Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 26 vulnerabilities that were fixed in 15 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 15 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
A remote code execution vulnerability exists in the Microsoft Data Analyzer ActiveX Control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution
Microsoft has released a security update to resolve this issue. The security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
Updates for Windows Embedded Standard 7 Are Now Available (KB978262)
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-008 for further details.
Workaround:
1) Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting.
2) Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.
Impact of workaround #1 and #2:
On visiting Web sites on the Internet or Intranet that use ActiveX or Active Scripting to provide additional functionality, you will be prompted frequently when you enable this workaround.
3) Prevent COM objects from running in Internet Explorer.
Refer to the advisory to obtain detailed information on enabling and disabling the workarounds.
The mso.dll contains a buffer overflow. This could allow remote code execution if opening crafted office files. (CVE-2010-0243)
Microsoft has released a security update to resolve this issue.
Microsoft Office XP Service Pack 3
Refer to Microsoft Security Bulletin MS10-003 for further details.
Workaround:
Do not open Office files from untrusted sources.
The application is vulnerable to a heap-based buffer overflow issue when the application parses two related PowerPoint record types (LinkedSlideAtom and LinkedShapeAtom10) in a malicious file.
PowerPoint 2000 SP3, PowerPoint 2002 (XP) SP3 and PowerPoint 2003 SP3 are vulnerable.
Previously this was an iDefense exclusive detection.
Microsoft Office XP Service Pack 3 (Microsoft Office PowerPoint 2002 Service Pack 3)
Microsoft Office 2003 Service Pack 3 (Microsoft Office PowerPoint 2003 Service Pack 3)
Refer to Microsoft Security Bulletin MS10-004 for further details.
Workaround:
1) Avoid opening Office files received from untrusted sources.
2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or untrusted sources, because it protects Office 2003 installations by more securely opening Word, Excel and PowerPoint binary format files. Information on MOICE can be found at KB935865.
Impact of workaround #2:
Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.
3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources. The following registry scripts can be used to set the File Block policy.
Note: Modifying the Registry incorrectly can cause serious problems that may require re-installation of the operating system.
For Office 2003:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office.0\Excel\Security\FileOpenBlock]
"BinaryFiles"=dword:00000001
For 2007 Office Systems:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office.0\Excel\Security\FileOpenBlock]
"BinaryFiles"=dword:00000001
Impact of workaround #3:
If File Block policy is configured without special "exempt directory" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.
The application is vulnerable to a memory corruption issue (Use-After-Free) when the application parses multiple "OEPlaceholderAtom" records in a "msofbtClientData" container.
PowerPoint 2000 SP3, PowerPoint 2002 (XP) SP3 and PowerPoint 2003 SP3 are vulnerable.
Previously this was an iDefense exclusive detection.
Microsoft Office XP Service Pack 3 (Microsoft Office PowerPoint 2002 Service Pack 3)
Microsoft Office 2003 Service Pack 3 (Microsoft Office PowerPoint 2003 Service Pack 3)
Refer to Microsoft Security Bulletin MS10-004 for further details.
Workaround:
1) Avoid opening Office files received from untrusted sources.
2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or untrusted sources, because it protects Office 2003 installations by more securely opening Word, Excel and PowerPoint binary format files. Information on MOICE can be found at KB935865.
Impact of workaround #2:
Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.
3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources. The following registry scripts can be used to set the File Block policy.
Note: Modifying the Registry incorrectly can cause serious problems that may require re-installation of the operating system.
For Office 2003:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office.0\Excel\Security\FileOpenBlock]
"BinaryFiles"=dword:00000001
For 2007 Office Systems:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office.0\Excel\Security\FileOpenBlock]
"BinaryFiles"=dword:00000001
Impact of workaround #3:
If File Block policy is configured without special "exempt directory" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.
The application is vulnerable to the following issues.
- Several vulnerabilities exists in the way that Microsoft Office PowerPoint parses the PowerPoint file format when opening a specially crafted PowerPoint file. (CVE-2010-0034, CVE-2010-0033, CVE-2010-0029)
- The application is vulnerable to a corrupt stack memory in an array when the application parses an "OEPlaceholderAtom" record in a "msofbtClientData" container. (CVE-2010-0031)
- The application is vulnerable to a memory corruption issue (Use-After-Free) when the application parses multiple "OEPlaceholderAtom" records in a "msofbtClientData" container. (CVE-2010-0032)
- The application is vulnerable to a heap-based buffer overflow issue when the application parses two related PowerPoint record types (LinkedSlideAtom and LinkedShapeAtom10) in a malicious file. (CVE-2010-0030)
Previously this was an iDefense exclusive detection.
Microsoft Office XP Service Pack 3 (Microsoft Office PowerPoint 2002 Service Pack 3)
Microsoft Office 2003 Service Pack 3 (Microsoft Office PowerPoint 2003 Service Pack 3)
Refer to Microsoft Security Bulletin MS10-004 for further details.
