BULLETINS AFFECT SMB2, WINDOWS MEDIA PLAYER, IIS FTP, AND MORE
SEVERITY: HIGH
13 October, 2009
SUMMARY:
- These vulnerabilities affect: All current versions of Windows and components that ship with it – also the .NET Framework and Silverlight
- How an attacker exploits them: Multiple vectors of attack, including sending specially crafted packets or enticing your users to view malicious media
- Impact: Various results; in the worst case, an attacker can gain complete control of your Windows computer
- What to do: Install the appropriate Microsoft patches immediately, or use Windows’ automatic update features to download these patches automatically
Today, Microsoft released eleven security bulletins describing 27 vulnerabilities that affect Windows and components that ship with it. Each vulnerability affects different versions of Windows to varying degrees. Some of the flaws also affect other Microsoft products, such as Silverlight, SQL Server, Office, and Microsoft’s Developer Tools. A remote attacker could exploit the worst of these flaws to gain complete control of your Windows PC. The summary below lists the vulnerabilities, in order from highest to lowest severity. Six of Eleven Windows Vulnerabilities Rated Critical
BULLETINS AFFECT SMB2, WINDOWS MEDIA PLAYER, IIS FTP, AND MORE
SEVERITY: HIGH
13 October, 2009
SUMMARY:
- These vulnerabilities affect: All current versions of Windows and components that ship with it – also the .NET Framework and Silverlight
- How an attacker exploits them: Multiple vectors of attack, including sending specially crafted packets or enticing your users to view malicious media
- Impact: Various results; in the worst case, an attacker can gain complete control of your Windows computer
- What to do: Install the appropriate Microsoft patches immediately, or use Windows’ automatic update features to download these patches automatically
Today, Microsoft released eleven security bulletins describing 27 vulnerabilities that affect Windows and components that ship with it. Each vulnerability affects different versions of Windows to varying degrees. Some of the flaws also affect other Microsoft products, such as Silverlight, SQL Server, Office, and Microsoft’s Developer Tools. A remote attacker could exploit the worst of these flaws to gain complete control of your Windows PC. The summary below lists the vulnerabilities, in order from highest to lowest severity.
- MS09-050: SMBv2 Code Execution Vulnerabilities
Microsoft rating: Critical.
- MS09-051: Two Windows Media Runtime Code Execution Vulnerabilities
Microsoft rating: Critical.
- MS09-052: Windows Media Player Buffer Overflow Vulnerability
Microsoft rating: Critical
- MS09-062: Multiple GDI+ Code Execution Vulnerabilities
- NET Framework
- Internet Explorer
- Microsoft Office and other Office software
- SQL Server
- Developer Tools
- and Forefront Client Security.
Microsoft rating: Critical.
- MS09-055: Cumulative ActiveX Killbit Update
Microsoft rating: Critical.
- MS09-061: Three .NET Framework Code Execution Flaws.
Microsoft rating: Critical
- MS09-053: IIS FTP Service Remote Code Execution and DoS Vulnerability.
Microsoft rating: Important.
- MS09-058: Three Windows Kernel Elevation of Privilege Vulnerabilities
Microsoft rating: Important.
- MS09-057: Indexing Service Memory Corruption Vulnerability
Microsoft rating: Important
- MS09-059: LSASS Denial of Service (DoS) Vulnerability
-
The Local Security Authority Subsystem Service (LSASS) is a Windows component that handles authentication and enforces security policies. LSASS suffers from an integer underflow flaw that results in a Denial of Service (DoS) vulnerability. By sending maliciously crafted packets during the authentication process, an attacker could exploit this flaw to cause your Windows computer to reboot. However, most administrators don’t allow authentication traffic to pass beyond their local network. This flaw only poses a marginal internal risk.
