TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: All
from: Geo.
date: 2004-04-13 20:25:12
subject: April security patches

From: "Geo." 

Again I ask, why can't they roll these into a single patch?

Geo.
----------------------------

SECURITY ADVISORY

eEye Digital Security Uncovers Dangerous Vulnerabilities in Microsoft Windows
Six new vulnerabilities related to Microsoft Windows were announced today.
The discoveries include critical flaws in Windows Remote Procedure Call
(RPC), Local Security Authority Subsystem Service (LSASS), and in the
rendering of Windows Metafile (WMF) and Enhanced Metafile (EMF) image
formats. Of the six newly discovered, these four are most critical since
they allow for the remote execution of code on unpatched machines.

Systems Affected
Affected systems include all current versions of Microsoft Windows and
Windows Server 2003.

Potential Impact
These vulnerabilities could potentially allow an attacker to take complete
control of an affected system. An attacker could then take any action on
the affected system, including installing programs; viewing, changing, or
deleting data; or creating new accounts with full privileges. eEye and
Microsoft have released detailed advisories to alert Windows users of the
need to immediately secure vulnerable machines on their networks.

--------------------------------------

SEVERITY RATING AND VULNERABILITY IDENTIFIERS*:

1. RPC Runtime Library Vulnerability
  Severity: Critical - Remote Code Execution
  Impacts: Windows NT, 2000, and Windows 2003 Server

2. LSASS Vulnerability
  Severity: Critical - Remote Code Execution
  Impacts: Windows NT and 2000

3. Metafile Vulnerability
  Severity: Critical - Remote Code Execution
  Impacts: Windows NT Server 4.0, Windows NT, and 2000

4. Local Descriptor Table Vulnerability
  Severity: Important - Privilege Elevation
  Impacts:  Windows NT Server 4.0 and Windows 2000

5. Virtual DOS Machine Vulnerability
  Severity: Important - Privilege Elevation
  Impacts: Windows NT Server 4.0 and Windows 2000

6. RPCSS Service Vulnerability
  Severity: Important - Denial Of Service
  Impact: Windows 2000, XP, and Windows 2003 Server

*The above assessment is based on the types of systems that are affected by
the vulnerability, typical deployment patterns, and the effect that
exploiting the vulnerability would have on them.(source: Microsoft)

--------------------------------------

PROTECTING AGAINST THESE VULNERABILITIES

The most effective way to protect vulnerable systems is to apply the
hotfixes released by Microsoft. The hotfixes will remediate these
vulnerabilities, and can be found here:
http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx

Retina Network Security Scanner
Retina has been updated to check for all of the above vulnerabilities.
These checks are included in Retina versions 4.9.194 and higher. Retina is
the only scanner that is 100% non-intrusive and can scan remotely without
administrative access. For a comprehensive list of Retina audits click
here: http://www.eeye.com/html/mkt/gen/AprilAdv.html

Additional Information: eEye Security Bulletins Microsoft DCOM RPC Memory Leak
http://www.eeye.com/html/Research/Advisories/AD20040413A.html

Microsoft DCOM RPC Race Condition
http://www.eeye.com/html/Research/Advisories/ AD20040413B.html

Windows Local Security Authority Service Remote Buffer Overflow
http://www.eeye.com/html/Research/Advisories/ AD20040413C.html

Windows Expand-Down Data Segment Local Privilege Escalation
http://www.eeye.com/html/Research/Advisories/ AD20040413D.html

Windows VDM TIB Local Privilege Escalation
http://www.eeye.com/html/Research/Advisories/ AD20040413E.html

Windows Metafile Heap Overflow
http://www.eeye.com/html/Research/Advisories/ AD20040413F.html


--------------------------------------

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.