Workaround:
1) Avoid opening Office files received from un-trusted sources.
2) Use the Microsoft Office Isolated Conversion Environment (MOICE) when opening files from unknown or untrusted sources, because it protects Office 2003 installations by more securely opening Word, Excel, and PowerPoint binary format files. Information on MOICE can be found at KB935865.
Impact of workaround #2:
Office 2003 and earlier formatted documents that are converted to the 2007 Microsoft Office System Open XML format by MOICE lose their macro functionality. Documents protected with passwords and Digital Rights Management cannot be converted.
3) Microsoft Office File Block policy should be used to block the opening of Office 2003 and earlier documents from unknown or untrusted sources. The following registry scripts can be used to set the File Block policy.
Note: Modifying the Registry incorrectly can cause serious problems that may require re-installation of the operating system.
For Office 2003:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office.0\Excel\Security\FileOpenBlock]
"BinaryFiles"=dword:00000001
For 2007 Office system:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office.0\Excel\Security\FileOpenBlock]
"BinaryFiles"=dword:00000001
Impact of workaround #3:
If File Block policy is configured without special "exempt directory" configuration (see KB922848), Office 2003 files or earlier versions will not open in Office 2003 or 2007 Microsoft Office System.
Microsoft Paint is prone to a vulnerability that could allow remote code execution if a user viewed a specially crafted JPEG image file using Microsoft Paint. This vulnerability is caused by memory corruption when decoding JPEG images processed by Microsoft Paint.
Microsoft has released a security update to resolve this issue. The update is rated Moderate for Microsoft Windows 2000, Windows XP, and Windows Server 2003.
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-005 for further details.
Workaround:
- Disable Microsoft Paint
- On Windows XP and Windows Server 2003, remove Microsoft Paint.
Impact of the workarounds: Users will not be able to run Microsoft Paint.
Refer to the advisory for further details on enabling and disabling the workarounds.
Microsoft SMB Client is prone to the following vulnerabilities:
A remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB responses. (CVE-2010-0016)
A remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB packets. (CVE-2010-0017)
Microsoft has released a security update to address these issues.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
Updates for Windows Embedded Standard 7 Are Now Available (KB978251)
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista and Windows Vista Service Pack 1
Windows Vista x64 Edition and Windows Vista x64 Edition Service Pack 1
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-006 for further details.
Workaround:
TCP ports 139 and 445 should be blocked at the firewall to protect systems behind the firewall from attempts to exploit this vulnerability.
Impact of workaround: Blocking the ports can cause Windows services or applications using those ports to stop functioning.
A remote code execution vulnerability exists in Microsoft Windows. The vulnerability results from the incorrect validation of input sent to the ShellExecute API function.
The security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, and Windows Server 2003.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
April 2012 Security Updates are Live on ECE for XPe and Standard 2009 (KB975713)
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-007 for further details.
- A remote code execution vulnerability exists in the Windows TCP/IP stack due to insufficient bounds checking when processing specially crafted ICMPv6 Router Advertisement packets.
- A remote code execution vulnerability exists in the Windows TCP/IP stack due to the manner in which the TCP/IP stack handles specially crafted Encapsulating Security Payloads over UDP datagram fragments when running a custom network driver.
- A remote code execution vulnerability exists in the Windows TCP/IP stack due to insufficient bounds checking when processing specially crafted ICMPv6 Route Information packets.
- A denial of service vulnerability exists in TCP/IP processing in Microsoft Windows due to an error in the processing of specially crafted TCP packets with a malformed selective acknowledgment value.
This security update is rated Critical for Windows Vista and Windows Server 2008.
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Refer to Microsoft Security Bulletin MS10-009 for further details.
Workaround:
1) For CVE-2010-0239 and CVE-2010-0241: Disable the "Core Networking - Router Advertisement (ICMPv6-In)" inbound firewall rule.
Impact of workaround #1: ICMPv6 router advertisements will be blocked.
2) For CVE-2010-0240: Enable advanced TCP/IP filtering on systems that support this feature
Refer to the advisory to obtain additional details for applying these workarounds.
A denial of service vulnerability exists in Hyper-V on Windows Server 2008 and Windows Server 2008 R2. The vulnerability is due to insufficient validation of specific sequences of machine instructions by Hyper-V. An attacker who successfully exploits this vulnerability could cause the affected Hyper-V system to stop responding. This would affect all virtual machines hosted by that system.
Affected Operating Systems:
Windows Server 2008 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Refer to Microsoft Security Bulletin MS10-010 for further details.
An elevation of privilege vulnerability exists because the Windows Client/Server Run-time Subsystem (CSRSS) does not properly terminate user processes when a user logs out.
The security update is rated Important for all supported editions of Microsoft Windows 2000, Windows XP, and Windows Server 2003.
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-011 for further details.
