ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA24156] Internet Explorer Multiple Vulnerabilities



> ----------------------------------------------------------------------
> 
> TITLE:
> Internet Explorer Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA24156
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/24156/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> System access
> 
> WHERE:
> From remote
> 
> SOFTWARE:
> Microsoft Internet Explorer 5.01
> http://secunia.com/product/9/
> Microsoft Internet Explorer 6.x
> http://secunia.com/product/11/
> Microsoft Internet Explorer 7.x
> http://secunia.com/product/12366/
> 
> DESCRIPTION:
> Some vulnerabilities have been reported in Internet Explorer, which
> can be exploited by malicious people to compromise a user's system.
> 
> 1) An error within the instantiation of COM objects (Imjpcksid.dll
> and Imjpskdic.dll) not intended to be instantiated in Internet
> Explorer can be exploited to cause a memory corruption.
> 
> 2) Another error within the instantiation of COM objects
> (Msb1fren.dll, Htmlmm.ocx, and Blnmgrps.dll) not intended to be
> instantiated in Internet Explorer can be exploited to cause a memory
> corruption.
> 
> 3) An error within the parsing of FTP server responses can be
> exploited to cause a memory corruption via a specially crafted
> response sent to the FTP client in Internet Explorer.
> 
> Successful exploitation of the vulnerabilities allows execution of
> arbitrary code.
> 
> SOLUTION:
> Apply patches.
> 
> Internet Explorer 5.01 SP4 on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=2D83E
> FCE-E507-4AFF-AB9B-EAF1D0D6320D
> 
> Internet Explorer 6 SP1 installed on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=D9E41
> 81A-05F9-4186-BDCA-C95351983844
> 
> Internet Explorer 6 for Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=D4038
> DC1-8AF6-4BEA-82B8-EACCFF4CDB28
> 
> Internet Explorer 6 for Windows XP Professional x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=D6EEE
> A2C-785E-4DEF-913E-7F121556554F
> 
> Internet Explorer 6 for Windows Server 2003 (optionally with SP1):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=C6BCB
> E07-39C1-4705-A10D-019DA3F997E5
> 
> Internet Explorer 6 for Windows Server 2003 for Itanium-based systems
> (optionally with SP1):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=6476A
> 14B-0D00-4F55-A438-E140E9D26849
> 
> Internet Explorer 6 for Windows Server 2003 x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=C18DB
> 204-0F2C-4DD4-B29C-0938FF1BFD7B
> 
> Internet Explorer 7 for Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=EE851
> EFD-2CAF-41CE-A423-E1827DE318DF
> 
> Internet Explorer 7 for Windows XP Professional x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=AC084
> BBB-084D-47AC-BFDA-156E34A63817
> 
> Internet Explorer 7 for Windows Server 2003 SP1:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=36DAE
> 010-AD1F-4E77-A353-9AFA41F065EA
> 
> Internet Explorer 7 for Windows Server 2003 with SP1 for
> Itanium-based systems:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=631B5
> 90D-98CE-440D-B588-88CC31BB9370
> 
> Internet Explorer 7 for Windows Server 2003 x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=A05D1
> E57-6678-4C25-B5E2-98F18BAA454B
> 
> PROVIDED AND/OR DISCOVERED BY:
> 1) Reported by the vendor.
> 2) The vendor credits H D Moore, BreakingPoint Systems.
> 3) The vendor credits iDefense Labs.
> 
> ORIGINAL ADVISORY:
> MS07-016 (KB928090):
> http://www.microsoft.com/technet/security/Bulletin/MS07-016.mspx
> 



 




Copyright © Lexa Software, 1996-2009.