Microsoft security alert.
November 8, 2011
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 4 vulnerabilities that were fixed in 4 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 4 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (MS11-083)
- Severity
- Urgent 5
- Qualys ID
- 90753
- Vendor Reference
- MS11-083
- CVE Reference
- CVE-2011-2013
- CVSS Scores
- Base 10 / Temporal 7.8
- Description
-
TCP/IP is a set of networking protocols that are widely used on the Internet. TCP/IP provides communication across interconnected networks of computers that have diverse hardware architectures and that run various operating systems.
A remote code execution vulnerability exists in the Windows TCP/IP stack when processing a continuous flow of crafted UDP packets, resulting in an integer overflow.
Affected Software:
Microsoft Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2This security update is rated Critical.
- Consequence
- Successfully exploiting this vulnerability might allow a remote attacker to take complete control of the affected system.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-083 for further details.
-
Microsoft Windows Kernel-Mode Drivers Denial of Service Vulnerability (MS11-084)
- Severity
- Serious 3
- Qualys ID
- 90751
- Vendor Reference
- MS11-084
- CVE Reference
- CVE-2011-2004
- CVSS Scores
- Base 7.1 / Temporal 5.6
- Description
-
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a user opens a specially crafted TrueType font file as an email attachment or navigates to a network share or WebDAV location containing a specially crafted TrueType font file.
Affected Software:
Windows 7
Windows 2008 R2This security update is rated Moderate.
- Consequence
- An attacker that successfully exploits this vulnerability could cause the target system to stop responding and restart.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-084 for further details.
-
Microsoft Windows Mail and Windows Meeting Space Remote Code Execution Vulnerability (MS11-085)
- Severity
- Critical 4
- Qualys ID
- 90752
- Vendor Reference
- MS11-085
- CVE Reference
- CVE-2011-2016
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
Windows Mail (formerly Outlook Express) is an online communication tool for use with Windows and Windows Meeting Space gives the ability to share documents, programs, or desktop with other people whose computers are running Windows Vista.
A remote code execution vulnerability exists in the way that Windows Mail and Windows Meeting Space handle the loading of DLL files (CVE-2011-2016).
Affected Software:
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2This security update is rated Important for all supported editions of Windows Vista; is rated Moderate for all supported editions of Windows Server 2008; and is rated Low for all supported editions of Windows 7 and Windows Server 2008 R2.
- Consequence
- Successfully exploiting this vulnerability might allow a remote attacker to execute arbitrary code.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-085 for further details.
-
Microsoft Active Directory Elevation of Privilege Vulnerability (MS11-086)
- Severity
- Urgent 5
- Qualys ID
- 90754
- Vendor Reference
- MS11-086
- CVE Reference
- CVE-2011-2014
- CVSS Scores
- Base 9 / Temporal 6.7
- Description
-
Active Directory Services contains an extensible and scalable set of services that enables you to efficiently manage corporate identities, credentials, information protection, and system and application settings.
An elevation of privilege vulnerability exists in Active Directory when Active Directory is configured to use LDAPS and fails to validate the revocation status of an SSL certificate against the CRL associated with the domain account. This allows a certificate to be accepted as valid even after it has been revoked by the certification authority (CA). (CVE-2011-2014)
Affected Software:
Windows XP Service Pack 3 (Active Directory Application Mode (ADAM))
Windows XP Professional x64 Edition Service Pack 2 (Active Directory Application Mode (ADAM))
Windows Server 2003 Service Pack 2 (Active Directory, Active Directory Application Mode (ADAM))
Windows Server 2003 x64 Edition Service Pack 2 (Active Directory, Active Directory Application Mode (ADAM))
Windows Vista Service Pack 2 (Active Directory Lightweight Directory Service (AD LDS))
Windows Vista x64 Edition Service Pack 2(Active Directory Lightweight Directory Service (AD LDS))
Windows Server 2008 for 32-bit Systems Service Pack 2 (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows Server 2008 for x64-based Systems Service Pack 2 (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows 7 for 32-bit Systems (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows 7 for 32-bit Systems Service Pack 1 (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows 7 for x64-based Systems (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows 7 for x64-based Systems Service Pack 1 (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows Server 2008 R2 for x64-based Systems (Active Directory and Active Directory Lightweight Directory Service (AD LDS))
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Active Directory and Active Directory Lightweight Directory Service (AD LDS))This security update is rated Important.
- Consequence
- An attacker who successfully exploits this vulnerability could obtain access to network resources or run code under the privileges of a specific authorized user. If the user has administrator privileges, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Patch:
Following are links for downloading patches to fix the vulnerabilities:Windows XP Service Pack 3 (Active Directory Application Mode (ADAM))
Windows XP Professional x64 Edition Service Pack 2 (Active Directory Application Mode (ADAM))
Windows Server 2003 Service Pack 2 (Active Directory)
Windows Server 2003 Service Pack 2 (Active Directory Application Mode )
Windows Server 2003 x64 Edition Service Pack 2 (Active Directory)
Windows Server 2003 x64 Edition Service Pack 2 (Active Directory Application Mode )
Windows Server 2003 with SP2 for Itanium-based Systems (Active Directory)
Windows Vista Service Pack 2 (Active Directory Lightweight Directory Service (AD LDS))
Windows Vista x64 Edition Service Pack 2 (Active Directory Lightweight Directory Service (AD LDS))
Windows 7 for 32-bit Systems (Active Directory Lightweight Directory Service (AD LDS))
Windows 7 for x64-based Systems (Active Directory Lightweight Directory Service (AD LDS))
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-086.
These new vulnerability checks are included in Qualys vulnerability signature 1.28.266-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 90753
- 90751
- 90752
- 90754
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.