Microsoft rating: Important.- MS09-056: CryptoAPI Spoofing Vulnerabilities
-
CryptoAPI is the component that provides basic cryptographic services to Windows, such as encryption, authentication, and digital certificate handling. CryptoAPI suffers from two vulnerabilities which could allow an attacker to create a digital certificate that impersonates another user or system. For instance, the attacker could leverage this flaw to create a certificate that appeared to belong to http://www.paypal.com, when in reality it belongs to the attacker. By either enticing you to his malicious website, or leveraging some other DNS vulnerability that forwards you to his website, an attacker could leverage this certificate spoofing vulnerability to convince you that his malicious site really belongs to some trusted entity.
Microsoft rating: Important.
SOLUTION PATH:
Microsoft has released patches for Windows which correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.
MS09-050:- Windows Vista
- Windows Vista x64
- Windows Server 2008
- Windows Server 2008 x64
- Windows Server 2008 Itanium
- Microsoft Windows 2000
- DirectShow WMA Voice Codec
- Windows Media Audio Voice Decoder
- Audio Compression Manager
- Windows XP
- DirectShow WMA Voice Codec
- Windows Media Audio Voice Decoder for SP2
- Windows Media Audio Voice Decoder for SP3
- Audio Compression Manager
- Windows XP Professional x64
- DirectShow WMA Voice Codec
- Windows Media Audio Voice Decoder
- Windows Media Audio Voice Decoder in Windows Media Format SDK 9.5 x64 Edition
- Windows Media Audio Voice Decoder in Windows Media Format SDK 11
- Audio Compression Manager
- Windows Server 2003
- DirectShow WMA Voice Codec
- Windows Media Audio Voice Decoder
- Audio Compression Manager
- Windows Server 2003 x64
- DirectShow WMA Voice Codec
- Windows Media Audio Voice Decoder
- Windows Media Audio Voice Decoder in Windows Media Format SDK 9.5 x64 Edition
- Audio Compression Manager
- Windows Vista
- Windows Media Audio Voice Decoder
- Windows Vista x64
- Windows Media Audio Voice Decoder
- Windows Server 2008
- Windows Media Audio Voice Decoder
- Windows Server 2008 x64
- Windows Media Audio Voice Decoder
- Windows Server 2000
- Microsoft Windows Media Player 6.4
- Windows XP
- Microsoft Windows Media Player 6.4
- Windows XP x64
- Microsoft Windows Media Player 6.4
- Windows Server 2003
- Microsoft Windows Media Player 6.4
- Windows Server 2003 x64
- Microsoft Windows Media Player 6.4
MS09-062:- Windows XP
- Windows XP x64
- Windows Server 2003
- Windows Server 2003 x64
- Windows Server 2003 Itanium
- Windows Vista
- Windows Vista x64
- Windows Server 2008*
- Windows Server 2008 x64*
- Windows Server 2008 Itanium
As mentioned in the Exposure section above, these GDI+ vulnerabilities affect many other Microsoft products, including Office and SQL Server. We highly recommend you visit the “Affected and Non-Affected Software” section of Microsoft’s GDI+ bulletin to find and download any other relevant patches for your organization.
MS09-055:- Windows 2000
- Windows XP
- Windows XP x64
- Windows Server 2003
- Windows Server 2003 x64
- Windows Server 2003 Itanium
- Windows Vista
- Windows Vista x64
- Windows Server 2008
- Windows Server 2008 x64
- Windows Server 2008 Itanium
- Windows 7
- Windows 7 x64
- Windows Server 2008 R2 x64
- Windows Server 2008 R2 Itanium
We recommend you see the “Affected Software” section of this Microsoft bulletin to find all the potential .NET framework patches. With all the different versions of .NET Framework, combined with the different Windows and Framework Service Pack variants, there are actually many confusing possibilities for which patches to apply. If it fits your organization’s policy, we highly recommend you use Windows’ automatic update feature to download the right patch.
