that allows remote code execution due to improper handling of specially crafted AVI format files. (CVE 2009-1545 CVE 2009-1546) Fix 2000: 971557 XP: 971557 (32-bit), 971557 (64 bit) 2003: 971557 (32-bit), 971557 (64 bit), 971557 (Itanium) Vista: 971557 (32-bit), 971557 (64-bit) 2008: 971557 (32-bit), 971557 (64-bit), 971557 (Itanium) Bulletin 09-038 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios avifil32.dll older than 2009-7-12 Possible buffer overflow in Active Directory Severity: Potential Problem CVE: CVE-2003-0507 CVE-2010-1556 Impact A remote attacker could crash the Active Directory service and force a reboot of the server. It may also be possible to execute commands on the server. Resolution Install the patches referenced in Microsoft Security Bulletin 09-066. Where can I read more about this? For more information, see Microsoft Security Bulletins 07-039, 08-003, 08-035, 08-060, 09-018, and 09-066. The Windows 2000 Active directory denial of service vulnerability was reported in Microsoft Knowledge Base Article 319709 and Secunia Advisory SA9171. Technical Details Service: ldap AV Information: AntiVirus software not found (AVG Symantec McAfee TrendMicro) 116 Severity: Potential Problem CVE: CVE-2010-1556 Impact The system may be susceptible to viruses, worms, and other types of malware. Resolution Install and enable anti-virus software. Turn on automatic updates and periodic scans. Enable logging. If a anti-virus server or manager is present, make sure that all clients can communicate with it so that the client is as up to date as possible and can send crucial information to the master installation. If more information is needed about the anti-virus software running on the network and a server or manager is present, it is a good place to look for information about the anti-virus clients. If more than one instance of anti-virus software is installed on a system, remove all but one. Multiple anti-virus programs may interfere with each other and cause the system to run poorly. Where can I read more about this? For additional information about viruses and anti-virus products, see Virus Bulletin. Technical Details Service: netbios SAINT currently checks for AVG, Symantec, TrendMicro, and McAfee AV software; none were detected possible vulnerability in Apple Filing Protocol 2.0 Severity: Potential Problem CVE: CVE-2004-0430 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands with root privileges, thereby taking complete control of the vulnerable computer. Resolution Install Mac OS security update 2004-05-03, or deselect the Personal File Sharing box in the Sharing Preferences. Where can I read more about this? This vulnerability was reported in an @stake security advisory. Technical Details Service: afp Cookie Injection vulnerabilities in IE Severity: Potential Problem CVE: CVE-2004-0866 CVE-2004-0869 CVE-2010-1556 117 Impact A remote attacker could take over a user's session on a web application. Resolution As this is a particularly difficult issue to fix in web browsers, it is unknown when vendor fixes will be available. Until a fix is available for your browser, extra caution should be used when browsing the Internet. Avoid visiting untrusted sites or clicking on links in e-mail messages. Where can I read more about this? For more information on session fixation, see Session Fixation Vulnerability in Web-Based Applications by ACROS Security. More information on the cookie injection vulnerabilities is available from Bugtraq. Technical Details Service: netbios urlmon.dll older than 2004-9-30 DNS server allows recursive queries Severity: Potential Problem CVE: CVE-2010-1556 Impact Allowing recursive queries may make the DNS server more susceptible to denial-of-service and cache poisoning attacks. Resolution Disable recursive queries on the DNS server. For Windows DNS servers, this can be done by checking Disable Recursion from Start -> Control Panel -> Administrative Tools -> DNS -> Properties -> Advanced -> Server Options. For BIND DNS servers, add the following line to the options section of the named.conf file: recursion no; Where can I read more about this? For more information about the risks of recursive queries, see the Go Daddy Help Center. Technical Details Service: domain Recursion Available flag = 1 guessable read community string Severity: Potential Problem CVE: CVE-1999-0516 CVE-1999-0517 118 CVE-2010-1556 Impact A read community string for one of your systems can be easily guessed. The full impact will depend largely on exactly what type of device this system is. In general, anyone guessing this read community string can obtain an awful lot of information regarding the device in question, and possibly about the network(s) it is on. You need to decide whether this is a security concern or not. The Problem/Resolution If you were notified of this vulnerability, a read or write community string was able to be guessed for a system you scanned. This is currently done with a simple, brute force algorithm, repeatedly trying a few guesses. In order to guess write community strings, it actually attempts to change the sysLocation oid (and then changes it back if succeeded). If it guessed your community string, you should consider changing it. Some SNMP clients will allow you to restrict which hosts can send some or all write SNMP commands from, and possibly which hosts can get information as well. It is recommended that you configure such if available. 