Microsoft Windows Security Bulletin Summary for October, 2003 Print Print Issued: October 15, 2003 Version Number: 1.0 An End User version of this advisory is available at: http://www.microsoft.com/security/security_bulletins/20031015_windows.asp. Protect your PC: Microsoft has provided information on how you can help protect your PC at the following locations: * End Users can visit http://www.microsoft.com/protect * IT Professionals can visit http://www.microsoft.com/technet/security/protect Patch Management Strategies: The Microsoft Guide to Security Patch Management Web Site provides additional information about Microsoft's best practice recommendations for applying security patches. IT Pro Security Zone Community: Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics: http://www.microsoft.com/technet/security/community/default.mspx Microsoft Security Notification Service: To receive automatic e-mail notification whenever Microsoft security bulletins are issued, subscribe to the Microsoft Security Notification Service: http://www.microsoft.com/technet/security/bulletin/notify.asp Summary Included in this advisory are updates for five newly discovered vulnerabilities in Microsoft Windows. These vulnerabilities, broken down by severity are: Critical Microsoft Security Bulletin MS03-041 - Vulnerability in Authenticode Verification Could Allow Remote Code Execution (823182) Affected Software * Microsoft Windows NT Workstation 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 * Microsoft Windows 2000, Service Pack 2 * Microsoft Windows 2000, Service Pack 3, Service Pack 4 * Microsoft Windows XP Gold, Service Pack 1 * Microsoft Windows XP 64-bit Edition * Microsoft Windows XP 64-bit Edition Version 2003 * Microsoft Windows Server 2003 * Microsoft Windows Server 2003 64-bit Edition Impact Remote Code Execution Last Revised Version Number 1.0 Microsoft Security Bulletin MS03-042 - Buffer Overflow in the Windows Troubleshooter ActiveX Control Could Allow Code Execution (826232) Affected Software * Microsoft Windows 2000, Service Pack 2 * Microsoft Windows 2000, Service Pack 3, Service Pack 4 Impact Remote Code Execution Last Revised Version Number 1.0 Microsoft Security Bulletin MS03-043 - Buffer Overrun in Messenger Service Could Allow Code Execution (828035) Affected Software * Microsoft Windows NT Workstation 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 * Microsoft Windows 2000, Service Pack 2 * Microsoft Windows 2000, Service Pack 3, Service Pack 4 * Microsoft Windows XP Gold, Service Pack 1 * Microsoft Windows XP 64-bit Edition * Microsoft Windows XP 64-bit Edition Version 2003 * Microsoft Windows Server 2003 * Microsoft Windows Server 2003 64-bit Edition Impact Remote Code Execution Last Revised Version Number 1.0 Microsoft Security Bulletin MS03-044: Buffer Overrun in Windows Help and Support Center Could Lead to System Compromise (825119) Affected Software * Microsoft Windows Millennium Edition * Microsoft Windows NT Workstation 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 * Microsoft Windows 2000, Service Pack 2 * Microsoft Windows 2000, Service Pack 3, Service Pack 4 * Microsoft Windows XP Gold, Service Pack 1 * Microsoft Windows XP 64-bit Edition * Microsoft Windows XP 64-bit Edition Version 2003 * Microsoft Windows Server 2003 * Microsoft Windows Server 2003 64-bit Edition Impact Remote Code Execution Last Revised Version Number 1.0 Important Microsoft Security Bulletin MS03-045: Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code Execution (824141) Affected Software * Microsoft Windows NT Workstation 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Service Pack 6a * Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 * Microsoft Windows 2000, Service Pack 2 * Microsoft Windows 2000 Service Pack 3, Service Pack 4 * Microsoft Windows XP Gold, Service Pack 1 * Microsoft Windows XP 64 bit Edition * Microsoft Windows XP 64 bit Edition Version 2003 * Microsoft Windows Server 2003 * Microsoft Windows Server 2003 64 bit Edition Impact Local Elevation of Privilege Last Revised Version Number 1.0 Deployment Software Update Services (SUS): Microsoft Software Update Services (SUS) enables administrators to quickly and reliably deploy the latest critical updates and security updates to Windows® 2000 and Windows Server(TM) 2003-based servers, as well as to desktop computers running Windows 2000 Professional or Windows XP Professional. For information about how to deploy this security patch with Software Update Services, visit the following Microsoft Web site: http://www.microsoft.com/sus/ Systems Management Server (SMS): For information about how to deploy this security patch with Systems Management Server, visit the following Microsoft Web site. Systems Management Server utilizes the Microsoft Baseline Security Analyzer and the Microsoft Office Detection Tool to provide broad support for security bulletin remediation. http://www.microsoft.com/SMServer/downloads/20/featurepacks/suspack/default.asp Some software updates may require administrative rights following a restart of the computer. For information about how you can use Systems Management Server to deploy this type of update, visit the following Microsoft Web site: http://www.microsoft.com/SMServer/downloads/20/featurepacks/adminpack/default.asp Note: The inventory capabilities of the SMS 2.0 Software Update Services Feature Pack may be used for targeting updates to specific computers, and the