Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WatchGuard: Three Important Windows Security Bulletins; One Affects SQL Server

Three Important Windows Security Bulletins; One Affects SQL Server

Severity: Medium

8 July, 2008


Summary:

§ These vulnerabilities affect: All versions of Windows; also SQL Server

§ How an attacker exploits them: Multiple vectors of attack, including sending specially crafted network traffic or enticing your users into downloading and opening malicious files

Three Important Windows Security Bulletins; One Affects SQL Server

Severity: Medium

8 July, 2008


Summary:

§ These vulnerabilities affect: All versions of Windows; also SQL Server

§ How an attacker exploits them: Multiple vectors of attack, including sending specially crafted network traffic or enticing your users into downloading and opening malicious files

§ Impact: Various results; in the worst case, attacker can gain complete control of your Windows computer

§ What to do: Install the appropriate Microsoft patches immediately

Exposure:

Today, Microsoft released four security bulletins describing vulnerabilities that affect Windows and components shipping with it. One of the bulletins also affect SQL Server. Each vulnerability affects different versions of Windows to a different extent; a remote attacker could exploit the worst of these flaws to gain complete control of your Windows PCs. The summary below lists the vulnerabilities in order from highest to lowest severity.

MS08-040: Four SQL Server and Windows SQL Server component vulnerabilities

All server versions of Windows ship with a SQL Server component, called either the Windows Microsoft SQL Server Desktop Engine (WMSDE) or the Windows Internal Database (WYukon). Unfortunately, both SQL Server and its Windows components suffer from four security vulnerabilities. Three of the vulnerabilities differ technically, but share the same general characteristics: By executing specially crafted SQL queries, an authenticated attacker can exploit these vulnerabilities to execute code on your Windows server, gaining complete control of it. Note, however, that only authenticated SQL attackers can exploit these vulnerabilities. If the attacker can’t obtain valid credentials on your SQL Server (even low-privileged credentials would do), he could not leverage this attack. The remaining information disclosure vulnerability allows a fairly privileged SQL user to gain access to customer data. It poses less risk than the three code execution flaws described above.
Microsoft rating: Important.

MS08-037: Windows DNS spoofing and poisoning vulnerabilities

All versions of Windows ship with a DNS client. The server versions of Windows also ship with a DNS server. According to Microsoft’s bulletin, both of these Windows DNS components suffer from vulnerabilities that can allow an attacker to redirect your user’s Internet traffic from legitimate web sites to malicious ones. The vulnerabilities differ technically, but an attacker triggers them in a similar manner: By sending your DNS server specially crafted DNS queries or responses, an attacker could poison its cache with arbitrary IP addresses, thus forcing your users to visit arbitrary malicious web sites. An attacker might leverage this kind of DNS cache poisoning attack to force your users to visit a malicious drive-by download site. Note: These vulnerabilities are part of a recently disclosed set of common deficiencies in the DNS protocol that allows for DNS cache poisoning. Many vendors’ products and devices also suffer from these flaws. We will post more about these overarching DNS vulnerabilities in another alert.
Microsoft rating: Important.

MS08-038: Windows Explorer saved-search vulnerability

Windows Explorer is the application that provides a graphical user interface (GUI) for your file system. Windows Explorer ships with a useful Windows Search add-in, which makes it easy for you to find specific files or folders on your system. Windows Search suffers from an unspecified vulnerability involving its inability to properly parse saved-search files. By enticing one of your users into downloading and opening a saved-search file, an attacker could exploit this flaw to execute code on that user’s computer, with that user’s privileges. If your users have administrative privileges, the attacker could exploit this to gain complete control of their machines. However, we believe that few users actually use saved-search files. Thus, most users probably wouldn’t fall for this sort of attack.
Microsoft rating: Important.

Solution Path:

Microsoft has released patches for Windows which correct all of these vulnerabilities. You should download, test, and deploy the appropriate patches throughout your network immediately.

Note: Microsoft no longer officially supports Windows NT 4.0, 98, ME or XP with SP1. If you manage any of these operating systems, Microsoft suggests that you migrate to supported versions in order to prevent potential exposure to vulnerabilities. You can learn more about Microsoft’s extended security update support at its Product Support Services Web site.

MS08-040:

§ For Windows 2000

§ Windows Microsoft SQL Server 2000 Desktop Engine (WMSDE)

§ For Windows 2003 (32-bit or x64)

§ Windows Microsoft SQL Server 2000 Desktop Engine (WMSDE)

§ Windows Internal Database (WYukon) Service Pack 2

§ For Windows 2008 (32-bit or x64)

§ Windows Internal Database (WYukon) Service Pack 2

§ For SQL Server and related components

§ SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0 [ GDR / QFE ]

§ SQL Server 2000 (all versions) and Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) [ GDR / QFE ]

§ SQL Server 2005 (all versions) [ GDR / QFE ]

Note: For the differences between GDR and QFE releases, see this Microsoft blog post

MS08-037:

§ For Windows 2000 Server

§ DNS Client Update

§ DNS Server Update

§ For Windows XP

§ DNS Client Update

§ For Windows XP x64

§ DNS Client Update

§ For Windows Server 2003

§ DNS Client Update

§ DNS Server Update

§ For Windows Server 2003 x64

§ DNS Client Update

§ DNS Server Update

§ For Windows Server 2003 Itanium

§ DNS Client Update

§ DNS Server Update

§ For Windows Server 2008

§ DNS Server Update

§ For Windows Server 2008 x64

§ DNS Server Update

MS08-038:

§ For Windows Vista

§ For Windows Vista x64

§ For Windows Server 2008

§ For Windows Server 2008 Itanium

§ For Windows Server 2008 x64

For All WatchGuard Users:

WatchGuard Fireboxes, by default, reduce the risks presented by some of these vulnerabilities. However, attackers could exploit many of them locally, without passing traffic through your firewall. For that reason, we urge you to apply the patches above.

Status:

Microsoft has released patches correcting these issues.

References:

§ Microsoft Security Bulletin MS08-037

§ Microsoft Security Bulletin MS08-038

Microsoft Security Bulletin MS08-040

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 23 December 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...