Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 9 vulnerabilities that were fixed in 6 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 6 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
A vulnerable version of Kodak Image Viewer exists on the target host
An attacker who successfully exploits this vulnerability would gain the same user rights as the local user
Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=29763117-c2dc-4746-b31e-0b27350118e6
Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=be52f740-e9c9-4228-95c0-00995213bbd0
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9a5c9e5d-4908-48bf-9346-745b4c6f6d4e
Refer to Micrsoft Security Bulletin MS07-055 for further details.
An attacker could exploit the vulnerability by constructing a specially crafted Web page. If a user views the Web page, the vulnerability could allow remote code execution.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October 2007 Monthly Security Updates are Now Available on the ECE (KB941202)
Microsoft Windows 2000 Service Pack 4 (Outlook Express 5.5 Service Pack 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5AA009C9-4EDC-4F34-989B-0493549649E8
Microsoft Windows 2000 Service Pack 4 (Outlook Express 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=b537115d-611c-4486-960c-08d2df450579
Windows XP Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=3ed7f466-78c7-4251-ba24-8ae71ad54e18
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=6468a552-2194-4866-97d5-ff77ae205eea
Windows Server 2003 Service Pack 1 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=708926e4-f8af-4533-8747-22d6536ebd66
Windows Server 2003 Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=708926e4-f8af-4533-8747-22d6536ebd66
Windows Server 2003 x64 Edition (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=26720f5a-d7e9-44b9-9330-2e9faa4af0d9
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=26720f5a-d7e9-44b9-9330-2e9faa4af0d9
Windows Server 2003 with SP1 for Itanium-based Systems (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=a8844fbb-5b2c-41f3-80f1-dce563aa7cb7
Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Outlook Express 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=a8844fbb-5b2c-41f3-80f1-dce563aa7cb7
Windows Vista (Windows Mail):
http://www.microsoft.com/downloads/details.aspx?FamilyId=b6ac8d93-adc3-4ec3-bad1-4990bd7d52b4
For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS07-056.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October 2007 Monthly Security Updates are Now Available on the ECE (KB939653)
The vulnerabilities are addressed by not allowing the browser window content to persist after navigation has occurred. Also the script error exception handling is modified so that no attempt is made to access the freed memory.
Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 5.01 Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=95827F3F-A984-4E34-A949-D16A0614121A
Microsoft Windows 2000 Service Pack 4 (Microsoft Internet Explorer 6 Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=DF3BA596-7C5B-4151-9884-6957AA884AAB
Windows XP Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=513A8320-6D36-4FC9-A38A-867192B55B53
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=AE8A26D8-1910-4B8C-8A73-6E2FA6B5B29F
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4AEFAA38-8757-4E6E-8924-57CABD1C2FC3
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=88ABA9DD-653B-4CDF-A513-CCA32A7D7E41
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft Internet Explorer 6):
http://www.microsoft.com/downloads/details.aspx?FamilyId=309A8F10-C7EA-4961-A969-092B0C4D7BBC
Windows XP Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4CA0AC93-BF51-40FE-A1BA-CB3E0A36D8B5
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=DBD284D0-2664-42A4-AD16-A0535244C81C
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Windows Internet Explorer 7):
http://www.microsoft.com/downloads/details.aspx?FamilyId=0A31C451-32F4-4551-AE45-D600F8B3B11B
For a complete list of patch download links, please refer to Micrsoft Security Bulletin MS07-057.
An anonymous attacker could exploit the vulnerability by sending a specially crafted RPC authentication request to a computer over the network.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
October 2007 Monthly Security Updates are Now Available on the ECE (KB933729)
Microsoft Windows 2000 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=6c7fb9a8-1d8d-4307-b5c6-bc6c28ee09de
Windows XP Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1fee539c-ab86-4298-b6f4-22ce31ee7b8b
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=ac7bd100-0a03-426b-adc8-0516c602a280
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=011593a0-f37e-4578-bee1-a985639b521b
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=e9bb8df5-f39e-4473-9d0c-e84430c7f859
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=492ae87c-047c-45c1-ad04-ee36352de85b
Windows Vista:
http://www.microsoft.com/downloads/details.aspx?FamilyId=ceca7f8c-7b56-48fc-8c17-87ffadf25629
Windows Vista x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=7625f5a4-2921-41ce-986d-4cc0c264135c
Refer to Micrsoft Security Bulletin MS07-058 for further details.
This may allow an attacker to run an arbitrary script that could result in elevation of privilege within the SharePoint site, as opposed to elevation of privilege within the workstation or server environment. Also, information disclosure is possible as it may allow an attacker to run arbitrary script to modify a user's cache.
Windows Server 2003 Service Pack 1 (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=76FC2225-2802-46E5-A294-A842E3841877
Windows Server 2003 Service Pack 2 (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=76FC2225-2802-46E5-A294-A842E3841877
Windows Server 2003 x64 Edition (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=667335DD-DF2E-4F14-A130-5758701BE055
Windows Server 2003 x64 Edition Service Pack 2 (Microsoft Windows SharePoint Services 3.0):
http://www.microsoft.com/downloads/details.aspx?FamilyId=667335DD-DF2E-4F14-A130-5758701BE055
Microsoft Office SharePoint Server 2007:
http://www.microsoft.com/downloads/details.aspx?FamilyId=AAEA9695-F541-4C4C-9107-81EAD5CFC8C9
Microsoft Office SharePoint Server 2007 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1D319164-D133-4493-BE27-1AEDA62362C4
Refer to Microsoft Security Bulletin MS07-059 for further details.
A vulnerable version of Word exists on the target host.
Microsoft Office 2000 Service Pack 3 (Microsoft Word 2000 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=8B3072FB-5933-47F7-A498-13A93E268E57
Microsoft Office XP Service Pack 3 (Microsoft Word 2002 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=D6B787BB-03FF-4F67-8B69-6011FB18BA75
Microsoft Office 2004 for Mac:
http://www.microsoft.com/mac/downloads.aspx#Office2004
Refer to Micrsoft Security Bulletin MS07-060 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.18.71-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.