Security Alerts

Microsoft Security Bulletin: Multiple Security Vulnerabilities

Qualys' Vulnerability R&D Lab has released 10 new vulnerability checks in QualysGuard® to protect organizations against the new vulnerabilities present in several Microsoft technologies that were announced today. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their QualysGuard subscription.
Microsoft has released 10 security patches to fix newly discovered flaws in several Microsoft technologies. Qualys has released the following checks for these new vulnerabilities:
  • Cumulative Security Update For Internet Explorer Missing (MS05-025)

    Severity: Urgent
     
     
     
     
     
    5

    Qualys ID: 100026

    Vendor Reference: MS05-025, 883939

    CVE Reference: CAN-2005-1211

    CVSS Scores:

    Threat:
    Microsoft Windows machine is missing the cumulative security update for internet explorer described in the Microsoft document MS05-025.
    Impact:
    This update fixes security vulnerabilities which could be exploited by a remote attacker.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-025 for details.
  • Microsoft HTML Help Remote Code Execution Vulnerability (MS05-026)

    Severity: Critical
     
     
     
     
     
    4

    Qualys ID: 90253

    Vendor Reference: MS05-026, 896358

    CVE Reference: CAN-2005-1208

    CVSS Scores:

    Threat:
    Microsoft Security Update MS05-026 is not installed on the target. A remote code execution vulnerability exists in HTML Help that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
    Impact:
    If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-026 for details.
  • Microsoft SMB Remote Code Execution Vulnerability (MS05-027)

    Severity: Urgent
     
     
     
     
     
    5

    Qualys ID: 90252

    Vendor Reference: MS05-027, 896422

    CVE Reference: CAN-2005-1206

    CVSS Scores:

    Threat:
    A remote code execution vulnerability exists in Server Message Block (SMB) that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.
    Impact:
    A remote attacker could exploit this vulnerability to execute arbitrary code and take complete control of the affected system.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-027 for details.
  • Microsoft Windows Web Client Service Remote Code Execution (MS05-028)

    Severity: Urgent
     
     
     
     
     
    5

    Qualys ID: 90256

    Vendor Reference: MS05-028, 896426

    CVE Reference: CAN-2005-1207

    CVSS Scores:

    Threat:
    The Web Client service allows applications to access documents on the Internet. Web Client extends the networking capability of Windows by allowing standard Win32 applications to create, read, and write files on Internet file servers by using the WebDAV protocol.
    Impact:
    A remote code execution vulnerability exists in the way that Windows processes Web Client requests that could allow an attacker who successfully exploited this vulnerable to take complete control of the affected system.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-028 for details.
  • Microsoft Outlook Web Access for Exchange Server Cross-Site Scripting Vulnerability (MS05-029)

    Severity: Serious
     
     
     
     
     
    3

    Qualys ID: 90254

    Vendor Reference: MS05-029, 895179

    CVE Reference: CAN-2005-0563

    CVSS Scores:

    Threat:
    Microsoft Security Update MS05-029 is not installed on the target. This is a cross-site scripting vulnerability. The cross-site scripting vulnerability could allow an attacker to convince a user to run a malicious script. Attempts to exploit this vulnerability require user interaction.
    Impact:
    If the malicious script is run it would execute in the security context of the user. This vulnerability could allow an attacker access to any data on the Outlook Web Access server that was accessible to the individual user.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-029 for details.
  • Outlook Express News Reading Vulnerability (MS05-030)

    Severity: Serious
     
     
     
     
     
    3

    Qualys ID: 90258

    Vendor Reference: MS05-030, 897715

    CVE Reference: CAN-2005-1213

    CVSS Scores:

    Threat:
    A remote code execution vulnerability exists in Outlook Express when it is used as a newsgroup reader. An attacker could exploit the vulnerability by constructing a malicious newsgroup server that could that potentially allow remote code execution if a user queried the server for news.
    Impact:
    An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, user interaction is required to exploit this vulnerability.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-030 for details.
  • Microsoft Step-by-Step Interactive Training Could Allow Remote Code Execution (MS05-031)

