Microsoft security alert.
April 8, 2008
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 10 vulnerabilities that were fixed in 8 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 8 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Project Could Allow Remote Code Execution (MS08-018)
- Severity
- Critical 4
- Qualys ID
- 110077
- Vendor Reference
- MS08-018
- CVE Reference
- CVE-2008-1088
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Project is a project management software program to assist project managers.
The application is prone to a remote code execution issue due to insufficent validation of memory resources when opening Project files.
- Consequence
- An attacker who successfully exploits this vulnerability could run arbitrary code on the affected system as the logged on user.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Project 2000 Service Release 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=fbe46241-b9da-40c6-803d-42eb6234be77Microsoft Project 2002 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=07a90718-6597-426d-9dca-a336d60c01b8Microsoft Project 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=aaba07d6-e972-4e85-bccd-406aa2c4a4f4Refer to Micrsoft Security Bulletin MS08-018 for further details.
-
Microsoft Visio Could Allow Remote Code Execution (MS08-019)
- Severity
- Critical 4
- Qualys ID
- 110078
- Vendor Reference
- MS08-019
- CVE Reference
- CVE-2008-1089, CVE-2008-1090
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Microsoft Visio is diagramming software.
The application is prone multiple remote code execution vulnerabilities. The security update addresses the following issues:
-Memory validation issue when loading specially-crafted .DXF files from disk into memory.
-Object header validation issue due to improper validation of object header data when opening Visio files. - Consequence
- An attacker who successfully exploits this vulnerability could run arbitrary code on the affected system as the logged on user.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Visio 2002 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0056a936-def5-40fa-bcfc-0ab0dd5c3964Microsoft Visio 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=18af0ce6-99a0-4471-8d26-9700a8a8e631Microsoft Visio 2003 Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?FamilyId=18af0ce6-99a0-4471-8d26-9700a8a8e631Microsoft Visio 2007:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0510a1bb-b464-452c-900f-7f4e58ed9c7eMicrosoft Visio 2007 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0510a1bb-b464-452c-900f-7f4e58ed9c7eRefer to Micrsoft Security Bulletin MS08-019 for further details.
-
Microsoft Vulnerability in DNS Client Could Allow Spoofing (MS08-020)
- Severity
- Critical 4
- Qualys ID
- 90432
- Vendor Reference
- MS08-020
- CVE Reference
- CVE-2008-0087
- CVSS Scores
- Base 8.8 / Temporal 6.5
- Description
-
This is an important security update which addresses a privately reported vulnerability in Windows DNS clients which could allow spoofing in Windows Vista, Microsoft Windows 2000, Windows XP, and Windows Server 2003.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
April Security Updates are Available (KB945553)
- Consequence
- Successful exploitation could allow an attacker to send specially crafted responses to DNS requests, thereby spoofing or redirecting Internet traffic from legitimate locations.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=41326ade-96b6-47ce-9291-d4e3039471c4Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyID=893f4cef-0395-4c44-ba28-7a10b6e7dd48Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyID=8fdd1207-6e93-4c43-bacc-fe3623a6ebe7Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=214bd8f5-6eb2-414c-b013-c516a306d692Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=fd123394-a5d6-4b55-be74-2938f52ce922Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=e0e63f03-904d-47ee-94fc-51a8dea668ebWindows Vista:
http://www.microsoft.com/downloads/details.aspx?FamilyID=8203d303-c855-4579-9bbf-b06ddf5c1b87Windows Vista x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyID=73f3a234-3973-4467-be7e-69efa7ee978cRefer to Micrsoft Security Bulletin MS08-020 for further details.
-
Microsoft Windows GDI Could Allow Remote Code Execution (MS08-021)
- Severity
- Critical 4
- Qualys ID
- 90434
- Vendor Reference
- MS08-021
- CVE Reference
- CVE-2008-1083, CVE-2008-1087
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
A remote code execution vulnerability exists in the way that GDI handles integer calculations.
Another remote code execution vulnerability exists in the way that GDI handles filename parameters in EMF files.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
April Security Updates are Available (KB948590)
- Consequence
- The vulnerability could allow remote code execution if a user opens a specially crafted EMF or WMF image file.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=caac000a-22b6-48cb-aa00-1a0bfe886de2Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=c2763dd8-a03e-4a48-aa86-a7ec00250a7aWindows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=166f2ab5-913c-47a9-86fe-b814797b751eWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=bee91d80-d49a-4d3d-82d6-d5aa63f54979Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=e3dde449-e062-4ce0-a9f4-433bff23e224Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=7886a802-f2b5-489c-b14b-631f4c4c0742Windows Vista and Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=9b51deb8-3873-4146-977f-7e3d0840a4c5Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=4ad6dcd1-6ea5-43bf-8bee-a5f507beadc6Windows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=006d5c47-53e6-4ee1-932c-497611804938Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=8909f144-655b-4f07-916f-fd967f1efb2bWindows Server 2008 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=b7771a4a-4e4f-48d1-8551-bb8b778ca5a7Refer to Micrsoft Security Bulletin MS08-021 for further details.
-
VBScript and JScript Scripting Engines Could Allow Remote Code Execution (MS08-022)
- Severity
- Urgent 5
- Qualys ID
- 90431
- Vendor Reference
- MS08-022
- CVE Reference
- CVE-2008-0083
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
This security update resolves a privately reported vulnerability in the VBScript and JScript scripting engines in Windows.