08/09/02 Previously released versions of Avaya P330, P130 and M770-ATM Cajun family of products contain an undocumented hard-coded community read/write string that can be used to reset the switch. Hardware versions that have been tested and confirmed affected include P330T software version 3.8.2 and 3.9.1, P333R software version 3.8.1 and 3.9.1, P130, M770-ATM and M770 Supervisor (M-SPX, M-SPS). If an Avaya user is unable to upgrade to a fixed version, one can mitigate the bug by restricting SNMP access using the 'set allowed managers' command, which appeared in recent Cajun firmware. Other related CVE entries: CVE 1999-0186 Solaris CVE 1999-0254 HP OpenView CVE 2001-0380 Crosscom/Olicom XLT-F CVE 2001-0514 Atmel 802.11b VNET-B Access Point CVE 2001-0711 Cisco IOS (ILMI) CVE 2002-0540 Nortel CVX 1800 CVE 2002-1448 Avaya P330, P130, and M-770 ATM Cajun CVE 2002-1555 Cisco ONS15454 and ONS15327 CVE 2003-0137 Nokia SGSN CVE 2004-0616 BT Voyager 2000 CVE 2005-3803 Cisco IP Phone 7920 CVE 2007-2036 Cisco Wireless LAN Controller Where can I read more about this? For more information on SNMP, see Cisco's SNMP Reference. The Avaya vulnerabilities are discussed in Bugtraq and the Avaya advisory. Technical Details Service: snmp SNMP read access using community string public (sysDescr.0: Hardware: x86 Family 15 Model 4 Stepping 1 AT/AT COMPATIBLE - Software: Windows 2000 Version 5.0 (Build 2195 Multiprocessor Free)) ICMP timestamp requests enabled 119 Severity: Potential Problem CVE: CVE-1999-0524 CVE-2010-1556 Impact A remote attacker could obtain sensitive information about the network. Resolution Configure the system or firewall not to allow ICMP timestamp requests (message type 13) or ICMP netmask requests (message type 17). Instructions for doing this on specific platforms are as follows: Windows: Block these message types using the Windows firewall as described in Microsoft TechNet. Linux: Use ipchains or iptables to filter ICMP netmask requests using the command: ipchains -A input -p icmp --icmp-type address-mask-request -j DROP Use ipchains or iptables to filter ICMP timestamp requests using the commands: ipchains -A input -p icmp --icmp-type timestamp-request -j DROP ipchains -A output -p icmp --icmp-type timestamp-reply -j DROP To ensure that this change persists after the system reboots, put the above command into the system's boot-up script (typically /etc/rc.local). Cisco: Block ICMP message types 13 and 17 as follows: deny icmp any any 13 deny icmp any any 17 Where can I read more about this? For more information about ICMP, see RFC792. Technical Details Service: icmp timestamp=f8752d03 Internet Explorer Modal Dialog zone bypass Severity: Potential Problem CVE: CVE-2003-1048 CVE-2004-0549 CVE-2004-0566 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution 120 To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. More information on the object tag, modal dialog, and information disclosure vulnerabilities may be found in Bugtraq ID 17658, Bugtraq ID 17713, and Bugtraq ID 17717. The ADODB.Stream object vulnerability was reported in US-CERT alert 04-184A. 121 Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. The three vulnerabilities which are exploited by the Download.Ject trojan were reported in Bugtraq ID 10472, Bugtraq ID 10473, and Bugtraq ID 10514. Technical Details Service: netbios mshtml.dll older than 2004-7-3 Internet Explorer Travel Log vulnerability Severity: Potential Problem CVE: CVE-2003-1025 CVE-2003-1026 CVE-2003-1027 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) 122 To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios urlmon.dll older than 2003-12-23 Internet Explorer cross-domain vulnerabilities Severity: Potential Problem CVE: CVE-2003-0814 CVE-2003-0815 CVE-2003-0816 CVE-2003-0817 CVE-2003-0823 CVE-2010-1556 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, 123 Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios urlmon.dll older than 2003-10-1 Internet Explorer patch needed Severity: Potential Problem CVE: CVE-2003-0113 CVE-2003-0114 CVE-2003-0115 CVE-2003-0116 CVE-2003-0309 CVE-2003-0344 CVE-2003-0530 CVE-2003-0531 CVE-2003-0532 CVE-2003-0701 CVE-2003-0809 CVE-2003-0838 CVE-2003-1025 CVE-2003-1026 CVE-2003-1027 CVE-2003-1326 CVE-2003-1328 CVE-2010-1556 124 Impact A remote attacker could execute arbitrary commands on a client system when the client browses to a malicious web site hosted by the attacker. Resolution To use Internet Explorer securely, take the following steps: (The vulnerabilities in IE 8, Beta 1 have not yet been patched) (The response splitting and smuggling related to setRequestHeader() has not yet been patched) (The file focus stealing vulnerability has not yet been patched) (The stack overflow vulnerability has not yet been patched.) (The document.open spoofing vulnerability has not yet been patched.) Install the appropriate cumulative patch for your version of Internet Explorer as outlined in Microsoft Security Bulletin 07-009, Microsoft Security Bulletin 07-061, Microsoft Security Bulletin 08-022, Microsoft Security Bulletin 08-032, Microsoft Security Bulletin 08-052, Microsoft Security Bulletin 09-045, Microsoft Security Bulletin 10-002, and Microsoft Security Bulletin 10-035. Fix the Security Zone Bypass vulnerability (CVE-2010-0255) as described in Microsoft Security Advisory (980088) Prevent WPAD proxy server interception as described in Microsoft Knowledge Base Article 934864 Disable the Javaprxy.dll object Disable the ADODB.Stream object Disable the Shell.Explorer object Instructions for disabling the ADODB.Stream object can be found in Microsoft Knowledge Base Article 870669. To disable the Shell.Explorer object, set the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{8856F961-340A-11D0-A96B-00C04FD705A2} Compatibility Flags = 400 (type dword, radix hex) To disable the Javaprxy.dll object, install the update referenced in Microsoft Security Bulletin 05-037. Where can I read more about this? For more information on all Internet Explorer security fixes, see the Internet Explorer Critical Updates page. For more information on specific vulnerabilities, see Microsoft Security Bulletins 03-004, 03-015, 03-020, 03-032, 03-040, 03-048, 04-004, 04-025, 04-038, 04-040, 05-014, 05-020, 05-025, 05-037, 05-038, 05-052, 05-054, 06-004, 06-013, 06-021, 06-023, 06-042, 06-055, 06-067, 06-072, 07-004, 07-009, 07-016, 07-027, 07-033, 07-045, 07-050, 07-057, 07-061, 07-069, 08-010, 08-022, 08-023, 08-024, 08-031, 08-032, 08-045, 08-052, 08-058, 08-073, 08-078, 09-002, 09-014, 09-019, 09-034, 09-045, 09-054, 09-072, 10-002, 10-018, and 10-035. Also see CERT advisories CA-2003-22, TA04-033A, TA04-163A, TA04-212A, TA04-293A, TA04-315A, TA04-336A, TA05-165A, TA05-221A, and US-CERT Vulnerability Note VU#378604. 