Microsoft security alert.
October 14, 2008
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 20 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Office XP Information Disclosure Vulnerability (MS08-056)
- Severity
- Serious 3
- Qualys ID
- 110089
- Vendor Reference
- MS08-056
- CVE Reference
- CVE-2008-4020
- CVSS Scores
- Base 4.3 / Temporal 3.2
- Description
- An information disclosure vulnerability exists in Microsoft Office XP Service Pack 3 when the Office application processes documents using the CDO Protocol and the Content-Disposition: Attachment header.
- Consequence
- An attacker who successfully exploits this vulnerability could inject a client side script in the user's browser that could spoof content or disclose information.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=b1aee2d5-bfa0-40e3-91b6-98bf65524e8cRefer to Micrsoft Security Bulletin MS08-056 for further details.
-
Microsoft Excel Remote Code Execution Vulnerability (MS08-057)
- Severity
- Critical 4
- Qualys ID
- 110088
- Vendor Reference
- MS08-057
- CVE Reference
- CVE-2008-3471, CVE-2008-3477, CVE-2008-4019
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
Microsoft Excel is prone to multiple remote code execution vulnerabilities. The security update addresses the following issues:
- Calendar Object Validation Vulnerability (CVE-2008-3477) due to insufficient validation of data in the VBA Performance Cache.
- File Format Parsing Vulnerability (CVE-2008-3471) due to improper memory allocation when loading Excel Objects.
- Formula Parsing Vulnerability (CVE-2008-4019) due to insufficent handling when parsing Excel documents containing crafted fomulas inside a cell.
- Consequence
- An attacker who successfully exploits these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Office 2000 Service Pack 3 (Excel 2000 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=1b2740e0-ecdd-48ca-84e0-eb187c31eb16Microsoft Office XP Service Pack 3 (Excel 2002 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=27cedef1-c47c-472c-a343-cd9b4ebc2bbaMicrosoft Office 2003 Service Pack 2 (Excel 2003 Service Pack 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4df27e8a-d803-483b-a700-0177d71bf368Microsoft Office 2003 Service Pack 3 (Excel 2003 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4df27e8a-d803-483b-a700-0177d71bf3682007 Microsoft Office System (Excel 2007):
http://www.microsoft.com/downloads/details.aspx?FamilyId=2765bbc0-ea2e-4b6e-822c-222ee8e5021f2007 Microsoft Office System Service Pack 1 (Excel 2007 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=2765bbc0-ea2e-4b6e-822c-222ee8e5021fMicrosoft Office Excel Viewer 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9769ce08-5207-4c63-b7b9-536266ad6b2bMicrosoft Office Excel Viewer 2003 Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9769ce08-5207-4c63-b7b9-536266ad6b2bMicrosoft Office Excel Viewer:
http://www.microsoft.com/downloads/details.aspx?FamilyId=83c88444-75b8-44d1-b280-3671394ade45Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9a7be004-5903-4101-90c5-c0d5f8722af9Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9a7be004-5903-4101-90c5-c0d5f8722af9Microsoft Office SharePoint Server 2007:
http://www.microsoft.com/downloads/details.aspx?FamilyId=5c29e646-504c-4455-9d35-9a1bed6d7535For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS08-057.
-
Microsoft Internet Explorer Cumulative Security Update (MS08-058)
- Severity
- Critical 4
- Qualys ID
- 100063
- Vendor Reference
- MS08-058
- CVE Reference
- CVE-2008-2947, CVE-2008-3472, CVE-2008-3473, CVE-2008-3474, CVE-2008-3475, CVE-2008-3476
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
This critical security update resolves vulnerabilities existing in Microsoft Internet Explorer, including the following: Window location property cross-domain vulnerability, HTML element cross-domain vulnerability, event handling cross-domain vulnerability, uninitialized memory corruption and HTML objects memory corruption vulnerability.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2008 Updates are Available (including for XPe SP3 and Standard) (KB956390)
The November 2008 Security Updates (DQI) are Now Available for Download from the ECE. (KB956390)
October 2008 Security Updates Include a Bonus (KB956390)
- Consequence
- These vulnerabilities could allow remote code execution if a user views a specially-crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 5.01 Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?familyid=257C0478-56DD-42EB-A90E-607D01613DB7Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?familyid=02390258-08E9-4B75-960D-BE081B749558Windows XP Service Pack 2 and Windows XP Service Pack 3 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?familyid=A7F0F47B-B1EE-4516-9FBF-BF8E579963D0Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?familyid=234C05FB-988B-4E02-AAB6-BB23E447DF3DWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?familyid=AE8D22D5-20AA-471D-A423-F54C9D75FEBEWindows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?familyid=07FC88C4-2571-4A4D-B573-AE576798AB4CWindows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?familyid=B68937AF-F04A-4D1E-9D7F-EC92AF5194DEWindows XP Service Pack 2 and Windows XP Service Pack 3 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?familyid=4E73DE2B-05E6-4901-9BAC-46D8F469E635Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?familyid=CCF7A3E3-EC30-4B95-9A86-00032301513CWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?familyid=FEAF2ADF-7892-4DBF-A147-DB4D5DBE52F3For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS08-058.
