ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA20717] Microsoft Windows Object Packager Dialog Spoofing Vulnerability



> 
> TITLE:
> Microsoft Windows Object Packager Dialog Spoofing Vulnerability
> 
> SECUNIA ADVISORY ID:
> SA20717
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/20717/
> 
> CRITICAL:
> Less critical
> 
> IMPACT:
> Spoofing, System access
> 
> WHERE:
> From remote
> 
> OPERATING SYSTEM:
> Microsoft Windows Server 2003 Datacenter Edition
> http://secunia.com/product/1175/
> Microsoft Windows Server 2003 Enterprise Edition
> http://secunia.com/product/1174/
> Microsoft Windows Server 2003 Standard Edition
> http://secunia.com/product/1173/
> Microsoft Windows Server 2003 Web Edition
> http://secunia.com/product/1176/
> Microsoft Windows XP Professional
> http://secunia.com/product/22/
> 
> DESCRIPTION:
> Secunia Research has discovered a vulnerability in Microsoft Windows,
> which can be exploited by malicious people to conduct spoofing
> attacks.
> 
> The vulnerability is caused due to an input validation error in the
> Object Packager (packager.exe) in the handling of the "Command Line"
> property. This can be exploited to spoof the filename and the
> associated file type in the Packager security dialog by including a
> "/" slash character in the "Command Line" property.
> 
> Example:
> cmd /c [shell command] /[file].txt
> 
> This can further be exploited to execute arbitrary shell commands on
> a user's system by tricking a user into opening and interacting with
> e.g. a malicious Rich Text document or Word document containing an
> embedded Package object in e.g. WordPad.
> 
> SOLUTION:
> Apply patches.
> 
> Microsoft Windows XP (with SP1 or SP2):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=86c2b
> 78e-53bf-4ddd-88f6-5d12c6d18c90
> 
> Microsoft Windows XP Professional x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=2ac72
> 356-7772-41b6-b4a6-7215c89f7347
> 
> Microsoft Windows Server 2003 (with or without SP1):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=e2f5b
> 9f9-4481-44f9-9aef-1af0afae8319
> 
> Microsoft Windows Server 2003 for Itanium-based Systems (with or
> without SP1):
> http://www.microsoft.com/downloads/details.aspx?FamilyId=8c9a2
> 2a6-bd61-4fd4-9aa4-012d745046da
> 
> Microsoft Windows Server 2003 x64 Edition:
> http://www.microsoft.com/downloads/details.aspx?FamilyId=ec4f4
> f72-8467-4964-ad28-ed9ea7562e0b
> 
> PROVIDED AND/OR DISCOVERED BY:
> Andreas Sandblad, Secunia Research.
> 
> ORIGINAL ADVISORY:
> MS06-065 (KB924496):
> http://www.microsoft.com/technet/security/Bulletin/MS06-065.mspx
> 



 




Copyright © Lexa Software, 1996-2009.