Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 52 vulnerabilities that were fixed in 16 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 16 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Microsoft IE is prone to the following vulnerabilities:
- An information disclosure vulnerability exists that potentially allows form data within Internet Explorer to be captured via the AutoComplete feature. (CVE-2010-0808)
- An information disclosure vulnerability exists in the way that the toStaticHTML API sanitizes HTML and this could allow an attacker to perform cross-site scripting attacks and run script in the security context of the logged-on user. (CVE-2010-3243,CVE-2010-3324)
- An information disclosure vulnerability exists in the way that Internet Explorer processes CSS special characters. (CVE-2010-3325)
- A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. (CVE-2010-3326,CVE-2010-3328,CVE-2010-3329,CVE-2010-3331)
- An information disclosure vulnerability exists in the way that Internet Explorer improperly handles the Anchor element. This behavior occurs during user operation when the Anchor element is not removed during content pasting and editing, potentially revealing personally identifiable information intended for deletion. (CVE-2010-3327)
- An information disclosure vulnerability exists in Internet Explorer that could allow script to gain access to information in another domain or Internet Explorer zone. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow information disclosure if a user viewed the Web page. (CVE-2010-3330)
Microsoft has released a security update that addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, CSS special characters, HTML sanitization, the AutoComplete feature, the Anchor element, and script during certain processes.
This security update is rated Critical for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and Important for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers.
Note: This vulnerability is applicable to versions of the software that are not listed in the official advisory. For details see: http://www.qualys.com/research/exploits/#MS10-071
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB2360131)
Windows XP Service Pack 3 (Internet Explorer 6)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 Service Pack 2 (Internet Explorer 6)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 6)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 6)
Windows XP Service Pack 3 (Internet Explorer 7)
Windows XP Professional x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 Service Pack 2 (Internet Explorer 7)
Windows Server 2003 x64 Edition Service Pack 2 (Internet Explorer 7)
Windows Server 2003 with SP2 for Itanium-based Systems (Internet Explorer 7)
Windows Vista Service Pack 1 and Windows Vista Service Pack 2 (Internet Explorer 7)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS10-071.
Workaround:
1) Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting.
2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.
Impact of workaround #1 and #2:
On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.
3) Read e-mails in plain text.
Impact of workaround #3: E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content.
Detailed steps on applying the workarounds can be found at the advisory.
An information disclosure vulnerability exists in the way that HTML is filtered that could allow an attacker to perform cross-site scripting attacks and run script in the security context of the logged-on user.
An information disclosure vulnerability exists in the way that the SafeHTML function sanitizes HTML.
This security update is rated Important for Microsoft SharePoint Services 3.0, Microsoft SharePoint Foundation 2010, and Microsoft Office Web Apps; and all supported editions of Microsoft Office SharePoint Server 2007, and Microsoft Groove Server 2010.
Microsoft Windows SharePoint Services 3.0 Service Pack 2 (32-bit versions)
Microsoft Windows SharePoint Services 3.0 Service Pack 2 (64-bit versions)
Microsoft SharePoint Foundation 2010
Microsoft Office SharePoint Server 2007 Service Pack 2 (32-bit editions)
Microsoft Office SharePoint Server 2007 Service Pack 2 (64-bit editions)
Refer to Microsoft Security Bulletin MS10-072 for further details.
Workarounds:
1) Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting.
2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.
Impact of workaround #1 and #2:
On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.
3) Read e-mails in plain text.
Impact of workaround #3: E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content.
Detailed steps on applying the workarounds can be found in the advisory.
The Windows kernel is prone to the following vulnerabilities:
An elevation of privilege vulnerability exists due to the way that the Windows kernel-mode drivers maintain the reference count for an object.
An elevation of privilege vulnerability exists due to the way that the Windows kernel-mode drivers load specific keyboard layouts.
An elevation of privilege vulnerability exists when the Windows kernel-mode drivers do not properly validate window class data.
Microsoft released a security update that addresses the vulnerabilities by correcting the manner in which the Windows kernel-mode drivers maintain the reference count for an object, and index a table of function pointers.