-
Microsoft Host Integration Server RPC Service Remote Code Execution Vulnerability (MS08-059)
- Severity
- Urgent 5
- Qualys ID
- 90457
- Vendor Reference
- MS08-059
- CVE Reference
- CVE-2008-3466
- CVSS Scores
- Base 10 / Temporal 7.8
- Description
- A remote code execution vulnerability exists in Microsoft Host Integration Server versions 2000, 2004 and 2006.
- Consequence
- The vulnerability could allow remote code execution if an attacker sends a specially-crafted Remote Procedure Call (RPC) request to an affected system. Customers who follow best practices and configure the SNA RPC service account to have fewer user rights on the system could be less impacted than customers who configure the SNA RPC service account to have administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Host Integration Server 2000 Service Pack 2 (Server):
http://www.microsoft.com/downloads/details.aspx?familyid=11CCA58B-59A4-4E93-9EB1-19B07C290A10Microsoft Host Integration Server 2000 Administrator Client:
http://www.microsoft.com/downloads/details.aspx?familyid=41B49291-1231-4E23-AEF7-818207453D56Microsoft Host Integration Server 2004 (Server):
http://www.microsoft.com/downloads/details.aspx?familyid=9CA255ED-9334-4848-AF94-49EF3078CDC0Microsoft Host Integration Server 2004 Service Pack 1 (Server):
http://www.microsoft.com/downloads/details.aspx?familyid=ECA756A1-CA56-4481-B23C-53C159A4E08CMicrosoft Host Integration Server 2004 (Client):
http://www.microsoft.com/downloads/details.aspx?familyid=92CB54E7-F4FF-40A4-99CB-6257C4D8D4CDMicrosoft Host Integration Server 2004 Service Pack 1 (Client):
http://www.microsoft.com/downloads/details.aspx?familyid=D776515C-09AA-4A04-876D-606BFC26A006Microsoft Host Integration Server 2006 for 32-bit systems:
http://www.microsoft.com/downloads/details.aspx?familyid=1AE79DA3-EC17-4D4B-8011-D777A237AC93Microsoft Host Integration Server 2006 for x64-based systems:
http://www.microsoft.com/downloads/details.aspx?familyid=05DA4540-4976-458A-A612-7385D78695A2Refer to Microsoft Security Bulletin MS08-059 for further details.
-
Microsoft Active Directory Remote Code Execution Vulnerability (MS08-060)
- Severity
- Urgent 5
- Qualys ID
- 90461
- Vendor Reference
- MS08-060
- CVE Reference
- CVE-2008-4023
- CVSS Scores
- Base 10 / Temporal 7.8
- Description
- This security update resolves a privately reported vulnerability in implementations of Active Directory on Microsoft Windows 2000 Server. This vulnerability only affects Microsoft Windows 2000 servers configured to be domain controllers. If a Microsoft Windows 2000 server has not been promoted to a domain controller, it will not be listening to Lightweight Directory Access Protocol (LDAP) or LDAP over SSL (LDAPS) queries, and will not be exposed to this vulnerability.
- Consequence
- The vulnerability could allow remote code execution if an attacker gains access to an affected network.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Server Service Pack 4 (Active Directory):
http://www.microsoft.com/downloads/details.aspx?familyid=8ed7bb9a-4b26-49d7-8c14-60226d2bc20dRefer to Micrsoft Security Bulletin MS08-060 for further details.
