Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 22 vulnerabilities that were fixed in 14 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 14 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
The update addresses the vulnerabilities by modifying the way Internet Explorer handles objects in memory, handles JavaScript event handlers, renders data during certain processes, accesses files stored in the local machine, and manages cookie files; and by modifying the way the telnet handler executes the associated application.
This security update is rated Critical for Internet Explorer 6 on Windows clients, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9; and Important for Internet Explorer 6 on Windows servers.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2559049)
Windows XP Service Pack 3 (Internet Explorer 6)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 Service Pack 2 (Internet Explorer 6)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6)
Windows XP Service Pack 3 (Internet Explorer 7)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 Service Pack 2 (Internet Explorer 7)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 7)
Windows Vista Service Pack 2 (Internet Explorer 7)
Windows Vista x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Internet Explorer 7)
Windows Server 2008 for x64-based Systems Service Pack 2 (Internet Explorer 7)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 8)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-057.
Workaround:
1) Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting
2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
Impact of workarounds #1 and #2:
You will be prompted frequently when visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality.
A remote code execution vulnerability is caused when a non-authoritative DNS server improperly handles a specially crafted NAPTR record in memory while recursively requesting the record from the authoritative DNS server.
A denial of service vulnerability exists in the way that the DNS server improperly handles an object in memory that has not been initialized.
Microsoft has released a security update that addresses the vulnerabilities by modifying the way that the DNS server handles NAPTR queries in memory and initializes objects in memory before use.
This security update is rated Critical for 32-bit and x64-based editions of Windows Server 2008, and x64-based editions of Windows Server 2008 R2; and Important for all supported editions of Windows Server 2003.
For a thorough understanding of the vulnerability (CVE-2011-1966) fixed in this security update see:
Patch Analysis for MS11-058
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Refer to Microsoft Security Bulletin MS11-058 for further details.
Workaround:
Disable the DNS service if you are not using it.
A remote code execution vulnerability exists in the way that the Windows Data Access Tracing component handles the loading of DLL files.(CVE-2011-1975).
This security update is rated Important for all supported editions of Windows 7 and Windows Server 2008 R2.
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-059 for further details.
Workaround:
1) Disable loading of libraries from WebDAV and remote network shares
2) Disable the WebClient service
Impact of workaround #2: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log.
3) Block TCP ports 139 and 445 at the firewall
Impact of workaround #3: Several Windows services use the affected ports. Blocking connectivity to the ports may prevent various applications or services from functioning.
Two remote code execution vulnerabilities exists because the application does not properly validate objects in memory when parsing crafted Visio files. (CVE-2011-1972, CVE-2011-1979)
Microsoft has released a security update that addresses these vulnerabilities by correcting the way that Microsoft Visio handles corrupted structures and objects in memory when parsing specially crafted Visio files.
The security update is rated Important for all supported editions of Microsoft Visio 2003, Visio 2007 and Visio 2010.
Microsoft Visio 2003 Service Pack 3
Microsoft Visio 2007 Service Pack 2
Microsoft Visio 2010 and Microsoft Visio 2010 Service Pack 1 (32-bit editions)
Microsoft Visio 2010 and Microsoft Visio 2010 Service Pack 1 (64-bit editions)
Refer to Microsoft Security Bulletin MS11-060 for further details.
Workaround:
Do not open untrusted Office files
A reflected XSS vulnerability is caused when the logon page for Remote Desktop Web Access improperly validates a URL parameter.
Microsoft has released a security update to addresses the vulnerability by correcting the manner in which the logon page for Remote Desktop Web Access validates input parameters.
This security update is rated Important for all supported editions of Windows Server 2008 R2.
Refer to Microsoft Security Bulletin MS11-061 for further details.
Workaround:
1) Enable Internet Explorer 8 and Internet Explorer 9 XSS filter for Intranet Zone
Impact of workaround #1: Internal sites not previously flagged as being XSS risks would be flagged.
An elevation of privilege vulnerability exists in the Remote Access Service NDISTAPI driver. The vulnerability is caused when the NDISTAPI driver improperly validates user-supplied input when passing data from user mode to the Windows kernel. (CVE-2011-1974)
Affected Operating System:
Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2566454)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS11-062 for further details.
An elevation of privilege vulnerability exists in the Remote Access Service NDISTAPI driver. The vulnerability is caused when the NDISTAPI driver improperly validates user-supplied input when passing data from user mode to the Windows kernel. (CVE-2011-1974)
Affected Operating System:
Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2566454)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS11-062 for further details.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2567680)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-063 for further details.
