what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2005-102A

Technical Cyber Security Alert 2005-102A
Posted Apr 19, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-102A - Microsoft has released a Security Bulletin Summary for April, 2005. This summary includes several bulletins that address vulnerabilities in various Windows applications and components. Exploitation of some vulnerabilities can result in the remote execution of arbitrary code by a remote attacker.

tags | advisory, remote, arbitrary, vulnerability
systems | windows
SHA-256 | 3c4afe41c5453fad4a5bfa073bbac7c40792450fc856da20772568df97503e76

Technical Cyber Security Alert 2005-102A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

Technical Cyber Security Alert TA05-102A

Multiple Vulnerabilities in Microsoft Windows Components

Original release date: April 12, 2005
Last revised: --
Source: US-CERT


Systems Affected

* Microsoft Windows Systems

For a complete list of affected versions of the Windows operating
systems and components, refer to the Microsoft Security Bulletins.


Overview

Microsoft has released a Security Bulletin Summary for April, 2005.
This summary includes several bulletins that address
vulnerabilities in various Windows applications and
components. Exploitation of some vulnerabilities can result in the
remote execution of arbitrary code by a remote attacker. Details of
the vulnerabilities and their impacts are provided below.


I. Description

The list below provides a mapping between Microsoft's Security
Bulletins and the related US-CERT Vulnerability Notes. More
information related to the vulnerabilities is available in these
documents.

Microsoft Security Bulletin MS05-020:
Cumulative Security Update for Internet Explorer (890923)

VU#774338 Microsoft Internet Explorer DHTML objects contain a
race condition

VU#756122 Microsoft Internet Explorer URL validation routine
contains a buffer overflow

VU#222050 Microsoft Internet Explorer Content Advisor contains a
buffer overflow


Microsoft Security Bulletin MS05-02:
Vulnerability in Exchange Server Could Allow Remote Code
Execution (894549)

VU#275193 Microsoft Exchange Server contains unchecked buffer in SMTP
extended verb handling


Microsoft Security Bulletin MS05-022:
Vulnerability in MSN Messenger Could Lead to Remote Code Execution
(896597)

VU#633446 Microsoft MSN Messenger GIF processing
buffer overflow


Microsoft Security Bulletin MS05-019:
Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial
of Service (893066)

VU#233754 Microsoft Windows does not adequately validate IP
packets


II. Impact

Exploitation of these vulnerabilities may permit a remote attacker to
execute arbitrary code on a vulnerable Windows system, or cause a
denial-of-service condition.


III. Solution

Apply a patch

Microsoft has provided the patches for these vulnerabilities in the
Security Bulletins and on Windows Update.


Appendix A. References

* Microsoft's Security Bulletin Summary for April, 2005 - <
http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx>

* US-CERT Vulnerability Note VU#774338 -
<http://www.kb.cert.org/vuls/id/774338>

* US-CERT Vulnerability Note VU#756122 -
<http://www.kb.cert.org/vuls/id/756122>

* US-CERT Vulnerability Note VU#222050 -
<http://www.kb.cert.org/vuls/id/222050>

* US-CERT Vulnerability Note VU#275193 -
<http://www.kb.cert.org/vuls/id/275193>

* US-CERT Vulnerability Note VU#633446 -
<http://www.kb.cert.org/vuls/id/633446>

* US-CERT Vulnerability Note VU#233754 -
<http://www.kb.cert.org/vuls/id/233754>
_________________________________________________________________

Feedback can be directed to the authors: Will Dormann, Jeff Gennari,
Chad Dougherty, Ken MacInnis, Jason Rafail, Art Manion, and Jeff
Havrilla.
_________________________________________________________________

This document is available from:

<http://www.us-cert.gov/cas/techalerts/TA05-102A.html>

_________________________________________________________________

Copyright 2005 Carnegie Mellon University.

Terms of use: <http://www.us-cert.gov/legal.html>
_________________________________________________________________

Revision History

April 12, 2005: Initial release


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQlxwexhoSezw4YfQAQJ4RAf/bTgaa6SBDMJveqW/GnQET79F9aVPM1S2
glam1w4YFyOdyIHpDYqQZRBqgXgpJjel/MiH02tZreU5mgIjkPIWA3gleepyWvnN
7VYv8KcbSnyvGxDl/8K2YjFz550gxA3pkRD7IiqdpOums87lJ7xM7sjdUY0ZA8aF
JEvA4gfndpgLSuISV7Gf8y1s4MU329DurNy3t8W4EB9Iuef/E4Z058IvHnz9dTnT
XwBnyW1KfH2Ohpy7QBOtcXt1wXU8X0F+d01g/VZmTL7xVwXmcPi8UpS7bPK8A17+
asqo582KjZVR56iL7fqNQzsrXUGZncEnX/8QOhi3Ym2LfAEkKrg3rw==
=BY/p
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close