This security update is rated Important for all supported editions of Microsoft Windows.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB981957)
Qualys Research team confirmed that this vulnerability also affects Windows 2000 SP4 32bit,Windows XP 32bit,Windows XP SP1 32bit,Windows XP SP2 32bit, Windows 2003 SP1 ,Windows Vista 32bit.
Note: This vulnerability is applicable to versions of the software that are not listed in the official advisory.For details see:
http://www.qualys.com/research/exploits/#MS10-073
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-073 for further details.
Microsoft MFC is prone to the following vulnerability:
A remote code execution vulnerability exists in the way that window titles are managed in applications written using the Microsoft Foundation Class (MFC) Library. While the vulnerability is located in MFC and is present on affected operating systems, it can only be exploited if a remote attacker can influence the window title of any window in an MFC application. An attacker who successfully exploits this vulnerability could run arbitrary code in the security context of the current user.
Microsoft released a security update that addresses the vulnerability by adding additional checks to requests for Window title changes.
This security update is rated Moderate for all supported releases of Microsoft Windows.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB2387149)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-074 for further details.
A vulnerability exists in Microsoft Windows Media Player Network Sharing Service that could allow a remote user to send a specially crafted network packet to an instance of the application's network streaming service and cause remote code execution in the context of the current application. (CVE-2010-3225.)
Microsoft has released a security update that addresses the vulnerability by correcting the way that Windows Media Player Network Sharing Service handles specially crafted RTSP packets.
This security update is rated Critical for supported editions of Windows 7 and Important for all supported editions of Windows Vista.
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows 7 for x64-based Systems
Refer to Microsoft Security Bulletin MS10-075 for further details.
Workaround:
1) Disable Windows Media Player Network Sharing Service on affected systems.
Impact of the workaround: Windows Media Sharing will be disabled.
Detailed instructions on applying the workarounds can be found in the advisory.
A remote code execution vulnerability exists in the way that Microsoft Windows Embedded OpenType (EOT) font technology parses certain tables in specially crafted embedded fonts.
Microsoft has released a security update to addresses the vulnerability by correcting the way that the Embedded OpenType Font Engine parses files and content containing embedded fonts.
This security update is rated Critical for all supported releases of Microsoft Windows.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB982132)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-076 for further details.
Workaround:
1) Disable support for parsing embedded fonts in Internet Explorer to prevent this application from being used as an attack vector.
Impact of workaround #1: Web sites making use of embedded font technology will fail to display properly.
2) Deny Access to T2EMBED.DLL.
Impact of workaround #2: Applications that rely on embedded font technology will fail to display properly.
Refer to the advisory to obtain detailed instructions on applying the workarounds.
A remote code execution vulnerability exists in the Microsoft .NET Framework that can allow a specially crafted Microsoft .NET application to access memory in an unsafe manner, leading to arbitrary unmanaged code execution. This vulnerability only affects the x64 and Itanium architectures. (CVE-2010-3228).
Microsoft has released a security update that addresses the vulnerability by modifying the way that the JIT compiler optimizes code.
This security update is rated Critical for Microsoft .NET Framework 4.0 on supported x64-based and Itanium-based editions of Microsoft Windows.
Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 4.0)
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 4.0)
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 4.0)
Windows 7 for x64-based Systems (Microsoft .NET Framework 4.0)
Windows Server 2008 R2 for x64-based Systems (Microsoft .NET Framework 4.0)
Windows Server 2008 R2 for Itanium-based Systems (Microsoft .NET Framework 4.0)
Refer to Microsoft Security Bulletin MS10-077 for further details.
Workaround:
1) Disable partially trusted Microsoft .NET applications.
Impact of workaround #1: Some Microsoft .NET applications will not run.
2) Disable XAML browser applications in Internet Explorer
Impact of workaround #2: Microsoft .NET code will not run in Internet Explorer or will not run without prompting. Disabling Microsoft .NET applications and components in the Internet and local Intranet security zones may cause some Web sites to work incorrectly.
Refer to the advisory to obtain detailed instructions on applying the workarounds.