125 The IE 8, Beta 1 vulnerabilities were reported in Bugtraq ID 28580 and Bugtraq ID 28581. Unfixed variants of the drag and drop vulnerability and the Shell.Explorer object were discussed in NTBugtraq and Full Disclosure. Technical Details Service: netbios urlmon.dll older than 2003-9-9 Possible vulnerability in LDAP over SSL Severity: Potential Problem CVE: CVE-2001-0502 CVE-2010-1556 Impact A remote attacker could take control of a domain administrator's account, thereby gaining administrative privileges. Resolution Apply the patch referenced in Microsoft Security Bulletin 01-036. Where can I read more about this? For more information, see Microsoft Security Bulletin 01-036. Technical Details Service: ssl-ldap Is your LDAP secure? Severity: Potential Problem CVE: CVE-2002-1378 CVE-2002-1379 CVE-2010-1556 Impact If an application uses a vulnerable implementation of LDAP, an attacker could cause a denial of service or execute arbitrary commands. Resolution See CERT Advisory 2001-18 for information on obtaining a patch for your application. OpenLDAP 2.x users may also need to fix a separate set of vulnerabilities which were reported in SuSE Security Announcement 2002:047. Consult your vendor for a fix. If a patch is not available, then ports 389 and 636, TCP and UDP, should be blocked at the network perimeter until a patch can be applied. Where can I read more about this? For more information, see CERT Advisory 2001-18 and SuSE Security Announcement 2002:047. 126 Technical Details Service: ldap Authentication flaw in Microsoft mail server Severity: Potential Problem CVE: CVE-2001-0504 CVE-2002-0054 CVE-2010-1556 Impact A remote attacker could crash the mail service or gain user-level privileges to the service, including the ability to use the server as a mail relay. Resolution To fix the MX Record Denial of Service and Memory Allocation vulnerabilities, apply the patch referenced in Microsoft Security Bulletin 10-024. To fix the vulnerabilities in the Windows Server 2003 mail service, apply the patch referenced in Microsoft Security Bulletin 04-035. To fix the Windows 2000 mail server vulnerabilities, apply Windows 2000 service pack 4. If service pack 4 cannot be applied immediately, apply the patches referenced in Microsoft Security Bulletins 01-037, 02-011, and 02-012, and Microsoft Knowledge Base Article 330716. Note that bulletins 02-011 and 02-012 reference the same patch, which fixes two problems. Where can I read more about this? See Microsoft Security Bulletins 01-037, 02-011, 02-012, 04-035, and 10-024, and Microsoft Knowledge Base Article 330716. The predictable DNS query ID and missing validation of DNS responses were posted to Full Disclosure. Technical Details Service: smtp Received: 220 saintlab02.saintlab.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Tue, 13 Jul 2010 10:48:01 -0400 Microsoft SQL Server vulnerable version: 8.00.194 Severity: Potential Problem CVE: CVE-1999-0652 CVE-1999-0999 CVE-2000-0199 CVE-2000-0202 CVE-2000-0402 CVE-2000-0485 CVE-2000-0603 CVE-2000-1081 CVE-2000-1082 CVE-2000-1083 CVE-2000-1084 CVE-2000-1085 CVE-2000-1086 CVE-2000-1087 CVE-2000-1088 CVE-2001-0344 CVE-2001-0542 CVE-2001-0879 CVE-2002-0056 CVE-2002-0154 CVE-2002-0186 CVE-2002-0187 CVE-2002-0624 CVE-2002-0641 127 CVE-2002-0642 CVE-2002-0644 CVE-2002-0645 CVE-2002-0695 CVE-2002-0721 CVE-2002-0859 CVE-2002-0982 CVE-2002-1123 CVE-2002-1137 CVE-2002-1138 CVE-2002-1145 CVE-2003-0230 CVE-2003-0231 CVE-2003-0232 CVE-2010-1556 Impact Vulnerabilities in Microsoft SQL Server could allow a remote attacker to execute arbitrary code or crash the server. Furthermore, the server could be susceptible to the Slammer worm, which could cause a denial of service or infection of other servers. Resolution Install the appropriate cumulative patch for your version of Microsoft SQL Server as outlined in Microsoft Security Bulletin 09-004, and Microsoft Security Bulletin 08-040. For SQL Server 7.0, install the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031. For SQL Server 2000 or MSDE 2000, install SQL Server 2000 Service Pack 3 or 3a or higher and the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031, and install Microsoft Jet 4.0 Service Pack 6. To correct the MDAC buffer overflow vulnerability, database administrators using SQL Server 7.0 or 2000 should apply the MDAC patch referenced in Microsoft Security Bulletin 02-040. If using SQL Server user accounts instead of Windows domain user accounts, Microsoft recommends using the "always prompt for login name and password" option so that the weakly encrypted administrative password will not be stored on the hard drive. Where can I read more about this? For more information, see CERT Advisory 2002-22, which summarizes a number of Microsoft SQL Server vulnerabilities. For details on specific vulnerabilities, see Microsoft Security Bulletins 09-004, 08-052, 08-040, 03-031, 02-061, 02-056, 02-043, 02-040, 02-039, 02-038, 02-034, 02-030, 02-020, 02-007, 01-060, 01-032, 00-092, 00-048, 00-041, 00-035, 00-014, 99-059, CIAC Bulletins M-094 and K-026, and NGSSoftware Advisories #NISR25072002 and #NISR22002002A. Technical Details Service: 1433:TCP Received: