July 28, 2009
Microsoft Security Bulletin: July 2009 Security Bulletin
Advisory Overview

July 28, 2009 - Qualys® Vulnerability R&D Lab has released new vulnerability checks in QualysGuard® to protect organizations against 2 vulnerabilities present in Microsoft Windows that were announced today. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their QualysGuard subscription.

Vulnerability Details

Microsoft has released 2 security patches to fix newly discovered flaws in Microsoft Windows.

Qualys has released the following checks for these new vulnerabilities:


Microsoft Internet Explorer Cumulative Security Update
SEVERITY: Urgent Urgent-5 5
QUALYS ID: 90513
VENDOR REFERENCE: MS09-034
CVE REFERENCE: CVE-2009-1917, CVE-2009-1918, CVE-2009-1919
CVSS SCORES: Base 7.8/ Temporal 5.8
THREAT: Microsoft Internet Explorer is a Web browser for Microsoft Windows.

Internet Explorer is prone to the following memory corruption vulnerabilities:

- When Internet Explorer attempts to access an object that has been deleted, memory may be corrupted in such a way that an attacker could execute arbitrary code in the context of the logged-on user. (CVE-2009-1917)

- A remote code execution vulnerability exists in the way that Internet Explorer handles table operations in specific situations. This can be exploited to corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. (CVE-2009-1918)

- A remote code execution vulnerability exists in the way Internet Explorer accesses an object that has been deleted. (CVE-2009-1919)

Microsoft has released a security update that addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory and table operations.

Affected Software:
Internet Explorer 5.01 Service Pack 4
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8

IMPACT: Successful exploitation of this vulnerability can result in execution or arbitrary code.
SOLUTION: Patch:
Following are links for downloading patches to fix the vulnerabilities:

Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 5.01 Service Pack 4)

Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 6 Service Pack 1)

Windows XP Service Pack 2 and Windows XP Service Pack 3 (Microsoft Internet Explorer 6)

Windows XP Professional x64 Edition Service Pack 2 (Microsoft Internet Explorer 6)

Windows Server 2003 Service Pack 2 (Microsoft Internet Explorer 6)

Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Internet Explorer 6)

Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Internet Explorer 6)

Windows XP Service Pack 2 and Windows XP Service Pack 3 (Windows Internet Explorer 7)

Windows XP Professional x64 Edition Service Pack 2 (Windows Internet Explorer 7)

Windows Server 2003 Service Pack 2 (Windows Internet Explorer 7)

Windows Server 2003 x64 Edition Service Pack 2 (Windows Internet Explorer 7)

Windows Server 2003 with SP2 for Itanium-based Systems (Windows Internet Explorer 7)

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2 (Windows Internet Explorer 7)

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Internet Explorer 7)

For a complete list of patch download links, please refer to Microsoft Security Bulletin MS09-034.

Workarounds:
- Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone

Impact of the workarounds:
On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.


Microsoft Visual Studio Active Template Library Remote Code Execution
SEVERITY: Urgent Urgent-5 5
QUALYS ID: 90514
VENDOR REFERENCE: MS09-035
CVE REFERENCE: CVE-2009-0901, CVE-2009-2493, CVE-2009-2495
CVSS SCORES: Base 9.3/ Temporal 7.9
THREAT: Microsoft Visual Studio is an Integrated Development Environment (IDE) from Microsoft. It can be used to develop console and graphical user interface applications.

Certain applications of the Visual Studio product line are prone the following security vulnerabilities:

- A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to an issue in the ATL headers that could allow an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized. (CVE-2009-0901)

- A vulnerability exists due to issues in the ATL headers that handle instantiation of an object from data streams. For components and controls built using ATL, unsafe usage of OleLoadFromStream could allow the instantiation of arbitrary objects which can bypass certain related security policies. (CVE-2009-2493)

- An information disclosure vulnerability exists in the Microsoft Active Template Library (ATL) that could allow a string to be read without a terminating NULL character. An attacker could manipulate this string to read extra data beyond the end of the string and thus disclose information in memory. (CVE-2009-2495)

Microsoft Visual Studio .NET 2003, Visual Studio 2005 and 2008 and Visual C++ 2005 and 2008 are affected.

IMPACT: Successful exploitation of this vulnerability can result in disclosure of sensitive information, arbitrary execution of code, or allow an attacker to bypass security restrictions.
SOLUTION: Patch:
Following are links for downloading patches to fix the vulnerabilities:

Microsoft Visual Studio .NET 2003 Service Pack 1

Microsoft Visual Studio 2005 Service Pack 1

Microsoft Visual Studio 2005 Service Pack 1 64-bit Hosted Visual C++ Tools

Microsoft Visual Studio 2008

Microsoft Visual Studio 2008 Service Pack 1

Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package

Microsoft Visual C++ 2008 Redistributable Package

Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package

Refer to Microsoft Security Bulletin MS09-035 for further details.

Workarounds:
- Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone

Impact of the workarounds:
On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround. For additional details on the workarounds, please refer to Microsoft Security Advisory (973882).

This new vulnerability check is included in Qualys vulnerability signatures v1.23.40-2. Each QualysGuard account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the QualysGuard HOME menu, select the Account Info tab.

SELECTIVE SCAN INSTRUCTIONS USING QUALYSGUARD:

To perform a selective vulnerability scan, configure a scan profile to use the following options:

  1. Ensure access to TCP ports 135 and 139 are available.
  2. Enable Windows Authentication (specify Authentication Records).
  3. Enable the following Qualys IDs:
    • 90513
    • 90514
  4. If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
  5. If you would like to be notified if QualysGuard is unable to logon to a host (if Authentication fails), also include QID 105015.

In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Matrix Report, available from the QualysGuard HOME page.


Technical Support
For more information, customers may contact Qualys Technical Support directly at support@qualys.com or by telephone toll free at:
US: 1 866.801.6161 | EMEA: 33 1 44.17.00.41 | UK: +44 1753 872102
About QualysGuard
QualysGuard is an on-demand security audit service delivered over the web that enables organizations to effectively manage their vulnerabilities and maintain control over their network security with centralized reports, verified remedies, and full remediation workflow capabilities with trouble tickets. QualysGuard provides comprehensive reports on vulnerabilities including severity levels, time to fix estimates and impact on business, plus trend analysis on security issues. By continuously and proactively monitoring all network access points, QualysGuard dramatically reduces security managers' time researching, scanning and fixing network exposures and enables companies to eliminate network vulnerabilities before they can be exploited.

Access for QualysGuard customers: https://qualysguard.qualys.com

Free trial of QualysGuard service: http://www.qualys.com/forms/trials/qualysguard_trial/