Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 12 vulnerabilities that were fixed in 6 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 6 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
MS07-036 addresses the following issues.
- Excel does not perform sufficient validation when denoting the start of a Workspace designation.
- Excel does not perform sufficient data validation in processing the number of active worksheets, which can result in memory corruption.
- Excel does not correctly validate version information, which can result in memory corruption.
Microsoft Office 2000 Service Pack 3 (Microsoft Excel 2000 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=83D94D8E-DDA6-4D74-B40D-476C2F0A3AF4
Microsoft Office XP Service Pack 3 (Microsoft Excel 2002 Service Pack 3):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5E09D13B-D4B0-48FD-9880-73C180570267
Microsoft Office 2003 Service Pack 2 (Microsoft Excel 2003 Service Pack 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=9D93C0CE-5124-4234-BA84-3C27005E010F
Microsoft Office 2003 Service Pack 2 (Microsoft Excel 2003 Viewer):
http://www.microsoft.com/downloads/details.aspx?FamilyId=11F42977-8828-494A-A183-D1ABA827B708
Microsoft Office 2004 for Mac (Microsoft Office 2004 for Mac):
http://www.microsoft.com/mac/downloads.aspx?pid=download&location=/mac/download/Office2004/Office2004_1136.xml&secid=4&ssid=35&flgnosysreq=True
2007 Microsoft Office System (Microsoft Office Excel 2007):
http://www.microsoft.com/downloads/details.aspx?FamilyId=9AB28283-0320-4527-B033-5E80EF32CD34
Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats:
http://www.microsoft.com/downloads/details.aspx?FamilyId=E592AE5B-09AC-4F5B-B457-A54C9850AD4A
Refer to Micrsoft Security Bulletin MS07-036 for further details.
2007 Microsoft Office System (Microsoft Office Publisher 2007):
http://www.microsoft.com/downloads/details.aspx?FamilyId=25D272E7-F2DD-4342-92BE-7EBC2E770B44
Refer to Micrsoft Security Bulletin MS07-037 for further details.
It would be possible for the attacker to gain information about the system over the network.
Windows Vista:
http://www.microsoft.com/downloads/details.aspx?FamilyId=e9b64746-6afa-4a30-833d-e058e000c821
Windows Vista x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0df5d190-3ad7-42d5-8629-43c47ec450cb
Refer to Microsoft Security Bulletin MS07-038 for further details.
Microsoft Windows 2000 Server Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=812e62c5-6e19-4b3b-8a10-861b871e1b41
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=28e84603-8159-4429-aaff-a1020531e84f
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=107902f9-be94-457f-a936-519efbd64779
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems:
http://www.microsoft.com/downloads/details.aspx?FamilyId=e5e5b425-fe7d-49d5-973f-f3fd7a1e04eb
Refer to Micrsoft Security Bulletin MS07-039 for further details.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
July 2007 Supplemental Updates (for Desktop Installer Tool) are available (KB931212)
Note: If no authentication credentials were supplied during the scan, and this vulnerability is reported as a potential threat; please re-run the scan using authentication credentials to confirm if the vulnerability exists on the target.
To manually verify the patch has been applied without running an authenticated scan, refer to the "Security Update Deployment" section of the
MS07-04 Bulletin. The bulletin contains updated file version and registry key information.
Windows 2000 Service Pack 4 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows XP Service Pack 2 and Windows XP Service Pack 3 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows XP Tablet PC Edition 2005 and Windows XP Media Center Edition 2005 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=829A2C5B-11EC-4ED7-91AB-6961034147BC
Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows Vista and Windows Vista Service Pack 1 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows Server 2008 (Microsoft .NET Framework 1.0 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=91D7AFE4-069B-4CE8-976E-9A01345A8603
Windows 2000 Service Pack 4 (Microsoft .NET Framework 1.1 ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=281FB2CD-C715-4F05-A01F-0455D2D9EBFB
For a complete list of patch download links, please refer to Microsoft Security Bulletin MS07-040.
Windows XP Embedded Systems:- For additional information regarding security updates for embedded systems, refer to the following MSDN blog(s):
August 2007 Monthly Security Updates are Now Available on the ECE (KB939373)
July 2007 Supplemental Updates (for Desktop Installer Tool) are available (KB939373)
Windows XP Professional Service Pack 2 (Microsoft Internet Information Services ):
http://www.microsoft.com/downloads/details.aspx?FamilyId=fccbfe90-f838-47df-8310-352e2fb47132
Refer to Micrsoft Security Bulletin MS07-041 for further details.
These new vulnerability checks are included in Qualys vulnerability signature 1.17.96-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.