SAINTLAB02;InstanceName;MSSQLSERVER;IsClustered;No;Version;8.00.194;tcp;1433;np;\\SAINTLAB02 pipe\sql\query;;uage setting to us_english. Possible vulnerability in MS SQL Server Resolution Service Severity: Potential Problem CVE: CVE-2002-0649 CVE-2002-0650 CVE-2002-0729 CVE-2010-1556 128 Impact Vulnerabilities in Microsoft SQL Server could allow a remote attacker to execute arbitrary code or crash the server. Furthermore, the server could be susceptible to the Slammer worm, which could cause a denial of service or infection of other servers. Resolution Install the appropriate cumulative patch for your version of Microsoft SQL Server as outlined in Microsoft Security Bulletin 09-004, and Microsoft Security Bulletin 08-040. For SQL Server 7.0, install the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031. For SQL Server 2000 or MSDE 2000, install SQL Server 2000 Service Pack 3 or 3a or higher and the SQL Server cumulative security patch referenced in Microsoft Security Bulletin 03-031, and install Microsoft Jet 4.0 Service Pack 6. To correct the SQL Server 2000 Resolution Service vulnerabilities, download the SQL Server 2000 Service Pack 2 Security Patch referenced in Microsoft Security Bulletin 02-039. You may also want to block UDP port 1434 at the firewall, if feasible (see MS02-039 for details.) Where can I read more about this? For more information, see CERT Advisory 2002-22, which summarizes a number of Microsoft SQL Server vulnerabilities. For details on specific vulnerabilities, see Microsoft Security Bulletins 09-004, 08-052, 08-040, 03-031, 02-061, 02-056, 02-043, 02-040, 02-039, 02-038, 02-034, 02-030, 02-020, 02-007, 01-060, 01-032, 00-092, 00-048, 00-041, 00-035, 00-014, 99-059, CIAC Bulletins M-094 and K-026, and NGSSoftware Advisories #NISR25072002 and #NISR22002002A. For more information on the worm which exploits buffer overflows in the SQL Server Resolution Service, see CERT Advisory 2003-04. Technical Details Service: 1434:UDP Possible vulnerability in Microsoft Terminal Server Severity: Potential Problem CVE: CVE-2000-1149 CVE-2001-0663 CVE-2001-0716 CVE-2002-0863 CVE-2002-0864 CVE-2005-1218 CVE-2010-1556 Impact Vulnerabilities in Microsoft Windows Terminal Server and Remote Desktop could allow a remote attacker to execute arbitrary code or crash the server, or could allow an attacker who is able to capture network traffic to decrypt sessions. Resolution There is no fix available to protect against the man-in-the-middle attack. Therefore, Terminal Services should 129 only be used on trusted networks. For Windows NT 4.0 Terminal Server Edition, apply the patches referenced in Microsoft Security Bulletins 00-087 and 01-052. There is no fix available for the denial of service vulnerability on Windows NT. For Windows 2000, apply the patches referenced in Microsoft Security Bulletins 01-052, 02-051, and 05-041. For Windows XP, apply the patches referenced in Microsoft Security Bulletins 02-051 and 05-041. For Windows Server 2003, apply the patch referenced in Microsoft Security Bulletin 05-041. For Citrix MetaFrame, download a hotfix from the Citrix Solution Knowledge Base, under Hotfixes. It is also a good idea to filter TCP port 3389 at the firewall or router, such that only connections from legitimate users will be accepted. Where can I read more about this? For more information, see Microsoft Security Bulletins 00-087, 01-052, 02-051, and 05-041, and Bugtraq. For more information on the Citrix MetaFrame vulnerability, see the Bugtraq ID 3440. Technical Details Service: 3389:TCP port 3389/tcp open and KB899591 not applied or could not be checked NetBIOS share enumeration using null session Severity: Potential Problem CVE: CVE-2010-1556 Impact A remote attacker could gain a list of shared resources or user names on the system. Resolution Mitigating this vulnerability will require editing the registry. The regedt32 command can be used for this purpose. Keep in mind that erroneous changes to the registry could leave the system in an unstable and unbootable state, so use due caution and have a working system backup and repair disk before editing the registry. The privileges of null sessions can be limited by changing the following registry value: Hive: HKEY_LOCAL_MACHINE Key: SYSTEM/CurrentControlSet/Control/LSA Value: RestrictAnonymous Type: REG_DWORD Setting this value to 1 will partially limit the amount of information which is available through a null session, but will still allow access to some sensitive information, including the user account list. On Windows 2000 and XP, this value can also be set to 2 for greater protection. However, a value of 2 could also disable some critical Windows networking functions, so this setting is recommended only for Internet servers, and should be thoroughly tested. 130 Windows XP and later also support a registry value called RestrictAnonymousSAM, which, if set to 1, prevents enumeration of accounts using a null session. In addition to the above changes, it is also advisable to block access to the NetBIOS ports at the firewall or gateway router. There is usually no reason why a user outside the local network would have a legitimate need for NetBIOS access. NetBIOS runs on ports 135, 137, 138, and 139 (TCP and UDP). Where can I read more about this? For more information about using the RestrictAnonymous registry value to limit the privileges of null sessions, see Microsoft Knowledge Base articles Q143474 and Q246261. Technical Details Service: netbios-ssn Shares: E$; NETLOGON; ADMIN$; SYSVOL; C$ Outlook Express MHTML vulnerability Severity: Potential Problem CVE: CVE-2004-0380 CVE-2010-1556 Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. Where can I read more about this? For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, and 08-015, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. Technical Details Service: netbios Inetcomm.dll older than 2004-3-1 Outlook Express NNTP buffer overflow Severity: Potential Problem CVE: CVE-2005-1213 CVE-2010-1556 Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. 