The February Microsoft Security Bulletin release was so
large that we had to break coverage into two issues. This one includes
less-than-critical threats to Windows as well as all the newly patched threats
to Office.
Details
- MS05-004,
“ASP.NET Path Validation Vulnerability,” is an elevation of privilege and information
disclosure threat. This was being actively exploited at the time the
bulletin was released. - MS05-005,
“Vulnerability in Microsoft Office XP,” is a remote code execution threat caused
by a buffer overrun. This is the only critical-rated threat covered in
this issue. It was not being exploited at the time the bulletin was
released. - MS05-006,
“Vulnerability in Windows SharePoint Services and SharePoint Team Services
Could Allow Cross-Site Scripting and Spoofing Attacks,” is a remote code
execution vulnerability that was not being exploited at the time the
bulletin was released. - MS05-007,
“Vulnerability in Windows Could Allow Information Disclosure,” is a
“named-pipe vulnerability” and no exploits had been seen at the time
the bulletin was released. Named pipes, MSDN
Library Web site, are used by processes which need to communicate with
each other. The vulnerability is due to poor authentication. - MS05-008,
“Vulnerability in Windows Shell Could Allow Remote Code Execution,” is a
drag-and-drop vulnerability which is being actively exploited. It is
caused by improper validation of some DHTML (Dynamic HTML) events.
Applicability
- MS05-004 affects both .NET
Framework 1.0 and 1.1. The affected component is ASP.NET. Note that the
Microsoft Baseline Security Analyzer will NOT report on the need to patch this
vulnerability but a new Enterprise
Update Scanning Tool will assist. - MS05-005 affects all versions and
service pack releases of Office XP, Project 2002, Visio 2002, Works Suite
2002, 2003, and 2004. Not affected are Office 2000 and 2003. Microsoft
Baseline Security Analyzer (MBSA) will report if this update is required. - MS05-006 only affects Windows
SharePoint Services for Windows Server 2003 and SharePoint Team Services. Note
that the Microsoft Baseline Security Analyzer will report on the need to
patch some programs for this vulnerability but a new Enterprise Update Scanning
Tool will assist in determining whether software unsupported by MBSA
needs the update. - MS05-007 only applies to Windows
XP SP1 and SP2, as well as the 64-bit XP Titanium edition. The Microsoft Baseline
Security Analyzer (MBSA) will report if this update is required. - MS05-008 applies to Windows 2000
SP3 and SP4, XP SP1 and SP2, as well as 64-bit Itanium versions of XP,
Windows Server 2003 including Itanium versions, and Windows 98, 98 SE, and
Me. The Microsoft Baseline Security Analyzer (MBSA) will report if this
update is required.
Risk level – Maximum rating is critical
- MS05-004 is rated important, and
you need to be aware that exploits are being seen in the wild. This
vulnerability carries the Mitre designation – Path Validation
Vulnerability – CAN-2004-0847. - MS05-005 is rated critical and has
been given the Mitre designation – CAN-2004-0848. - MS05-006 is only rated moderate
because it only affects uses of SharePoint. This vulnerability carries the
Mitre designation – Cross-site Scripting and Spoofing Vulnerability – CAN-2005-0049. - MS05-007 is rated important for XP
SP1 but moderate for XP SP2 and carries the Mitre designation – Named Pipe
Vulnerability – CAN-2005-0051. - MS05-008 carries a not-critical
rating for Windows 98, 98 SE, and Me; an important rating for Windows 2000
and XP; and a moderate rating for Windows Server 2003. This threat has
been assigned the Mitre designation CAN-2005-0053.
Mitigating factors
- MS05-004, according to Microsoft,
“only affects sites which require authenticated access.” - MS05-005 can only be exploited if
the user can be persuaded to open a malicious link. This would not occur
automatically unless default settings were altered. - MS05-006 has a few rather complex
mitigating circumstances; see the bulletin for details. - MS05-007 is mitigated by best
firewall practices and the fact that the vulnerable Computer Browser
service does not run by default on XP SP2 systems. - MS05-008 is mitigated by the fact
that most recent and patched versions of Outlook and Outlook Express open
HTML e-mails in the Restricted security zone.
Fix – Apply patches
- MS05-004 can be mitigated by
applying the mitigation code module described in Microsoft Knowledge Base
article 887289 as a
workaround. For other workarounds see the bulletin. - MS05-005 has a simple workaround
to reduce the threat. In the Tools menu, choose Folder Options | File
Types | Advanced and check Confirm Open After Download. Uncheck Browse In
Same Window, and users will be prompted before code is run. This doesn’t
prevent the user from running it anyway, just prevents automatic
infection. - MS05-006 doesn’t have any
workaround identified by Microsoft. - MS05-007 can be mitigated using
the Microsoft recommended workaround of disabling the Computer Browser
service. Also, blocking TCP ports 139 and 455 in the firewall will block
attempts by the affected protocol to make a connection. Using the Internet
Connection Firewall, do not enable “File and Printer Sharing for Microsoft
Networks.” - MS05-008 can be mitigated by
setting your browser to prompt before running ActiveX controls and
plug-ins. You should also set Internet and Local intranet security
settings to High. You can also disable “Drag and Drop or copy and paste
files” in Internet Explorer.
Final word
The threats covered by these bulletins are relatively minor,
even the one marked critical. Microsoft has introduced a new tool to assist
managers. Microsoft Knowledge
Base Article 984193 describes the Enterprise Update Scanning Tool.
Based on the discovery of the first Trojan to target the
software (see below) I have deleted Microsoft’s AntiSpyware beta from my
machine. Before you Microsoft bashers start cheering that yet another Microsoft
program carries hidden threats, check out the note below on Symantec security
product vulnerabilities.
This slew of critical and less-than-critical security
updates certainly doesn’t do anything to fix Microsoft’s image, but it’s
important to remember that virtually every other vendor has security problems
also. I only point that out because too many people seem to get dangerously
complacent if they avoid Microsoft products and the complacency simply isn’t
justified.
Also watch for …
- Stocks
of other antivirus companies took a hit recently as Microsoft’s announced
acquisition of small AV e-mail protection software vendor Sybari Software Inc.
caused everyone to recognize that the Redmond-based giant is serious about
getting into the AV business. - Sophos
has announced the discovery of the first Trojan (BankAsh) that attacks
the new Microsoft AntiSpyware software which is still in beta. - ISS-Xforce has discovered a number of high-risk vulnerabilities
in a wide range of Symantec security programs, including those for the
Macintosh platform. Symantec
has provided fixes for the UXP parsing engine overflow.