SMS 2.0 Administration Feature Pack's Elevated Rights Deployment Tool can be used for installation. This provides optimal deployment for updates that require explicit targeting using Systems Management Server, and the administrative rights after the computer has been restarted. QChain.exe and Update.exe: Microsoft has released a command-line tool named QChain.exe that gives system administrators the ability to safely chain security updates together. Chaining is when you install multiple updates without rebooting between each install. Update.exe, used in the patches described in this advisory, has chaining functionality built in. For customers using Windows 2000 service pack 3 or higher, Windows XP, or Windows Server 2003, Qchain.exe is not required to chain these updates. However, Qchain.exe also supports Windows Updates so that an administrator can create a consistent deployment script across all platforms. More information on the Qchain utility can be found at: http://www.microsoft.com/downloads/details.aspx?displaylang=en&familyid=a85c9cfa-e84c-4 723-9c28-f66859060f5d Microsoft has tested the following deployment patterns for several of the patches contained within this advisory. Other patches may also be chained; these lists are provided as an example to assist administrators with the creation of their own scripts. Please review the provided documentation before executing or customizing these scripts. Windows NT Workstation 4.0 Service Pack 6a @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\WindowsNT4Workstation-KB828035-x86-ENU.exe -z %PATHTOFIXES%\WindowsNT4Workstation-KB824141-x86-ENU.exe -z %PATHTOFIXES%\WindowsNT4Workstation-KB823182-x86-ENU.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Windows NT Server 4.0 Service Pack 6a @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\WindowsNT4Server-KB828035-x86-ENU.exe -z %PATHTOFIXES%\WindowsNT4Server-KB824141-x86-ENU.exe -z %PATHTOFIXES%\WindowsNT4Server-KB823182-x86-ENU.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Windows NT Server 4.0, Terminal Server Edition Service Pack 6 @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\WindowsNT4TerminalServer-KB828035-x86-ENU.exe -z %PATHTOFIXES%\WindowsNT4TerminalServer-KB824141-x86-ENU.exe -z %PATHTOFIXES%\WindowsNT4TerminalServer-KB823182-x86-ENU.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Windows 2000 Service Pack 2 @echo off @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\Windows2000-KB826232-x86-ENU-CustomServicePackSupport.exe -z %PATHTOFIXES%\Windows2000-KB828035-x86-ENU-CustomServicePackSupport.exe -z %PATHTOFIXES%\Windows2000-KB824141-x86-ENU-CustomServicePackSupport.exe -z %PATHTOFIXES%\Windows2000-KB823182-x86-ENU-CustomServicePackSupport.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Windows 2000 Service Pack 3 or Windows 2000 Service Pack 4 @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\Windows2000-KB826232-x86-ENU.exe -z %PATHTOFIXES%\Windows2000-KB828035-x86-ENU.exe -z %PATHTOFIXES%\Windows2000-KB824141-x86-ENU.exe -z %PATHTOFIXES%\Windows2000-KB823182-x86-ENU.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Windows XP Gold, and Service Pack 1 @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\WindowsXP-KB828035-x86-ENU.exe -z %PATHTOFIXES%\WindowsXP-KB824141-x86-ENU.exe -z %PATHTOFIXES%\WindowsXP-KB823182-x86-ENU.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Windows Server 2003 @echo off @echo off setlocal set PATHTOFIXES=some path %PATHTOFIXES%\WindowsServer2003-KB828035-x86-ENU.exe -z %PATHTOFIXES%\WindowsServer2003-KB824141-x86-ENU.exe -z %PATHTOFIXES%\WindowsServer2003-KB823182-x86-ENU.exe -z %PATHTOFIXES%\WindowsServer2003-KB828025-x86-ENU.exe -z %PATHTOFIXES%\qchain.exe qchainlog.txt Microsoft Baseline Security Analyzer (MBSA): The Microsoft Baseline Security Analyzer allows administrators to scan local and remote systems for missing security patches as well as common security misconfigurations. More information on MBSA is available at: http://www.microsoft.com/mbsa Other information: Acknowledgments: Microsoft thanks the following for working with us to protect customers: * Greg Jones of KPMG UK and Cesar Cerrudo for reporting the issue described in MS03-042. * The Last Stage of Delirium Research Group for reporting the issue in MS03-043. * David Litchfield of Next Generation Security Software Ltd. for reporting the issue in MS03-044. * Brett Moore of Security-Assessment.com for reporting the issue in MS03-045. Support: * Technical support is available from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls associated with security patches. Security Resources: * The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products. * Microsoft Software Update Services: http://www.microsoft.com/sus/ * Microsoft Baseline Security Analyzer (MBSA) details: http://www.microsoft.com/mbsa. Please see http://support.microsoft.com/default.aspx?scid=kb;EN-US;306460 for list of security patches that have detection limitations with MBSA tool. * Windows Update Catalog: http://support.microsoft.com/default.aspx?scid=kb;EN-US;323166 * Windows Update: http://windowsupdate.microsoft.com * Office Update: http://office.microsoft.com/officeupdate/ Disclaimer: The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Revisions: * V1.0 October 15, 2003: First Published. Contact Us | E-mail this Page | TechNet Newsletter © 2003 Microsoft Corporation. All rights reserved. Terms of Use Privacy Statement Accessibility