131 Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. Where can I read more about this? For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, and 08-015, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. Technical Details Service: netbios msoe.dll older than 2005-4-27 Outlook Express patch needed Severity: Potential Problem CVE: CVE-2002-1179 CVE-2010-1556 Impact There are several vulnerabilities in e-mail clients, the most severe of which could allow a remote attacker to execute arbitrary commands by sending a specially crafted e-mail message. Resolution Install the patches referenced in Microsoft Security Bulletin 01-038 and 08-015 for Outlook. Also, for Outlook 2002, install the patches referenced in 02-067, 03-003, and 04-009, or Office XP service pack 3. For Outlook Express: Install the patches referenced in Microsoft Security Bulletin 07-034 and 07-056. Windows XP users should also install patch 900930 for Outlook Express. Where can I read more about this? For more information, see Microsoft Security Bulletins 01-038, 02-058, 02-067, 03-003, 04-009, 04-013, 05-030, 06-003, 06-016, 06-043, 06-076, 07-003, 07-034, 07-056, and 08-015, US-CERT Alert TA04-070A, and Microsoft Knowledge Base Article 900930. Technical Details Service: netbios msoe.dll older than 2002-8-29 chargen could be used in UDP bomb Severity: Potential Problem CVE: CVE-1999-0103 CVE-2010-1556 Impact 132 Your machine may be vulnerable to certain types of Denial of Service attacks (Fraggle, Smurf, Papasmurf, or UDP flood). These DoS attacks affect the entire network and may slow network activity to a crawl. Furthermore, the network can be used as an intermediary to launch attacks on other networks. Resolutions The key to protecting against, and suppressing these types of attacks, is to ensure that your network will not be used as an intermediary. This may be done by configuring routers to not allow IP directed-broadcast transmissions (on Cisco routers, use the "no ip directed-broadcast" interface command). All routers which provide routing to large multi-access broadcast networks, in other words LANs with more than 5 to 10 devices, should be configured in this way. This resolution is indirect, but is, at this point, the surest method for eliminating these types of attacks. Unfortunately, there is no sure method for protecting against being the ultimate target for Smurf type attacks. For the Smurf attack, the surest and safest fix is to configure routers to turn away all incoming ICMP packets. Unfortunately, this will render several ICMP dependent services, such as ping and traceroute, unusable. Other router configuration methods do exist, and you may read about them in PSI's Filter Configuration page. Other methods, such as ICMP filtering and dropping excess packets at network border routers, are not foolproof but may help alleviate the symptoms of Smurf type attacks. These methods are described in InterNIC rfc2267. If you suspect that you have been the victim of a Smurf attack, you may want to download the Smurf Logger, which will allow you to log future Smurf attacks (and other information, such as the broadcast address being used as the intermediary). As with the Smurf attack, the Fraggle attack is particularly hard to defend against. Some suggestions include blocking broadcast UDP at the router, and perhaps blocking UDP at all terminal servers as well (to prevent malicious network users from flooding out the network). Read the Smurf information above for more information on router configuration tips and border router packet filtering techniques that may prove useful in defending against these types of attacks. Where can I read more about this? Visit Packet Storm to read about the Fraggle and Papasmurf Denial of Service attacks. You can read more about the Smurf attack at Packet Storm's Smurf page. Another good source of information is Craig A. Huegen's Smurf Whitepaper. Be sure to also to read the Smurf information in CERT Advisory 98.01. For more information on the UDP Flood attack, see CERT Advisory 96.01. Technical Details Service: chargen SMTP may be a mail relay Severity: Potential Problem CVE: CVE-1999-0512 CVE-2010-1556 Impact An e-mail spammer, or other unauthorized user, may be able to use the system to relay mail. Resolution 133 UNIX mail servers should be upgraded to Sendmail 8.9 or higher, which does not allow relaying by default. For non-UNIX mail servers, contact your vendor for fix information. Where Can I Read More About this? The MAPS Transport Security Initiative page is a good source of information on mail relaying. Also see sendmail.org for information on the anti-relaying features in Sendmail 8.9. Users of Sendmail 8.8 who do not wish to upgrade can refer to sendmail.org for information on preventing relaying in Sendmail 8.8. Technical Details Service: smtp MAIL FROM: <[email protected]> RCPT TO: <"saint%mail-abuse.org"> SNMP is enabled and may be vulnerable Severity: Potential Problem CVE: CVE-1999-0615 CVE-2002-0012 CVE-2002-0013 CVE-2002-0053 CVE-2002-0796 CVE-2002-0797 CVE-2010-1556 Impact If a vulnerable implementation of SNMP is running, a remote attacker could crash the device, cause the device to become unstable, or gain unauthorized access. Resolution For the HMAC length 1 security bypass vulnerability, update to NET-SNMP 5.4.1.1, 5.3.2.1, 5.2.4.1, 5.1.4.1, 5.0.11.1, or UCD-snmp 4.2.7.1 or get updates for other products from your vendor. There are a number of measures which can be taken to reduce the risk of this vulnerability being exploited. Apply a patch from your