A denial of service vulnerability exists in TCP/IP processing due to improperly processing a sequence of any specially crafted ICMP messages. (CVE-2011-1871)
A denial of service vulnerability exists in the TCP/IP stack, which occurs when the TCP/IP stack improperly handles URLs in memory when URL-based Quality of Service(QoS) is enabled. (CVE-2011-1965)
The security update is rated Important for all supported editions of Microsoft Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2.
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems and Windows 7 for x64-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-064 for further details.
Workaround:
1) Block ICMP at the firewall
Impact of workaround #1: This workaround can negatively impact performance by preventing TCP from optimizing network communication. ICMP network packets can eliminate fragmentation at routers connecting networks with different MTUs. Fragmentation reduces TCP throughput and increases network congestion.
2) Disable Policy-based QoS.
A denial of service vulnerability exists in the way the Remote Desktop Protocol accesses an object in memory that has been improperly initialized or has been deleted (CVE-2011-1968).
This security update is rated Important for all supported editions of Windows Server 2003 and Moderate for all supported editions of Windows XP.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2570222)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS11-065 for further details.
Workaround:
1) Disable Terminal Services, Remote Desktop, Remote Assistance, and Windows Small Business Server 2003 Remote Web Workplace feature if no longer required.
2) Block TCP port 3389 at the enterprise perimeter firewall.
An information disclosure vulnerability exists in the way Microsoft Chart controls incorrectly handle special characters within a specially crafted URI.(CVE-2011-1977).
This security update is rated Important for Microsoft .NET Framework 4 on all supported releases of Microsoft Windows and for Chart Control for Microsoft .NET Framework 3.5 Service Pack 1.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2487367)
April 2012 Security Updates are Live on ECE for XPe and Standard 2009 (KB2500170)
Windows XP Service Pack 3 (Microsoft .NET Framework 4)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 4)
Windows Vista Service Pack 2 (Microsoft .NET Framework 4)
Windows Vista x64 Edition Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2008 for x64-based Systems Service Pack 2 (Microsoft .NET Framework 4)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (Microsoft .NET Framework 4)
Chart Control for Microsoft .NET Framework 3.5 Service Pack 1
Refer to Microsoft Security Bulletin MS11-066 for further details.
This security update is rated Important for all supported editions of Microsoft Visual Studio 2005 and Microsoft Report Viewer 2005 Redistributable Package.
Microsoft Visual Studio 2005 Service Pack 1
Microsoft Report Viewer 2005 Service Pack 1 Redistributable Package
Refer to Microsoft Security Bulletin MS11-067 for further details.
Workaround:
1) Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting
2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
Impact of workaround #1 and #2:
On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.
A denial of service vulnerability is caused when the Windows kernel improperly parses metadata information in files.
Microsoft has released a security update that addresses the vulnerability by correcting the way that the Windows kernel parses metadata information in files.
This security update is rated Moderate for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Refer to Microsoft Security Bulletin MS11-068 for further details.
Workaround:
1) Disable the WebClient service
Impact of workaround #1: When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the Web Client service will not start, and an error message will be logged in the System log.
2) Disable the Preview Pane and Details Pane in Windows Explorer
Impact of workaround #2: Windows Explorer will not automatically display OTF fonts.
3) Block TCP ports 139 and 445 at the firewall
Impact of workaround #3: Several Windows services use the affected ports. Blocking connectivity to the ports may cause various applications or services to not function.
An information disclosure vulnerability exists because .NET Framework improperly validates the trust level within the System.Net.Sockets namespace. (CVE-2011-1978)
Affected Software:
Windows XP Service Pack 3 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 4)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 4)
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 4)
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2 and Microsoft .NET Framework 4)
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August Security Updates for XPe SP3 and Standard 2009 Are Now on ECE (KB2539631, 2539636)
Windows XP Service Pack 3 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows XP Service Pack 3 (Microsoft .NET Framework 4[1])
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4[1])
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 4[1])
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 4[1])
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 2.0 Service Pack 2)
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 4[1])
Windows Vista Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2)
Windows Vista Service Pack 2 (Microsoft .NET Framework 4[1])
Windows Vista x64 Edition Service Pack 2 (Microsoft .NET Framework 2.0 Service Pack 2)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS11-069.
Workaround:
Disable XAML browser applications in Internet Explorer
Impact of workaround: Microsoft .NET code will not run in Internet Explorer or will not run without prompting. Disabling Microsoft .NET applications and components in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.
These new vulnerability checks are included in Qualys vulnerability signature 1.28.183-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.