Microsoft SMB Server is prone to the following vulnerabilities:
An authenticated remote code execution vulnerability exists in the way that Microsoft Server Message Block (SMB) Protocol software handles specially crafted SMB packets. (CVE-2010-0020)
A SMB memory corruption exists due to Microsoft Server Message Block (SMB) protocol software improperly handling a race condition that can occur when parsing SMB packets during the Negotiate phase. (CVE-2010-0021)
A null pointer vulnerability exists due to Microsoft Server Message Block (SMB) Protocol software improperly verifying the share and servername fields in malformed SMB packets. (CVE-2010-0022)
- A vulnerability is caused by a lack of cryptographic entropy when the SMB server generates challenges and presents them to a connecting client. This could cause an attacker to continuously attempt to authenticate against the SMB server and subsequently cause that server to generate duplicate values. (CVE-2010-0231)
Microsoft has released a security update to address these issues.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
Updates for Windows Embedded Standard 7 Are Now Available (KB971468)
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for Itanium-based Systems
Refer to Microsoft Security Bulletin MS10-012 for further details.
Workaround:
TCP ports 139 and 445 should be blocked at the firewall to protect systems behind the firewall from attempts to exploit this vulnerability.
Impact of workaround: Blocking the ports can cause several windows services or applications using those ports to stop functioning.
A remote code execution vulnerability exists in the way that Microsoft DirectShow parses AVI media files. This vulnerability could allow remote code execution if a user opened a specially crafted AVI file. (CVE-2010-0250)
Microsoft has released a security update to resolve this issue.
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
Updates for Windows Embedded Standard 7 Are Now Available (KB975560)
Microsoft Windows 2000 Service Pack 4 (AVI Filter)
Microsoft Windows 2000 Service Pack 4 (Quartz)
Microsoft Windows 2000 Service Pack 4 (Quartz in DirectX 9.0)
Windows XP Service Pack 2 and Windows XP Service Pack 3 (AVI Filter)
Windows XP Service Pack 2 and Windows XP Service Pack 3 (Quartz)
Windows XP Professional x64 Edition Service Pack 2 (AVI Filter)
Windows XP Professional x64 Edition Service Pack 2 (Quartz)
Windows Server 2003 Service Pack 2 (AVI Filter)
Windows Server 2003 Service Pack 2 (Quartz)
Windows Server 2003 x64 Edition Service Pack 2 (AVI Filter)
Windows Server 2003 x64 Edition Service Pack 2 (Quartz)
Windows Server 2003 with SP2 for Itanium-based Systems (AVI Filter)
Windows Server 2003 with SP2 for Itanium-based Systems (Quartz)
Windows Vista, Windows Vista Service Pack 1 and Windows Vista Service Pack 2 (Quartz)
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS10-013.
The vulnerability exists in implementations of Kerberos. The vulnerability is due to improper handling of Ticket-Granting-Ticket renewal requests by a client on a remote, non-Windows realm in a mixed-mode Kerberos implementation. (CVE-2010-0035)
The security update is rated Critical for all supported editions of Microsoft Windows 2000 and Windows XP, Important for all supported editions of Windows Vista and Windows 7, Moderate for all supported editions of Windows Server 2003, and Low for all supported editions of Windows Server 2008 and Windows Server 2008 R2.
Microsoft Windows 2000 Server Service Pack 4
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Refer to Microsoft Security Bulletin MS10-014 for further details.
The kernel is prone to multiple elevation of privilege vulnerabilities. An attacker who successfully exploits this vulnerability could execute arbitrary code and take complete control of an affected system.
Affected Software:
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows Server 2003 Service Pack 2
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for 32-bit Systems
Windows Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
Updates for Windows Embedded Standard 7 Are Now Available (KB977165)
Microsoft Windows 2000 Service Pack 4
Windows XP Service Pack 2 and Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
Refer to Microsoft Security Bulletin MS10-015 for further details. Also refer to Microsoft Security Advisory (979682) to obtain additional details on one of the vulnerabilities that was resolved by MS10-015.
Workaround:
- Disable the NTVDM subsystem
See Microsoft Knowledge Base Article 979682 to use the automated Microsoft Fix it solution to enable or disable this workaround.
Manual Instructions are as follows:
1. Click Start, click Run, type gpedit.msc in the Open box, and then click OK. This opens the Group Policy console.
1. Expand the Administrative Templates folder and then click Windows Components.
2. Click the Application Compatibility folder.
3. In the details pane, double click the Prevent access to 16-bit applications policy setting. By default, this is set to Not Configured.
4. Change the policy setting to Enabled and then click OK.
Impact of Workaround - Users will not be able to run 16-bit applications.
There are reports of MS10-015 causing a blue screen in some systems due to presence of a rootkit. To determine whether the system is compatible with security update 977165, please refer to KB980966 for further information.
These new vulnerability checks are included in Qualys vulnerability signature 1.24.122-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.