Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

   


   


   

















      :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA26449] Microsoft Windows OLE Automation Memory Corruption Vulnerability



>
> TITLE:
> Microsoft Windows OLE Automation Memory Corruption Vulnerability
>
> SECUNIA ADVISORY ID:
> SA26449
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/26449/
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> Microsoft Windows 2000 Server
> http://secunia.com/product/20/
> Microsoft Windows 2000 Professional
> http://secunia.com/product/1/
> Microsoft Windows 2000 Datacenter Server
> http://secunia.com/product/1177/
> Microsoft Windows 2000 Advanced Server
> http://secunia.com/product/21/
> Microsoft Windows XP Professional
> http://secunia.com/product/22/
> Microsoft Windows Server 2003 Datacenter Edition
> http://secunia.com/product/1175/
> Microsoft Windows Server 2003 Enterprise Edition
> http://secunia.com/product/1174/
> Microsoft Windows Server 2003 Standard Edition
> http://secunia.com/product/1173/
> Microsoft Windows Server 2003 Web Edition
> http://secunia.com/product/1176/
>
> SOFTWARE:
> Microsoft Office 2004 for Mac
> http://secunia.com/product/8713/
> Microsoft Visual Basic 6.x
> http://secunia.com/product/410/
>
> DESCRIPTION:
> A vulnerability has been reported in Microsoft Windows, which can be
> exploited by malicious people to compromise a user's system.
>
> The vulnerability is caused due to an input validation error in OLE
> Automation when processing certain script requests. This can be
> exploited to cause a memory corruption when a user e.g. visits a
> specially crafted website.
>
> Successful exploitation may allow execution of arbitrary code.
>
> SOLUTION:
> Apply patches.
>
> Windows 2000 SP4:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=5c35b
> 6e8-732a-4451-b5d4-23ed63e6e792
>
> Windows XP SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=6e8de
> 050-8589-4831-ae19-075c93509485
>
> Windows XP Professional x64 Edition (optionally with SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=b85bb
> 583-dc61-4d37-b458-208f5bb07ece
>
> Windows Server 2003 SP1/SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=15d4d
> 4fa-9bab-4da5-978e-f89c78c8086a
>
> Windows Server 2003 x64 Edition (optionally with SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=6608d
> 722-3ef8-4085-b771-7b17bb0ba06e
>
> Windows Server 2003 for Itanium-based Systems SP1/SP2:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=fc044
> 51a-0696-4a21-b2b6-f02d4e2c33bf
>
> Microsoft Office 2004 for Mac:
> http://www.microsoft.com/mac/downloads.aspx#Office2004
>
> Microsoft Visual Basic 6.0 Service Pack 6 (KB924053):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=E1646
> FB0-29D5-4A6E-A8D2-304C4D7735B7
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits:
> * An anonymous researcher, reported via iDefense Labs.
> * An anonymous researcher, reported via ZDI.
>
> ORIGINAL ADVISORY:
> MS07-043 (KB921503):
> http://www.microsoft.com/technet/security/Bulletin/MS07-043.mspx
>



 




Copyright © Lexa Software, 1996-2009.