-
Windows Kernel Elevation of Privileges Vulnerability (MS08-061)
- Severity
- Critical 4
- Qualys ID
- 90463
- Vendor Reference
- MS08-061
- CVE Reference
- CVE-2008-2250, CVE-2008-2251, CVE-2008-2252
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
A security vulnerability exists in the Windows kernel. A local attacker who successfully exploits this vulnerability could take complete control of an affected system
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2008 Updates are Available (including for XPe SP3 and Standard) (KB954211)
October 2008 Security Updates Include a Bonus (KB954211)
- Consequence
- An attacker may exploit this vulnerability to install programs; view, change, or delete data; or create new accounts.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=3a6165a6-d7e7-4526-9291-290caf0639b4Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=7718bf14-c26c-43f3-be67-4c79ab5b2607Windows XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=7718bf14-c26c-43f3-be67-4c79ab5b2607Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=b06d3a02-b6e4-4d40-913a-3759a31f20f3Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=6e696762-d652-4a8f-ab8f-622f9746c320Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=57ca28ea-e5e1-4191-a3d6-84aa90a3d668Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=1e6c3f81-85bb-48e6-a5af-635a7e540c93Windows Vista and Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=3483b400-cedc-441f-ba8e-594e3df89190Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=905ab030-14a5-4a3d-aa11-e8f957f6a1eaWindows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=8b97114a-71aa-47a2-b9e7-f4e158c18c80Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=6e641db2-90c8-458f-9795-3e46b70a5203Windows Server 2008 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=b6546e1c-bf7b-4354-8574-6c16fa707de0Refer to Microsoft Security Bulletin MS08-061 for further details.
-
Windows Internet Printing Service Remote Code Execution Vulnerability (MS08-062)
- Severity
- Critical 4
- Qualys ID
- 90460
- Vendor Reference
- MS08-062
- CVE Reference
- CVE-2008-1446
- CVSS Scores
- Base 9 / Temporal 7
- Description
-
A vulnerability exists in the Windows Internet Printing Service that could allow remote code execution in the context of the current user. If a user is logged on with administrative user rights, an attacker who successfully exploits this vulnerability could take complete control of an affected system.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2008 Updates are Available (including for XPe SP3 and Standard) (KB953155)
October 2008 Security Updates Include a Bonus (KB953155)
- Consequence
- An attacker could install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=8163d1f6-feb5-4f39-8134-3ed42326b822Windows XP Service Pack 2 and Windows XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=e7ef571f-c9e8-4e14-95a3-3eeaec55b784Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=3ae4b913-bff0-4974-b198-828ca10d2a87Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=437a9b68-6a0c-48c8-9348-0d6fda48aa21Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=d3df6508-a568-449d-ac97-fbf3f97b98efWindows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=748f54f1-40b9-407c-9819-909061b53743Windows Vista and Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9B5995DF-A3B8-4E81-B118-9BB057E19884Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?FamilyId=4A0FCF4B-EB8E-456A-B934-400AE18248EEWindows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=3d6290d8-1745-4bc0-9ca9-eeb1ad0be4a5Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=a33c833c-d5c5-4e37-8f89-7b9079f92e59Windows Server 2008 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=31783e88-76e2-4bc6-b4ae-308443c6d223Refer to Micrsoft Security Bulletin MS08-062 for further details.
-
Microsoft SMB Remote Code Execution Vulnerability (MS08-063)
- Severity
- Critical 4
- Qualys ID
- 90458
- Vendor Reference
- MS08-063
- CVE Reference
- CVE-2008-4038
- CVSS Scores
- Base 10 / Temporal 7.8
- Description
-
A remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol handles specially-crafted file names.
An attempt to exploit the vulnerability would require authentication because the vulnerable function is only reachable when the share type is a disk, and by default, all disk shares require authentication.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2008 Updates are Available (including for XPe SP3 and Standard) (KB957095)
October 2008 Security Updates Include a Bonus (KB957095)
- Consequence
- An attacker who successfully exploits this vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=9ED29C3A-0682-4586-BBC2-A73DEAA18E4CWindows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=2F7E5981-6EEF-4F08-86C0-C6A7607EA5D0Windows XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=2F7E5981-6EEF-4F08-86C0-C6A7607EA5D0Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?familyid=4E1675EB-6B06-48E9-9765-23A2C7737BDCWindows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=4E1675EB-6B06-48E9-9765-23A2C7737BDCWindows Server 2003 Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=DBBEBB3F-F1C7-402C-BD16-6F88DA0D042CWindows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=DBBEBB3F-F1C7-402C-BD16-6F88DA0D042CWindows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?familyid=989AC6F1-515C-467D-A200-2AABE66D9319Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=989AC6F1-515C-467D-A200-2AABE66D9319Windows Server 2003 with SP1 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=91589CFB-15BA-4DD2-9E3B-107899FBCBA6Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=91589CFB-15BA-4DD2-9E3B-107899FBCBA6Windows Vista and Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=72DD6015-25D1-45F4-A769-88AC43074B44For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS08-063.
