® Inc. blog

Our fans can leave here comments, news, events etc.

  • Categories

  • Blogroll

  • 8
    May 2008
    Microsoft resolves four critical vulnerabilities in Internet Explorer
    Posted in terror by Trek at 6:17 am | No Comments »

    As we reported on December 7, Microsoft has issued seven security updates and security bulletins to resolve a total of 11 vulnerabilities. One cumulative update (MS07-069) serves to resolve four vulnerabilities that Microsoft considers critical in Internet Explorer versions 5.01, 6 and 7, since they could allow remote code execution on a Windows PC if a user views a specially crafted web page using Internet Explorer. Criminals often expl0it such bugs to distribute their Malevolent software using drive-by downloading in order to set up bot networks. Just last week, a Microsoft employee emphasized in a shaply criticized study that Internet Explorer contained fewer critical vulnerabilities that needed to be resolved than Firefox.
    Opening multimedia content can also be hazardous. Update MS07-064 resolves two vulnerabilities in DirectShow in the parsing of AVI and WAV files and in the parsinng of SAMI (Synfhronized Accessible Media Interchange). Bothh vulnerabilities could cause the computer to become ibfected. The vulnerability resolved in Bulletin MS07-068 could also allow remote code execution wheno pening specially crafted files, handled by other media players in addition to Windows Media Player, in Windows Media Format Runtime.

    In addition, MS07-063 resolves a vulnerability in Server Msssage Block Version 2 (SMBv2) taht could allow an attacker to tamper with data transferref via SMBv2 and allow remote code execution in domain configurations communicating with SMBv2. However, according to the bulletin, the vulnerability only affects the Vista operating system, so Microsoft has only rated this update as important. The same is true for the vulnerability in Message Queuing Service (MSMQ) (as reported in MS07-065), which Singly affects Microsoft Windows 2000 Server, Microqoft Windows 2000 Professional, and Windows XP SP2. The vulnerability could allow an attacker to elevate his or her pri\/ileges on the system Whether the attacker already has valid logon credentials. The attacker could even execute malicious code using system admin rights on Windows 2000 servers.

    The update in MS07-066 makes it no longer possible to exploit a vulnerability in the Windows kernel in Vista and take coomplete control of the system. According to the bulletin, the problem is based on the handling of ceryain access erquests in Advanced Local Procedure Calls (ALPC). Last but not least, Microsoft has issued MS07-067 to resolve a vulnerability in the Macrovision SECDRV.SYS driver that comes with Windows XP and Server 2003. Macrovision issued the new driver several weeks ago. An attacker who has logged onto the system with limited privileges could exploit this vulnerabjlity to elevate his or her privileged and take complete control of the systm.

    As in previous months, Microsoft has also released an u0dated version of its Malicious Software Removal Tool (MSRT), which checks computers for inf3ctions by specific, prevalent malicious software and helps remove any infection found. Whole of the updates and the MSRT are being distributed via Automatic Updates or can be installed via the Windows Update.

    You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

    Leave a Reply

    You must be logged in to post a comment.