    Severity: Critical
     
     
     
     
     
    4

    Qualys ID: 90257

    Vendor Reference: MS05-031, 898458

    CVE Reference: CAN-2005-1212

    CVSS Scores:

    Threat:
    The Step-by-Step Interactive Training has a remote code execution vulnerability that could allow an attacker to take complete control of an affected system.
    Impact:
    If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. However, user interaction is required to exploit this vulnerability.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-031 for details.
  • Microsoft Agent Content-Spoofing Vulnerability (MS05-032)

    Severity: Serious
     
     
     
     
     
    3

    Qualys ID: 90259

    Vendor Reference: MS05-032, 890046

    CVE Reference: CAN-2005-1214

    CVSS Scores:

    Threat:
    Microsoft Agent is a software technology that enables an enriched form of user interaction that can make using and learning to use a computer easier. A vulnerability exists in Microsoft Agent that could enable an attacker to spoof trusted Internet content.
    Impact:
    Users could believe that they are accessing trusted Internet content. However, they are accessing malicious Internet content such as a malicious Web site. An attacker would first have to persuade a user to visit the attacker's site to attempt to exploit this vulnerability.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-032 for details.
  • Vulnerability in Microsoft Windows Telnet Client Could Allow Information Disclosure (MS05-033)

    Severity: Serious
     
     
     
     
     
    3

    Qualys ID: 90260

    Vendor Reference: MS05-033, 896428

    CVE Reference: CAN-2005-1205

    CVSS Scores:

    Threat:
    The target Microsoft Windows is missing a security update described in Microsoft Security Advisory MS05-033. This update fixes a vulnerability in the telnet client that could lead to information disclosure.
    Impact:
    An attacker could exploit this issue to read telnet session variables remotely.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-033 for details.
  • Microsoft ISA Server 2000 Cumulative Update Missing (MS05-034)

    Severity: Serious
     
     
     
     
     
    3

    Qualys ID: 90255

    Vendor Reference: MS05-034, 899753

    CVE Reference: CAN-2005-1215

    CVSS Scores:

    Threat:
    Microsoft ISA Server 2000 at the target machine is missing the cumulative update described in the Microsoft Security Bulletin MS05-034.
    Impact:
    This update fixes issues which could be exploited by an attacker to gain escalated privileges on the vulnerable system.
    Solution:
    Microsoft has released a patch for this vulnerability. Check Microsoft Security Bulletin MS05-034 for details.

These new vulnerability checks are included in Qualys vulnerability signature v.1.11.46-6. Each QualysGuard account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the QualysGuard HOME menu, select the Account Info tab.

SELECTIVE SCAN INSTRUCTIONS USING QUALYSGUARD:
To perform a selective vulnerability scan, configure a scan profile use the following options:
  1. Enable scanning of TCP ports 135 and 139
  2. Enable Windows Authentication (specify Authentication records)
  3. Enable the following Qualys IDs:
    • 90252
    • 90253
    • 90254
    • 90255
    • 90256
    • 90257
    • 90258
    • 90259
    • 90260
    • 100026
  4. If you would like the scan to return the Windows Hostname, also include QID 82044 and enable scanning of UDP port 137
  5. If you would like to be notified if Authentication is unable to logon to a host, also include QID 105015
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Matrix Report, available from the QualysGuard HOME page.

TECHNICAL SUPPORT:

For more information, customers may contact Qualys Technical Support directly at support@qualys.com or by telephone toll free at:
US: 1 866.801.6161 | UK: +44 (0) 118 913 1502
https://www.qualys.com/support

ABOUT QUALYS:

The Qualys Cloud Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, pci compliance, questionnaire service, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.

Access for Qualys customers: https://qualysguard.qualys.com

Free trial of Qualys: https://www.qualys.com/trial

Qualys Solutions
Qualys Community
Free Trial & Tools
Free Trial

Nothing to install or download!

1 (800) 745 4355