MS09-053:- Windows 2000
- IIS 5.0 (FTP Service 5.0)
- Windows XP
- IIS 5.1 (FTP Service 5.1)
- Windows XP x64
- IIS 5.1 (FTP Service 5.1)
- Windows Server 2003
- IIS 6.0 (FTP Service 6.0)
- Windows Server 2003 x64
- IIS 6.0 (FTP Service 6.0)
- Windows Server 2003 Itanium
- IIS 6.0 (FTP Service 6.0)
- Windows Vista
- IIS 7.0 (FTP Service 6.0)
- Windows Vista x64
- IIS 7.0 (FTP Service 6.0)
- Windows Server 2008
- IIS 7.0 (FTP Service 6.0)
- Windows Server 2008 x64
- IIS 7.0 (FTP Service 6.0)
- Windows Server 2008 Itanium
- IIS 7.0 (FTP Service 6.0)
- Windows 2000
- Windows XP
- Windows XP x64
- Windows Server 2003
- Windows Server 2003 x64
- Windows Server 2003 Itanium
- Windows Vista
- Windows Vista x64
- Windows Server 2008
- Windows Server 2008 x64
- Windows Server 2008 Itanium
- Windows 2000
- Windows XP
- Windows XP x64
- Windows Server 2003
- Windows Server 2003 x64
- Windows Server 2003 Itanium
- Windows XP
- Windows XP x64
- Windows Server 2003
- Windows Server 2003 x64
- Windows Server 2003 Itanium
- Windows Vista
- Windows Vista x64
- Windows Server 2008
- Windows Server 2008 x64
- Windows Server 2008 Itanium
- Windows 7
- Windows 7 x64
- Windows Server 2008 R2 x64
- Windows Server 2008 R2 Itanium
- Windows 2000
- Windows XP
- Windows XP x64
- Windows Server 2003
- Windows Server 2003 x64
- Windows Server 2003 Itanium
- Windows Vista
- Windows Vista x64
- Windows Server 2008
- Windows Server 2008 x64
- Windows Server 2008 Itanium
- Windows 7
- Windows 7 x64
- Windows Server 2008 R2 x64
- Windows Server 2008 R2 Itanium
By default, your WatchGuard Firebox blocks the network traffic associated with many of these attacks. However, attackers leverage some of the attacks locally, or by sending normal-looking HTTP traffic. Therefore, the patches above are your best solution.
STATUS:
Microsoft has released patches correcting these issues.
REFERENCES:- Microsoft Security Bulletin MS09-050
- Microsoft Security Bulletin MS09-051
- Microsoft Security Bulletin MS09-052
- Microsoft Security Bulletin MS09-053
- Microsoft Security Bulletin MS09-055
- Microsoft Security Bulletin MS09-056
- Microsoft Security Bulletin MS09-057
- Microsoft Security Bulletin MS09-058
- Microsoft Security Bulletin MS09-059
- Microsoft Security Bulletin MS09-061
- Microsoft Security Bulletin MS09-062
-
CryptoAPI is the component that provides basic cryptographic services to Windows, such as encryption, authentication, and digital certificate handling. CryptoAPI suffers from two vulnerabilities which could allow an attacker to create a digital certificate that impersonates another user or system. For instance, the attacker could leverage this flaw to create a certificate that appeared to belong to http://www.paypal.com, when in reality it belongs to the attacker. By either enticing you to his malicious website, or leveraging some other DNS vulnerability that forwards you to his website, an attacker could leverage this certificate spoofing vulnerability to convince you that his malicious site really belongs to some trusted entity.
- MS09-056: CryptoAPI Spoofing Vulnerabilities
-
The Local Security Authority Subsystem Service (LSASS) is a Windows component that handles authentication and enforces security policies. LSASS suffers from an integer underflow flaw that results in a Denial of Service (DoS) vulnerability. By sending maliciously crafted packets during the authentication process, an attacker could exploit this flaw to cause your Windows computer to reboot. However, most administrators don’t allow authentication traffic to pass beyond their local network. This flaw only poses a marginal internal risk.