An elevation of privilege vulnerability exists in the way that the Windows OpenType Font format driver improperly parses specially crafted OpenType fonts. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change or delete data; or create new accounts with full user rights.(CVE-2010-2740, CVE-2010-2741)
A remote code execution vulnerability exists in the way that the MPEG-4 codec handles supported format files.(CVE-2010-0818)
Microsoft has released a security update that addresses the vulnerabilities by correcting the way the OpenType Font format driver allocates memory and performs integer calculations when processing OpenType fonts.
This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB2279986)
Note: This vulnerability is applicable to versions of the software that are not listed in the official advisory.For details see:
http://www.qualys.com/research/exploits/#MS10-078
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-078 for further details.
Word is prone to the following vulnerabilities:
A remote code execution vulnerability exists in the way that Microsoft Word handles an uninitialized pointer when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles an improper boundary check when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles index values inside a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles stack validation when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles return values when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles bookmarks when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles pointers when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles malformed records inside a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles indexes when parsing a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word parses a specially crafted Word file.
A remote code execution vulnerability exists in the way that Microsoft Word handles a malformed record when parsing a specially crafted Word file.
Microsoft has released a security update to addresses these vulnerabilities by modifying the way that Microsoft Office Word parses specially crafted Word files.
This security update is rated Important for all supported editions of Microsoft Word 2002, Microsoft Word 2003, Microsoft Word 2007, Microsoft Word 2010, Microsoft Office 2004 for Mac, and Microsoft Office 2008 for Mac; Open XML File Format Converter for Mac; and all supported versions of Microsoft Office Word Viewer and Microsoft Office Compatibility Pack.
Microsoft Office XP Service Pack 3 (Microsoft Word 2002 Service Pack 3)
Microsoft Office 2003 Service Pack 3 (Microsoft Word 2003 Service Pack 3)
Microsoft Office 2007 Service Pack 2 (Microsoft Word 2007 Service Pack 2)
Microsoft Office 2010 (32-bit editions) (Microsoft Word 2010 (32-bit editions))
Microsoft Office 2010 (64-bit editions) (Microsoft Word 2010 (64-bit editions))
Open XML File Format Converter for Mac
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
Microsoft Office Web Apps (Microsoft Word Web App)
Refer to Microsoft Security Bulletin MS10-079 for further details.
Workarounds:
1) Avoid opening Office (Word) files received from untrusted sources.
2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or un-trusted sources because it protects Office 2003 installations by more securely opening Word, Excel, and PowerPoint binary format files. Information on MOICE can be found at KB935865.
Impact of the workaround:
Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.
3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources.
Impact of the workaround:
If File Block policy is configured without special "exempt directory" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.
Refer to the advisory for obtaining additional details on applying the workarounds.
Excel is prone to multiple remote code execution vulnerabilities because of the way that Microsoft Office Excel parses the Excel file format when opening a specially crafted Excel file.
Microsoft has released a security update that addresses these vulnerabilities by changing the way that Microsoft Office Excel parses specially crafted Excel files and by correcting the way that the Open XML File Format Converter for Mac installs.
This security update is rated Important for all supported editions of Microsoft Office Excel 2002, Microsoft Office Excel 2003, Microsoft Office Excel 2007, Microsoft Office 2004 for Mac, and Microsoft Office 2008 for Mac; Open XML File Format Converter for Mac; and all supported versions of Microsoft Office Excel Viewer and Microsoft Office Compatibility Pack.
Microsoft Office XP Service Pack 3 (Microsoft Excel 2002 Service Pack 3)
Microsoft Office 2003 Service Pack 3 (Microsoft Excel 2003 Service Pack 3)
Microsoft Office 2007 Service Pack 2 (Microsoft Excel 2007 Service Pack 2)
Open XML File Format Converter for Mac
Microsoft Excel Viewer Service Pack 2
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 2
Refer to Microsoft Security Bulletin MS10-080 for further details.
Workaround:
1) Avoid opening Office files received from untrusted sources.
2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or untrusted sources because it protects Office 2003 installations by more securely opening Word, Excel, and PowerPoint binary format files. Information on MOICE can be found at KB935865.
Impact of the workaround:
Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.
3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources.
Impact of the workaround:
If File Block policy is configured without special "exempt directory" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.
Refer to the advisory to obtain additional details on applying the workarounds.