vendor if one is available. (IRIX users should also refer to SGI Security Advisory 20020201-01-P, and Sun users should also refer to Sun Security Bulletin 219 for patch information.) Change all community strings to non-default strings which are difficult to guess. Block access to UDP ports 161 and 162 at the network perimeter. Disable the SNMP service on machines where it can be disabled and is not needed. There are a number of additional precautions which should also be taken wherever possible: Filter SNMP traffic from unauthorized internal hosts Segregate SNMP traffic onto a separate management network Block incoming and outgoing traffic (ingress and egress filtering) on ports 161, 162, 199, 391, 705, and 1993, both TCP and UDP Block incoming traffic destined for broadcast addresses and internal loopback addresses Disable stack execution For more information on these precautions, see CERT Advisory 2002-03. Where can I read more about this? The HMAC length 1 security bypass vulnerability was reported in Secunia Advisory SA30574 and Vulnerability Note VU#878044. 134 The initial vulnerabilities were discovered by the Oulu University Secure Programming Group using the PROTOS Test Suite. For more information, see CERT Advisory 2002-03, the CERT SNMP FAQ, and Microsoft Security Bulletin 02-006. For more information on the Sun mibiisa vulnerability, see Sun Security Bulletin 219. Technical Details Service: snmp non-administrative users can act as part of the operating system Severity: Potential Problem CVE: CVE-1999-0534 CVE-2010-1556 Impact Normal users could take actions which should be limited to administrators. These privileges could be used to facilitate attacks or to make system resources unavailable to other users. Resolution Edit the user rights assignment, which is found in the Local Security Policy under Administrative Tools on most systems. Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? See Microsoft's documentation on User Rights Assignment. Technical Details Service: netbios-ssn SeTcbPrivilege non-administrative users can bypass traverse checking Severity: Potential Problem CVE: CVE-1999-0534 CVE-2010-1556 Impact Normal users could take actions which should be limited to administrators. These privileges could be used to facilitate attacks or to make system resources unavailable to other users. Resolution Edit the user rights assignment, which is found in the Local Security Policy under Administrative Tools on most systems. Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? 135 See Microsoft's documentation on User Rights Assignment. Technical Details Service: netbios-ssn SeChangeNotifyPrivilege non-administrative users can replace a process level token Severity: Potential Problem CVE: CVE-1999-0534 CVE-2010-1556 Impact Normal users could take actions which should be limited to administrators. These privileges could be used to facilitate attacks or to make system resources unavailable to other users. Resolution Edit the user rights assignment, which is found in the Local Security Policy under Administrative Tools on most systems. Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? See Microsoft's documentation on User Rights Assignment. Technical Details Service: netbios-ssn SeAssignPrimaryTokenPrivilege auditing is disabled Severity: Potential Problem CVE: CVE-1999-0575 CVE-2010-1556 Impact Intrusion attempts or other unauthorized activities could go unnoticed. Resolution Edit the auditing policy, which is found in the Local Security Policy under Administrative Tools on most systems. Note that if there is an Effective Setting in the local security policy, it is this setting which is used. This setting can only be changed on the domain controller. Where can I read more about this? See Microsoft's guide to setting up auditing and developing an auditing policy. Technical Details 136 Service: netbios-ssn Windows DNS lack of entropy spoofing attack Severity: Potential Problem CVE: CVE-2007-3898 CVE-2010-1556 Impact The Windows DNS Server has a vulnerability that allows for remote code execution. Resolution Apply the patch referenced in Microsoft Security Bulletin 09-008. For the management interface buffer overflow, remote management over RPC can be disabled by setting the value of RpcProtocol in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters to 4. Setting this value to 0 will disable all DNS RPC functionality and will protect against both local and remote attempts to exploit the vulnerability. Where can I read more about this? For more information on specific vulnerabilities, see Microsoft Security Bulletins 07-029, 07-062, and 09-008. The DNS server RPC management interface buffer overflow was reported in US-CERT Vulnerability Note VU#555920 and Secunia Advisory SA24871. Technical Details Service: netbios dns.exe older than 2007-10-14 but the Windows DNS Service is not turned on Collaboration Data Objects vulnerability Severity: Potential Problem CVE: CVE-2005-1987 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Description Fix 137 Bulletin Collaboration Data Object vulnerability Fixes a vulnerability in Collaboration Data Objects which could allow an attacker to perform remote code execution. (CVE 2005-1987) 2000: 901017 05-048 XP: 901017 2003: 901017 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios cdosys.dll older than 2005-9-29 FTP Client vulnerability Severity: Potential Problem CVE: CVE-2005-2126 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name FTP Client vulnerability Description Fixes a vulnerability in Windows FTP Client that could allow tampering in File Transfer location. (CVE 2005-2126) Fix 2000: 905495 XP: 905495 2003: 905495 Bulletin 05-044 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios msieftp.dll older than 2005-8-4 138 Jet Database Engine buffer