ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA25627] Internet Explorer Multiple Vulnerabilities



> 
> TITLE:
> Internet Explorer Multiple Vulnerabilities
> 
> SECUNIA ADVISORY ID:
> SA25627
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/25627/
> 
> CRITICAL:
> Highly critical
> 
> IMPACT:
> Cross Site Scripting, Spoofing, System access
> 
> WHERE:
> From remote
> 
> SOFTWARE:
> Microsoft Internet Explorer 5.01
> http://secunia.com/product/9/
> Microsoft Internet Explorer 6.x
> http://secunia.com/product/11/
> Microsoft Internet Explorer 7.x
> http://secunia.com/product/12366/
> 
> DESCRIPTION:
> Multiple vulnerabilities have been reported in Internet Explorer,
> which can be exploited by malicious people to conduct phishing
> attacks or compromise a user's system.
> 
> 1) An error within the instantiation of Urlmon.dll COM objects not
> intended to be instantiated in Internet Explorer can be exploited to
> corrupt memory.
> 
> 2) An error in the handling of CSS (Cascading Style Sheet) tags can
> be exploited to corrupt memory via a specially crafted web page.
> 
> 3) A race condition when attempting to install multiple language
> packs can be exploited to corrupt memory via a specially crafted web
> page.
> 
> 4) An error in the handling of uninitialised objects can be exploited
> to corrupt memory via a specially crafted web page.
> 
> 5) An error within the Navigation cancel page can be exploited to
> e.g. spoof the contents of an arbitrary site.
> 
> This may be related to:
> SA24535
> 
> 6) An error within a component of Microsoft Speech API 4 can be
> exploited to execute arbitrary code via a specially crafted web page.
> 
> SOLUTION:
> Apply patches.
> 
> Internet Explorer 5.01 SP4 on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=3B49F
1ED-ABE3-4DBD-A91D-973415658F6B
> 
> Internet Explorer 6 SP1 on Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=5C958
650-28D2-4DD0-96A8-DBFE79CE3F68
> 
> Internet Explorer 6 for Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=60FB2
94E-A8E1-405E-A289-2D2723EDF7EE
> 
> Internet Explorer 6 for Windows XP Professional x64 Edition
> (optionally SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=086D6
D6E-4703-4C6C-A7AF-B6DAFEEEDE5D
> 
> Internet Explorer 6 for Windows Server 2003 SP1/SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=7ED19
127-5C2D-48E4-A8D1-090DC69FD68B
> 
> Internet Explorer 6 for Windows Server 2003 x64 Edition (optionally
> with SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=1449E
B5D-6E4C-4332-8CB6-AB9EE59C9A95
> 
> Internet Explorer 6 for Windows Server 2003 for Itanium-based systems
> SP1/SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=B628A
3CC-A70C-478A-A10C-EEE254EE34AB
> 
> Internet Explorer 7 for Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=C2191
703-8CBD-4959-9F84-E13F21173926
> 
> Internet Explorer 7 for Windows XP Professional x64 Edition
> (optionally with SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=69C52
6B8-8B07-42BC-9BED-E18DEAE21C8E
> 
> Internet Explorer 7 for Windows Server 2003 SP1/SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=A074D
9C0-1FED-4753-845E-073CFCE99F45
> 
> Internet Explorer 7 for Windows Server 2003 x64 Edition (optionally
> with SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=744AC
B43-64DA-48CC-AE69-9386B597EABC
> 
> Internet Explorer 7 for Windows Server 2003 for Itanium-based systems
> SP1/SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=069C1
560-B5E5-4DFE-A18D-E0507D406028
> 
> Internet Explorer 7 for Windows Vista:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=77287
386-48EB-4AA9-9537-626A3093AAF7
> 
> Internet Explorer 7 for Windows Vista x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=77287
386-48EB-4AA9-9537-626A3093AAF7
> 
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits:
> 1) An anonymous researcher, reported via iDefense Labs.
> 3) An anonymous researcher, reported via ZDI.
> 4) Sam Thomas, reported via ZDI.
> 6) Independently discovered by:
> * Will Dormann, CERT/CC 
> * cocoruder, Fortinet Security Research
> 
> ORIGINAL ADVISORY:
> MS07-033 (KB933566):
> http://www.microsoft.com/technet/security/Bulletin/MS07-033.mspx
> 
> OTHER REFERENCES:
> SA24535:
> http://secunia.com/advisories/24535/
> 



 




Copyright © Lexa Software, 1996-2009.