A remote code execution vulnerability exists in the way that the VBScript and JScript scripting engines decode script in Web pages. This vulnerability can be exploited when a user opens a specially crafted file or visits a Web site that is running specially crafted script.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August 2008 Security Updates Are Now Available (KB944338)
April Security Updates are Available (KB944338)
- Consequence
- If a user is logged on with administrative user rights, an attacker could take complete control of an affected system. A user may exploit this vulnerability to install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (VBScript 5.1 and JScript 5.1):
http://www.microsoft.com/downloads/details.aspx?FamilyID=8e3ff44f-145b-4a68-9ad4-4a55d74b216eMicrosoft Windows 2000 Service Pack 4 (VBScript 5.6 and JScript 5.6):
http://www.microsoft.com/downloads/details.aspx?FamilyID=8e3ff44f-145b-4a68-9ad4-4a55d74b216eWindows XP Service Pack 2 (VBScript 5.6 and JScript 5.6):
http://www.microsoft.com/downloads/details.aspx?FamilyID=c0124698-3b94-4474-9473-22a2f39a4a56Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (VBScript 5.6 and JScript 5.6):
http://www.microsoft.com/downloads/details.aspx?FamilyID=87b80ae3-e299-4d15-a135-3b1bcf943652Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (VBScript 5.6 and JScript 5.6):
http://www.microsoft.com/downloads/details.aspx?FamilyID=88518aa6-e334-4529-aa63-0bf2ef417ce3Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 (VBScript 5.6 and JScript 5.6):
http://www.microsoft.com/downloads/details.aspx?FamilyID=12cefefc-8553-4dca-9850-c653371de61eWindows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium based Systems (VBScript 5.6 and JScript 5.6):
http://www.microsoft.com/downloads/details.aspx?FamilyID=fe22a828-cca4-4b51-bbd5-995c65fead21Refer to Micrsoft Security Bulletin MS08-022 for further details.
-
Microsoft Security Update of ActiveX Kill Bits (MS08-023)
- Severity
- Critical 4
- Qualys ID
- 90433
- Vendor Reference
- MS08-023
- CVE Reference
- CVE-2008-1086
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
A remote code execution vulnerability exists in the ActiveX control hxvz.dll. This update also includes a kill bit for the Yahoo! Music Jukebox product. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
April Security Updates are Available (KB948881)
- Consequence
- An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploits this vulnerability could gain the same user rights as the logged on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 5.01 Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=0395451F-B719-4F71-A7B4-403D0C7E8FCCMicrosoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=BA6D3AEB-E35A-47CC-BACE-7BD9D58A9D3FWindows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9DBF002F-FE53-4CC7-A430-35F45C520D10Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=01400970-DF68-4DAF-AA39-2FC4F969974CWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=AD384FEA-53BE-4BE3-8ACB-1CD23A7F5405Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=FFC5C893-CB24-4875-B0A7-6D5C7AA4D642Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=94CF78D3-B6C3-41BC-993E-3AF3BE0D70F1Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=D33462B6-7391-482D-BABE-FB4CD0BEAA21Windows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=95691924-2813-4A86-9E11-99D853F8E606Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=920AE29B-19D0-4089-AC79-F2DA824A2256For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS08-023.
-
Internet Explorer Cumulative Security Update (MS08-024)
- Severity
- Critical 4
- Qualys ID
- 100056
- Vendor Reference
- MS08-024
- CVE Reference
- CVE-2008-1085
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
A remote code execution vulnerability exists in Internet Explorer because of the way that it processes data streams.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
April Security Updates are Available (KB947864)
- Consequence
- The attacker can execute remote code using a specially crafted Web page.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 5.01 Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=B051AE04-FE81-440D-9136-D6B239CA954EMicrosoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=75D2DC78-E3A4-4FF6-9E2D-BF1935003E8EWindows XP Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=36C641AD-953F-4B09-BA1C-9C383295E180Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=85BEACC0-8CA2-4DED-9C24-23348D05C735Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=0444B76E-93FA-43C2-B1BC-A5C054529EB5Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5EBB5EF9-615F-4CAB-BAC5-6F45F1B94952Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=63DA8040-FDA2-42C7-8543-26AD6F9811F2Windows XP Service Pack 2 and Windows XP Service Pack 3 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=E771EFE8-8881-4F23-B5B0-15651A390BA9Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=9364BF81-6505-4788-958D-A4BD29DC98ADWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=9ACD2A03-5530-49C8-9EA1-0BFAF259700DFor a complete list of patch download links, please refer to Micrsoft Security Bulletin MS08-024.
-
Windows Kernel Vulnerability Could Allow Elevation of Privilege (MS08-025)
- Severity
- Critical 4
- Qualys ID
- 90430
- Vendor Reference
- MS08-025
- CVE Reference
- CVE-2008-1084
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
This security update resolves a privately reported vulnerability in the Windows kernel.
An attacker who exploits this vulnerability can be allowed to gain complete control of the affected system.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
April Security Updates are Available (KB941693)
- Consequence
- An attacker may exploit this vulnerability to install programs; view, change, or delete data; or create new accounts.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=8db9f328-da0e-4fb8-96c4-6d368b47c224Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=0e937f65-abd0-46dd-8883-5bfd70ea1178Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=a29bbd13-761f-44fa-8948-e1a8c244bd7aWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=d3b855a6-4648-4771-826d-11a151828eacWindows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=320fd100-35e1-4345-9399-796393235cbcWindows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=126426a7-be38-4327-89db-02d99d76589dWindows Vista and Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=9640cd8b-d749-4ddd-8af9-b298cebed969Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=d56bb4fe-304e-45e0-95f2-fde2f47b2a04Windows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=4497333c-9418-4b91-83dc-0155735421c0Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=5aefc7a6-79a4-45a2-b534-35d0ec400ddaWindows Server 2008 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=3080c26b-7456-41ef-8668-28f15bc7b8ceRefer to Micrsoft Security Bulletin MS08-025 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.19.108-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 110077
- 110078
- 90432
- 90434
- 90431
- 90433
- 100056
- 90430
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.