A remote code execution vulnerability exists because the Windows common control library does not properly handle certain messages when rendering scalable vector graphics passed from a third-party scalable vector graphics (SVG) viewer.
Microsoft has released a security update to address the vulnerability by correcting the manner in which the Windows common controls handle messages passed from a third-party scalable vector graphics (SVG) viewer.
This security update is rated Important for all supported releases of Microsoft Windows.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB2296011)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-081 for further details.
A remote code execution vulnerability exists in the way that the Windows Media Player deallocates objects during a reload operation via a Web browser.(CVE-2010-2745)
Microsoft has released a security update that addresses the vulnerability by correcting the manner in which Windows Media Player deallocates objects during a reload operation.
This security update is rated Important for Windows Media Player 9 Series, Windows Media Player 10, Windows Media Player 11, and Windows Media Player 12 when installed on supported releases of Microsoft Windows except for Windows Server 2008 and Windows Server 2008 R2.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB2378111)
Windows XP Service Pack 3 (Windows Media Player 9 Series)
Windows XP Service Pack 3 (Windows Media Player 10)
Windows XP Service Pack 3 (Windows Media Player 11)
Windows XP Professional x64 Edition Service Pack 2 (Windows Media Player 10)
Windows XP Professional x64 Edition Service Pack 2 (Windows Media Player 11)
Windows Server 2003 Service Pack 2 (Windows Media Player 10)
Windows Server 2003 x64 Edition Service Pack 2 (Windows Media Player 10)
Windows Vista Service Pack 1 and Windows Vista Service Pack 2 (Windows Media Player 11)
Windows 7 for 32-bit Systems (Windows Media Player 12)
Windows 7 for x64-based Systems (Windows Media Player 12)
Windows Server 2008 R2 for x64-based Systems (Windows Media Player 12)
Refer to Microsoft Security Bulletin MS10-082 for further details.
Workaround:
1) Unregister wmp.dll
Impact of workaround #1: Windows Media Player will not be able to play supported file formats.
Refer to the advisory to obtain additional instructions on applying the workarounds.
A remote code execution vulnerability exits in Windows Shell and WordPad because these applications inadequately validate COM objects when instantiated.
Microsoft has released a security update that addresses the vulnerability by correcting the way that the Windows Shell and WordPad validate COM objects.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB979687)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS10-083.
Workaround:
1) Avoid using WordPad to open documents from untrusted sources.
An elevation of privilege vulnerability exists in the Remote Procedure Call Subsystem running in the context of the NetworkService account, where a local application can use LPC to request that the LPC server connect back to the client using LRPC. This request could contain specially crafted data designed to cause a stack-based buffer overflow, allowing an authenticated user to access resources running in the context of the NetworkService account.
This security update is rated Important for all supported editions of Windows XP and Windows Server 2003.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October Security Updates for XPe and Standard 2009 Are Now Available on the ECE Site (KB2360937)
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-084 for further details.
A denial of service vulnerability exists in the way that SChannel processes client certificates.
Microsoft has released a security update that addresses the vulnerability by changing the way that IIS processes client certificate requests.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2.
Windows Vista Service Pack 1 and Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-085 for further details.
Workaround:
1) Stop SSL Web sites in IIS.
Impact of workaround #1: Clients will only be able to access non-SSL Web sites.
Refer to the advisory to obtain additional instructions on applying the workarounds.
This vulnerability exists because the Failover Cluster Manager uses unsecured default permissions when adding disks to a cluster. When an administrator adds a disk to a shared cluster, the Failover Cluster Manager sets permissions on the shared cluster disk in a way that potentially provides unauthorized users (everyone) with read/write/delete access to the administrative shares on the failover cluster disk. (CVE-2010-3223)
Microsoft has released a security update that addresses this vulnerability by changing the way the Microsoft Cluster Service user interface sets permissions on administrative shares when adding or creating new shared cluster disks.
This security update is rated Moderate for all supported editions of Windows Server 2008 R2.
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-086 for further details.
Workarounds:
After creating a cluster disk administrative share, manually configure its Access Control List to reflect the access permissions appropriate for the environment. Refer to the advisory to obtain additional information on applying the workarounds.
These new vulnerability checks are included in Qualys vulnerability signature 1.27.67-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.