| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | April security patches |
From: "Geo." Again I ask, why can't they roll these into a single patch? Geo. ---------------------------- SECURITY ADVISORY eEye Digital Security Uncovers Dangerous Vulnerabilities in Microsoft Windows Six new vulnerabilities related to Microsoft Windows were announced today. The discoveries include critical flaws in Windows Remote Procedure Call (RPC), Local Security Authority Subsystem Service (LSASS), and in the rendering of Windows Metafile (WMF) and Enhanced Metafile (EMF) image formats. Of the six newly discovered, these four are most critical since they allow for the remote execution of code on unpatched machines. Systems Affected Affected systems include all current versions of Microsoft Windows and Windows Server 2003. Potential Impact These vulnerabilities could potentially allow an attacker to take complete control of an affected system. An attacker could then take any action on the affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. eEye and Microsoft have released detailed advisories to alert Windows users of the need to immediately secure vulnerable machines on their networks. -------------------------------------- SEVERITY RATING AND VULNERABILITY IDENTIFIERS*: 1. RPC Runtime Library Vulnerability Severity: Critical - Remote Code Execution Impacts: Windows NT, 2000, and Windows 2003 Server 2. LSASS Vulnerability Severity: Critical - Remote Code Execution Impacts: Windows NT and 2000 3. Metafile Vulnerability Severity: Critical - Remote Code Execution Impacts: Windows NT Server 4.0, Windows NT, and 2000 4. Local Descriptor Table Vulnerability Severity: Important - Privilege Elevation Impacts: Windows NT Server 4.0 and Windows 2000 5. Virtual DOS Machine Vulnerability Severity: Important - Privilege Elevation Impacts: Windows NT Server 4.0 and Windows 2000 6. RPCSS Service Vulnerability Severity: Important - Denial Of Service Impact: Windows 2000, XP, and Windows 2003 Server *The above assessment is based on the types of systems that are affected by the vulnerability, typical deployment patterns, and the effect that exploiting the vulnerability would have on them.(source: Microsoft) -------------------------------------- PROTECTING AGAINST THESE VULNERABILITIES The most effective way to protect vulnerable systems is to apply the hotfixes released by Microsoft. The hotfixes will remediate these vulnerabilities, and can be found here: http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx Retina Network Security Scanner Retina has been updated to check for all of the above vulnerabilities. These checks are included in Retina versions 4.9.194 and higher. Retina is the only scanner that is 100% non-intrusive and can scan remotely without administrative access. For a comprehensive list of Retina audits click here: http://www.eeye.com/html/mkt/gen/AprilAdv.html Additional Information: eEye Security Bulletins Microsoft DCOM RPC Memory Leak http://www.eeye.com/html/Research/Advisories/AD20040413A.html Microsoft DCOM RPC Race Condition http://www.eeye.com/html/Research/Advisories/ AD20040413B.html Windows Local Security Authority Service Remote Buffer Overflow http://www.eeye.com/html/Research/Advisories/ AD20040413C.html Windows Expand-Down Data Segment Local Privilege Escalation http://www.eeye.com/html/Research/Advisories/ AD20040413D.html Windows VDM TIB Local Privilege Escalation http://www.eeye.com/html/Research/Advisories/ AD20040413E.html Windows Metafile Heap Overflow http://www.eeye.com/html/Research/Advisories/ AD20040413F.html -------------------------------------- --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.