overflow Severity: Potential Problem CVE: CVE-2004-0197 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Jet Database Engine buffer overflow Description Fixes a vulnerability which could allow an attacker to take control of a computer by sending a specially crafted database query to an application using Jet. (CVE 2004-0197) Fix Bulletin NT: 837001 04-014 2000: 837001 or TA04-104A SP4 Update Rollup 1 XP: 837001 or SP2 2003: 837001 or SP1 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Msjet40.dll older than 2004-2-28 Jet Database Engine input validation problems Severity: Potential Problem CVE: CVE-2005-0944 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions 139 One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Jet Database Engine input validation Description Fixes vulnerabilities which could allow command execution by a malformed database file. (CVE 2005-0944) Fix 2000: 950749 XP: 950749 2003 SP1: 950749 Bulletin Full Disclosure, 08-028, US-CERT Vulnerability Note VU#936529 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios Msjet40.dll older than 2005-3-30 Microsoft Agent spoofing vulnerability Severity: Potential Problem CVE: CVE-2005-1214 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Microsoft Agent spoofing Description Prevents spoofing of trusted 140 Fix 2000: 890046 Bulletin 05-032 vulnerability Internet content using a Microsoft XP: 890046 Agent character which disguises 2003: 890046 or security prompts. (CVE 2005-1214) SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios agentdpv.dll older than 2005-5-17 Network Connection Manager vulnerability Severity: Potential Problem CVE: CVE-2005-2307 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Network Connection Manager Hotfix Description Fixes a vulnerability in the Network Connection Manager which could allow a local attacker to gain Local System privileges. (CVE 2002-0720) Network Connection Manager vulnerability Fixes a vulnerability in Network Connection Manager that could allow Denial of Service. (CVE 2005-2307) Fix Bulletin NT: Not 02-042 Affected 2000: Q326886 or SP4 XP: Not Affected 2000: 905414 05-045 XP: 905414 2003: 905414 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. 141 Technical Details Service: netbios netman.dll older than 2005-8-14 Windows 2000 VM ByteCode Verifier vulnerability Severity: Potential Problem CVE: CVE-2003-0111 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name VM ByteCode Verifier Hotfix Description Fixes the ByteCode Verifier to check for illegal commands when loading Java applets, thus preventing attacks from remote web pages and e-mail messages. (CVE 2003-0111) Fix Bulletin NT: 816093 03-011 2000: 816093 or SP4 XP: 816093 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios msjava.dll older than 2003-3-16 Windows COM+ command execution vulnerability Severity: Potential Problem CVE: CVE-2005-1978 CVE-2005-1979 CVE-2005-1980 CVE-2005-2119 CVE-2010-1556 Impact 142 The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows COM+ command execution vulnerability Description Fixes vulnerabilities which could allow remote command execution on Windows 2000 and XP SP1, or privilege elevation on Windows XP SP2 and 2003. (CVE 2005-1978 CVE 2005-1979 CVE 2005-1980 CVE 2005-2119) Fix Bulletin 2000: 902400 05-051 XP: 902400 2003: 902400 or SP2 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: 3372:TCP 3372/TCP open and host type is NT, 2000, XP SP0-1, or 2003 SP0 Windows HyperTerminal buffer overflow Severity: Potential Problem CVE: CVE-2004-0568 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. 143 Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows HyperTerminal buffer overflow Description Fixes a vulnerability which could allow code execution when a user opens a malicious .ht file or possibly a Telnet URL. (CVE 2004-0568) Fix Bulletin NT: 873339 04-043 2000: 873339 or SP4 Update Rollup 1 XP: 873339 2003: 873339 or SP1 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios hypertrm.dll older than 2004-11-13 Windows Message Queuing vulnerability Severity: Potential Problem CVE: CVE-2005-0059 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Message Queuing vulnerability Description Fixes a buffer overflow in Message Queuing which could allow remote command execution. (Sites using only HTTP Message Delivery are not affected.) (CVE 2005-0059) 144 Fix Bulletin 2000: 892944 or 05-017 SP4 Update Rollup 1 XP: 892944 or SP2 2003: not affected Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios mqutil.dll older than 2005-2-16 Windows RPC mutual authentication spoofing Severity: Potential Problem CVE: CVE-2006-2380 CVE-2010-1556 Impact The absence of critical updates leads to the potential for denial of service or unauthorized access by attackers or malicious web sites. The Problems and Resolutions One or more of the following security updates is not installed on the target system. The resolution is to install the needed updates. This can be done either by following the links in the table, or by visiting the Windows Update service which will automatically determine which updates are needed for your system and help you install them. It is a good idea to make a backup of the system before installing an update, especially for service packs. After the system has been brought up to date, check Microsoft's web site regularly for new critical updates. Note: The links below apply to the standard editions of Windows operating systems. If you are using a Terminal Server edition, a 64-bit edition, or a non-Intel edition which is not listed, consult the corresponding Microsoft Security Bulletins for patch information. Update Name Windows RPC Mutual Authentication spoofing Description Fix Fixes vulnerability in Windows RPC 2000: 917736 for Windows 2000 that allows for spoofing of RPC authentication. (CVE 2006-2380) Bulletin 06-031 Where can I read more about this? For more information on critical updates, see the Windows critical update pages which are available for Windows 2000, Windows NT 4.0, Windows XP, and Windows Server 2003. Windows Vista. Windows Server 2008. Technical Details Service: netbios rpcrt4.dll older than 2006-4-10 17/TCP Severity: Service 145 Technical Details "Assassination is the extreme form of censorship." 