what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Technical Cyber Security Alert 2005-221A

Technical Cyber Security Alert 2005-221A
Posted Aug 10, 2005
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA05-221A - Multiple patches have been released for vulnerabilities in the Microsoft operating system. Exploitation of these vulnerabilities may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges or with the privileges of the user.

tags | advisory, remote, arbitrary, vulnerability
SHA-256 | 7a567cd5f0f8df7a08111e48ea958213952a2a6c07bb1d6a087daef2c5c39c88

Technical Cyber Security Alert 2005-221A

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Technical Cyber Security Alert TA05-221A
Microsoft Windows and Internet Explorer Vulnerabilities

Original release date: August 09, 2005
Last revised: --
Source: US-CERT

Systems Affected

* Microsoft Windows
* Microsoft Internet Explorer

For more complete information, refer to the Microsoft Security
Bulletin Summary for August, 2005.

Overview

Microsoft has released updates that address critical vulnerabilities
in Windows and Internet Explorer. Exploitation of these
vulnerabilities could allow a remote, unauthenticated attacker to
execute arbitrary code or cause a denial of service on an affected
system.

I. Description

Microsoft Security Bulletins for August, 2005 address vulnerabilities
in Windows and Internet Explorer. Further information is available in
the following Vulnerability Notes:

VU#965206 - Microsoft Internet Explorer JPEG rendering library
vulnerable to buffer overflow

Microsoft Internet Explorer contains a flaw related to JPEG image
rendering that may allow an attacker to remotely execute arbitrary
code.
(CAN-2005-1988)


VU#959049 - Several COM objects cause memory corruption in Internet
Explorer

Microsoft Internet Explorer allows instantiation of non-ActiveX COM
objects, which may allow an attacker to execute arbitrary code or
crash Internet Explorer.
(CAN-2005-1990)


VU#998653 - Microsoft Plug and Play contains a buffer overflow
vulnerability

Microsoft Plug and Play contains a flaw in the handling of message
buffers that may result in a local or remote denial-of-service
condition and arbitrary code execution.
(CAN-2005-1983)


VU#490628 - Microsoft Remote Desktop Protocol service contains an
unspecified vulnerability

An input validation error in the Microsoft Remote Desktop Protocol
(RDP) service may allow a remote attacker to cause a denial-of-service
condition.
(CAN-2005-1218)


VU#220821 - Microsoft Print Spooler service contains a buffer overflow

A buffer overflow in the Microsoft Print Spooler service may allow a
remote attacker to execute arbitrary code on a vulnerable system.
(CAN-2005-1984)

II. Impact

Exploitation of these vulnerabilities may allow a remote,
unauthenticated attacker to execute arbitrary code with SYSTEM
privileges or with the privileges of the user. If the user is logged
on with administrative privileges, the attacker could take complete
control of an affected system. An attacker may also be able to cause a
denial of service.

III. Solution

Apply Updates

Microsoft has provided the updates for these vulnerabilities in the
Security Bulletins and on the Microsoft Update site.

Workarounds

Please see the individual Vulnerability Notes for workarounds.

Appendix A. References

* Microsoft Security Bulletin Summary for August, 2005 -
<http://www.microsoft.com/technet/security/bulletin/ms05-aug.mspx>

* US-CERT Vulnerability Note VU#965206 -
<http://www.kb.cert.org/vuls/id/965206>

* US-CERT Vulnerability Note VU#959049 -
<http://www.kb.cert.org/vuls/id/959049>

* US-CERT Vulnerability Note VU#998653 -
<http://www.kb.cert.org/vuls/id/998653>

* US-CERT Vulnerability Note VU#490628 -
<http://www.kb.cert.org/vuls/id/490628>

* US-CERT Vulnerability Note VU#220821 -
<http://www.kb.cert.org/vuls/id/220821>

* CAN-2005-1988 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1988>

* CAN-2005-1990 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1990>

* CAN-2005-1983 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1983>

* CAN-2005-1218 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1218>

* CAN-2005-1984 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1984>

* Microsoft Update - <https://update.microsoft.com/microsoftupdate>

* Microsoft Update Overview -
<http://www.microsoft.com/technet/prodtechnol/microsoftupdate/defa
ult.mspx>
_________________________________________________________________

Feedback can be directed to the US-CERT Technical Staff.

Please send mail to cert@cert.org with the subject:

"TA05-221A Feedback VU#959049"
_________________________________________________________________

This document is available at

<http://www.us-cert.gov/cas/techalerts/TA05-221A.html>
_________________________________________________________________

Produced 2005 by US-CERT, a government organization.
_________________________________________________________________

Terms of use:

<http://www.us-cert.gov/legal.html>
_________________________________________________________________

Revision History

August 09, 2005: Initial Release



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQvk4zxhoSezw4YfQAQKraAf/b5uL0gaNUl6kICwCTHqpvqik4vW/k6h6
6wmx8K/r1cxQibBE4+3JZ0TxTLaa3nJIDoX7Q/MQxvlOowDd2OMh73Lf/Vm3+myj
V+IMm1bq7EjgJ5o3AbailAzHYwuju+SGNODS8X94BtLkVVlTE6kT4It9FU6oV0Wf
ktkJkuMUxc6tvvi/QutC8Xi5mZZS9FgpAZxJthZhEZ94Qq1ftMrjQeFnEQnzEGLs
kT0CA7pNb8PReO19s9gfdiLiEPhHhBx0A9HFC3+1K7/FurYFblXmVaPi9iMdeIdF
JSGbequI70AjZnl8PcLj22wngqPKez25SvBZemg4HBEdSYA3mBWK1g==
=kIj8
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close