-
Microsoft Virtual Address Descriptor Manipulation Could Allow Elevation of Privileges (MS08-064)
- Severity
- Critical 4
- Qualys ID
- 90459
- Vendor Reference
- MS08-064
- CVE Reference
- CVE-2008-4036
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
This security update resolves a privately reported vulnerability in Virtual Address Descriptor.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2008 Updates are Available (including for XPe SP3 and Standard) (KB956841)
October 2008 Security Updates Include a Bonus (KB956841)
- Consequence
- The vulnerability may allow elevation of privileges if a user runs a specially-crafted application. An attacker could eventually install programs; view, change, or delete data; or create new accounts with full administrative rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=25997b73-a640-49c1-b19e-768a18bbe22cWindows XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=25997b73-a640-49c1-b19e-768a18bbe22cWindows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=50fae854-0bde-46f8-9444-b9e0d9bfecadWindows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=e8ef3d5f-dd8e-4945-92cd-9d3e30b16667Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=c2e754f9-086a-494c-bc19-5feed7df8b65Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=5a3832ec-3f8f-42c1-a603-b1330d527547Windows Vista:
http://www.microsoft.com/downloads/details.aspx?familyid=b4212db5-093e-497d-b999-2e3780f9f7c2Windows Vista Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=b4212db5-093e-497d-b999-2e3780f9f7c2Windows Vista x64 Edition:
http://www.microsoft.com/downloads/details.aspx?familyid=c20808cb-c30a-4b53-91e5-810eb6b4b2e3Windows Vista x64 Edition Service Pack 1:
http://www.microsoft.com/downloads/details.aspx?familyid=c20808cb-c30a-4b53-91e5-810eb6b4b2e3Windows Server 2008 for 32-bit Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=ec9eeb82-0497-4c55-94bb-9a47cb3521b4Windows Server 2008 for x64-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=0bc178b8-f8ae-4f41-8f88-fb6a75be1bcaFor a complete list of patch download links, please refer to Microsoft Security Bulletin MS08-064.
-
Message Queuing Service Remote Code Execution Vulnerability (MS08-065)
- Severity
- Critical 4
- Qualys ID
- 115989
- Vendor Reference
- MS08-065
- CVE Reference
- CVE-2008-3479
- CVSS Scores
- Base 10 / Temporal 7.4
- Description
- The Message Queuing Service (MSMQ) is a messaging infrastructure and development tool for creating distributed messaging applications. A remote code execution vulnerability exists in the Message Queuing Service when it incorrectly validates input strings before passing the strings to a buffer.
- Consequence
- An attacker who successfully exploits this vulnerability could gain local system rights which could allow remote code execution.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?familyid=899e2728-2433-4ccb-a195-05b5d65e5469Refer to Micrsoft Security Bulletin MS08-065 for further details.
-
Microsoft Ancillary Function Driver Elevation of Privileges Vulnerability (MS08-066)
- Severity
- Critical 4
- Qualys ID
- 90462
- Vendor Reference
- MS08-066
- CVE Reference
- CVE-2008-3464
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
This security update resolves a privately reported vulnerability in the Microsoft Ancillary Function Driver.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
December 2008 Updates are Available (including for XPe SP3 and Standard) (KB956803)
October 2008 Security Updates Include a Bonus (KB956803)
- Consequence
- A local attacker who successfully exploits this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 2 and Windows XP Service Pack 3:
http://www.microsoft.com/downloads/details.aspx?familyid=b16d9dac-c430-4dd8-a1e5-9a614801f1d9Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=5b607efc-c6fb-4079-8478-e4f3262386d3Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=ee88ff2d-1b12-4f4c-a081-9f27a6fba074Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?familyid=ab4d94d3-458c-4946-ab7f-03a279629d25Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?familyid=63234f85-6e5d-4ef6-b7cf-d1d2c78a5517Refer to Micrsoft Security Bulletin MS08-066 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.22.31-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 110089
- 110088
- 100063
- 90457
- 90461
- 90463
- 90460
- 90458
- 90459
- 115989
- 90462
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.