17/UDP Severity: Service Technical Details 42/TCP Severity: Service Technical Details 88/TCP Severity: Service Technical Details 88/UDP Severity: Service Technical Details 464/TCP Severity: Service Technical Details 464/UDP Severity: Service Technical Details 548/TCP Severity: Service Technical Details 563/TCP Severity: Service Technical Details 1028/TCP Severity: Service Technical Details 146 1030/UDP Severity: Service Technical Details 1031/TCP Severity: Service Technical Details ncacn_http/1.0 1053/TCP Severity: Service Technical Details 1054/UDP Severity: Service Technical Details 1056/UDP Severity: Service Technical Details 1059/TCP Severity: Service Technical Details 1063/UDP Severity: Service Technical Details 1068/UDP Severity: Service Technical Details 1073/UDP Severity: Service Technical Details 1081/UDP Severity: Service 147 Technical Details 1090/TCP Severity: Service Technical Details 1091/TCP Severity: Service Technical Details 1101/UDP Severity: Service Technical Details 1102/UDP Severity: Service Technical Details 1104/TCP Severity: Service Technical Details 1105/TCP Severity: Service Technical Details 1106/UDP Severity: Service Technical Details 1110/TCP Severity: Service Technical Details 1111/TCP Severity: Service Technical Details 1112/UDP Severity: Service 148 Technical Details 1113/TCP Severity: Service Technical Details 1128/UDP Severity: Service Technical Details 1129/UDP Severity: Service Technical Details 1135/TCP Severity: Service Technical Details 1138/UDP Severity: Service Technical Details 1144/TCP Severity: Service Technical Details 1150/UDP Severity: Service Technical Details 1240/UDP Severity: Service Technical Details 1369/UDP Severity: Service Technical Details 1415/UDP Severity: Service 149 Technical Details 1433/TCP Severity: Service Technical Details 1434/UDP Severity: Service Technical Details 1638/UDP Severity: Service Technical Details 1645/UDP Severity: Service Technical Details 1646/UDP Severity: Service Technical Details 1718/UDP Severity: Service Technical Details 1719/UDP Severity: Service Technical Details 1755/TCP Severity: Service Technical Details 1755/UDP Severity: Service Technical Details 1801/TCP Severity: Service 150 Technical Details 1801/UDP Severity: Service Technical Details 1813/UDP Severity: Service Technical Details 2101/TCP Severity: Service Technical Details 2103/TCP Severity: Service Technical Details 2107/TCP Severity: Service Technical Details 3268/TCP Severity: Service Technical Details 3269/TCP Severity: Service Technical Details 3372/TCP Severity: Service Technical Details H\252\t\000x\001 3389/TCP Severity: Service Technical Details 151 6666/TCP Severity: Service Technical Details 7007/TCP Severity: Service Technical Details DNS Severity: Service Technical Details FTP Severity: Service Technical Details 220 saintlab02 Microsoft FTP Service (Version 5.0). FTP (with anonymous) Severity: Service Technical Details ANONYMOUS NNTP (Usenet news) Severity: Service Technical Details 200 NNTP Service 5.00.0984 Version: 5.0.2195.2966 Posting Allowed SMB Severity: Service Technical Details \131\000\000\001\143 SMTP Severity: Service Technical Details 220 saintlab02.saintlab.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Tue, 13 Jul 2010 10:48:01 -0400 152 SNMP Severity: Service Technical Details WWW Severity: Service Technical Details HTTP/1.1 500 Server Error Server: Microsoft-IIS/5.0 Date: Tue, 13 Jul 2010 14:48:01 GMT Content-Type: text/html Content-Length: 276 <html><head><title>Server Application WWW (Secure) Severity: Service Technical Details WWW (non-standard port 5406) Severity: Service Technical Details HTTP/1.1 403 Access Forbidden Server: Microsoft-IIS/5.0 Date: Tue, 13 Jul 2010 14:48:03 GMT Content-Length: 3295 Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//W3C//DTD XDM (X login) Severity: Service Technical Details bootpc (68/UDP) Severity: Service Technical Details bootps (67/UDP) Severity: Service Technical Details chargen (19/TCP) Severity: Service 153 Technical Details !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefg chargen:UDP (19/UDP) Severity: Service Technical Details daytime (13/TCP) Severity: Service Technical Details 10:48:01 AM 7/13/2010 daytime (13/UDP) Severity: Service Technical Details discard (9/TCP) Severity: Service Technical Details discard (9/UDP) Severity: Service Technical Details domain (53/UDP) Severity: Service Technical Details echo (7/TCP) Severity: Service Technical Details GET / HTTP/1.0 echo (7/UDP) Severity: Service Technical Details eklogin (2105/TCP) Severity: Service 154 Technical Details isakmp (500/UDP) Severity: Service Technical Details ldap (389/TCP) Severity: Service Technical Details ldap (389/UDP) Severity: Service Technical Details microsoft-ds (445/TCP) Severity: Service Technical Details microsoft-ds (445/UDP) Severity: Service Technical Details name (42/UDP) Severity: Service Technical Details netbios-dgm (138/UDP) Severity: Service Technical Details netbios-ns (137/UDP) Severity: Service Technical Details ntp (123/UDP) Severity: Service Technical Details printer (515/TCP) Severity: Service 155 Technical Details \001 radius (1812/UDP) Severity: Service Technical Details ssl-ldap (636/TCP) Severity: Service Technical Details tftp (69/UDP) Severity: Service Technical Details Copyright 2001-2010 SAINT Corporation. All rights reserved. 156