【TWCERT/CC安全通報】TW-CA-2005-041-[TA05-102A: Multiple Vulner

看板NetSecurity (資安 資訊安全)作者時間20年前 (2005/04/15 13:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
※ 本文轉錄自 [Lan] 信箱 作者: twcert@cert.org.tw (TWCERT/CC Fellows) 標題: 【TWCERT/CC安全通報】TW-CA-2005-041-[TA05-102A 時間: Thu Apr 14 10:54:00 2005 -----BEGIN PGP SIGNED MESSAGE----- TW-CA-2005-041-[TA05-102A: Multiple Vulnerabilities in Microsoft Windows Components Precedence: list] ──────────────────────────────────────── TWCERT/CC發布日期:2005-04-14 原漏洞發布日期:2005-04-12 原漏洞最新更新日期:-- 通用安全漏洞編號: 分類:Miscellaneous 來源參考:TA05-102A ──── 簡述 ───────────────────────────────── 微軟在 2005 年四月時發佈了一則安全性公告摘要。摘要中說明了一些 Windows 應用程 式和元件所存在的漏洞。遠端攻擊者可利用這些漏洞在主機上執行任意程式碼。關於這 些漏洞及其影響之細節,可參考以下說明。 ──── 說明 ───────────────────────────────── 以下列表提供了微軟安全性公告和相關 US-CERT 弱點編號的對應,更多的詳細資訊可以在 這些文件中取得。 微軟安全性公告 MS05-020: Internet Explorer 積存安全性更新 (890923) ‧VU#774338 微軟的 IE DHTML 物件包含一個競賽問題 ‧VU#756122 微軟的 IE URL 驗證包含了一個緩衝區溢位漏洞 ‧VU#222050 微軟的 IE Content Advisor 包含了一個緩衝區溢位漏洞 微軟安全性公告 MS05-021: Exchange Server 中的弱點可能會允許遠端執行程式碼 (894549) ‧VU#774338 微軟的 Exchange Server 在SMTP extended verb handling 包含未檢查緩衝區 微軟安全性公告 MS05-022: MSN Messenger 中的弱點可能會允許遠端執行程式碼 (896597) ‧VU#633446 微軟 MSN Messenger GIF processing 緩衝區溢位 微軟安全性公告 MS05-019: TCP/IP 中的弱點可能會允許遠端執行程式碼和拒絕服務 (893066) ‧VU#233754 微軟 Windows 並未適當地驗證 IP 封包 ──── 影響平台 ─────────────────────────────── * 微軟 Windows 系統 請參考微軟安全性公告,進一步得知受影響 Windows 作業系統與元件之詳細列表 ──── 修正方式 ─────────────────────────────── 安裝更新程式 微軟已於安全性公告及 Windows Update 提供數個弱點的更新檔。 ──── 影響結果 ─────────────────────────────── ──── 聯絡TWCERT/CC ───────────────────────────── Tel: 886-7-5250211 FAX: 886-7-5250212 886-2-23563303 886-2-23924082 Email: twcert@cert.org.tw URL: http://www.cert.org.tw/ PGP key: http://www.cert.org.tw/eng/pgp.htm ──────────────────────────────────────── 附件:[ Multiple Vulnerabilities in Microsoft Windows Components Precedence: list] ──── 原文 ───────────────────────────────── Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA05-102A Multiple Vulnerabilities in Microsoft Windows Components Original release date: April 12, 2005 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows Systems For a complete list of affected versions of the Windows operating systems and components, refer to the Microsoft Security Bulletins. Overview Overview Microsoft has released a Security Bulletin Summary for April, 2005. This summary includes several bulletins that address vulnerabilities in various Windows applications and components. Exploitation of some vulnerabilities can result in the remote execution of arbitrary code by a remote attacker. Details of the vulnerabilities and their impacts are provided below. I. Description The list below provides a mapping between Microsofts Security Bulletins and the related US-CERT Vulnerability Notes. More information related to the vulnerabilities is available in these documents. Microsoft Security Bulletin MS05-020: Cumulative Security Update for Internet Explorer (890923) VU#774338 Microsoft Internet Explorer DHTML objects contain a race condition VU#756122 Microsoft Internet Explorer URL validation routine contains a buffer overflow VU#222050 Microsoft Internet Explorer Content Advisor contains a buffer overflow Microsoft Security Bulletin MS05-02: Vulnerability in Exchange Server Could Allow Remote Code Execution (894549) VU#275193 Microsoft Exchange Server contains unchecked buffer in SMTP extended verb handling Microsoft Security Bulletin MS05-022: Vulnerability in MSN Messenger Could Lead to Remote Code Execution (896597) VU#633446 Microsoft MSN Messenger GIF processing buffer overflow Microsoft Security Bulletin MS05-019: Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066) VU#233754 Microsoft Windows does not adequately validate IP packets II. Impact Exploitation of these vulnerabilities may permit a remote attacker to execute arbitrary code on a vulnerable Windows system, or cause a denial-of-service condition. III. Solution Apply a patch Microsoft has provided the patches for these vulnerabilities in the Security Bulletins and on Windows Update. Appendix A. References * Microsofts Security Bulletin Summary for April, 2005 - < http://www.microsoft.com/technet/security/bulletin/ms05-apr.mspx> * US-CERT Vulnerability Note VU#774338 - <http://www.kb.cert.org/vuls/id/774338> * US-CERT Vulnerability Note VU#756122 - <http://www.kb.cert.org/vuls/id/756122> * US-CERT Vulnerability Note VU#222050 - <http://www.kb.cert.org/vuls/id/222050> * US-CERT Vulnerability Note VU#275193 - <http://www.kb.cert.org/vuls/id/275193> * US-CERT Vulnerability Note VU#633446 - <http://www.kb.cert.org/vuls/id/633446> * US-CERT Vulnerability Note VU#233754 - <http://www.kb.cert.org/vuls/id/233754> _________________________________________________________________ Feedback can be directed to the authors: Will Dormann, Jeff Gennari, Chad Dougherty, Ken MacInnis, Jason Rafail, Art Manion, and Jeff Havrilla. _________________________________________________________________ This document is available from: <http://www.us-cert.gov/cas/techalerts/TA05-102A.html> _________________________________________________________________ Copyright 2005 Carnegie Mellon University. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History April 12, 2005: Initial release ──────────────────────────────────────── -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQEVAwUBQl3ahKcyQYefg2/NAQG9cgf/XFSdDJmmPCC/VQw41iHvF5JC76cWUDef /G2b6NEGdBLRzdLF4QL4lpI0snfAhMo5NaoIYSL7AGYgQlBgDO/sSg5lqUeuy2bP +agdxnCLhGASehAJvCa2MM9Zl9IHCZbV4+1AgzfaDtj1NkzWdtCP5yvW+iYY3zjL /OFFFyEdD2q/rUguIH8AzhzELOYd5UreWFfhZronu35r3CFeBqfDJx1pucYKUXPi Md1I/gPzjczbBRJPMuzWsaSCRkbLeqZvPvE5lN7eFskstKc5lT1Jrfta3EscxlJh mnFXv5eAIEX4Mssx6ABkmRbcydM6BKRPJATy4utzR+VDzvz/4vmGVA== =yQhF -----END PGP SIGNATURE----- -- Taiwan Computer Emergency Response Team Security Advisory mailing list. Mail to : Majordomo@cert.org.tw and include a line "subscribe advisory". Please visit http://www.cert.org.tw/. PGP key : http://www.cert.org.tw/eng/pgp.htm
文章代碼(AID): #12NqgK00 (NetSecurity)
文章代碼(AID): #12NqgK00 (NetSecurity)