Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Response

Microsoft Patch Tuesday for June 2008

Created: 10 Jun 2008 23:58:54 GMT • Updated: 23 Jan 2014 18:40:56 GMT
Robert Keith's picture
0 0 Votes
Login to vote

Hello and welcome to this month’s blog on the Microsoft patch releases. The vendor is releasing seven bulletins that cover a total of 10 vulnerabilities. Of those, four are rated “Critical”, four are rated “Important”, and two are rated “Moderate.” While most of the critical vulnerabilities are the ever popular client-side issues (DirectX and Internet Explorer), the remaining issue in Bluetooth could allow an attacker within physical range of an affected computer to exploit the issue and take complete control of that computer. The remaining issues affect WINS, Active Directory, Speech API, and PGM.

As always, customers are advised to follow security best practices, specifically:

 

-         Disable any unnecessary services.

-         Avoid sites of unknown or questionable integrity.

 

Microsoft’s summary of the June releases can be found here:

http://www.microsoft.com/technet/security/bulletin/ms08-jun.mspx

 

1. MS08-030 Vulnerability in Bluetooth Stack could allow Remote Code Execution (951376)

 

CVE-2008-1453 (BID 29522) Microsoft Windows Bluetooth Stack Remote Code Execution Vulnerability (MS Rating: Critical / Symantec Urgency Rating: 8.2/10)

 

A remote code-execution vulnerability affects the Microsoft Windows Bluetooth stack when handling a flood of specially crafted service description requests. An attacker can exploit this issue by sending malformed requests to the vulnerable computer. A successful attack will result in a complete compromise.

 

Affects: Windows XP SP2 and SP3, Windows XP Professional x64 Edition, Windows XP Professional x64 Edition SP2, Windows Vista, Windows Vista SP1, Windows Vista x64 Edition, and Windows Vista x64 Edition SP1

 

2. MS08-033 Vulnerabilities in DirectX Could Allow Remote Code Execution (951698)

 

CVE-2008-0011 (BID 29581) Microsoft DirectX MJPEG Video Streaming Remote Code Execution Vulnerability (MS Rating: Critical / Symantec Urgency Rating: 7.1/10)

 

A remote code execution vulnerability affects the Windows MJPEG Codec when doing error checking on MJPEG streams in AVI and ASF files. An attacker must trick a victim into playing a malicious file to exploit this issue. A successful exploit will result in the execution of attacker-supplied code in the context of the currently logged-in user.

 

Affects: DirectX 8.1, DirectX 9.0, DirectX 9.0b, DirectX 9.0c, DirectX 10.0, Windows XP SP2 and SP3, Windows XP Professional x64 Edition, Windows XP Professional x64 Edition SP2, Windows Server 2003 SP1 and SP2, Windows Server 2003 x64 Edition, Windows Server 2003 x64 Edition SP2, Windows Server 2003 with SP1 and SP2 for Itanium-based Systems, Windows Vista, Windows Vista SP1, Windows Vista x64 Edition, Windows Vista x64 Edition SP1, and Windows Server 2008 for 32-bit Systems, x64-based Systems, and Itanium-based Systems

 

CVE- 2008-1444 (BID 29578) Microsoft DirectX SAMI File Parsing Remote Code Execution Vulnerability (MS Rating: Critical / Symantec Urgency Rating: 7.1/10)

 

A remote code execution vulnerability affects DirectX when parsing the parameters of  SAMI (Synchronized Accessible Media Interchange) file types. An attacker can exploit this issue by enticing a victim into viewing a specially crafted web page or into opening a malicious file. A successful attack will result in the execution of arbitrary code in the context of the currently logged-in user.

 

Affects: DirectX 7.0, and DirectX 8.1

 

3. MS08-031 Cumulative Security Update for Internet Explorer (950759)

 

CVE-2008-1442 (BID 29556) Microsoft Internet Explorer HTML Objects Unexpected Method Calls Remote Code Execution Vulnerability (MS Rating: Critical / Symantec Urgency Rating: 7.1/10)</strong>

 

A remote code execution vulnerability affects Internet Explorer when handling certain method calls to HTML objects. An attacker must trick a victim into viewing a web page containing malicious content to exploit this issue. A successful exploit will result in the execution of arbitrary code in the contextof the currently logged-in user.

 

Affects: Internet Explorer 6, 6 SP1, and 7

 

CVE-2008-1544 (BID 28379) Microsoft Internet Explorer 'setRequestHeader()' Multiple Vulnerabilities (MS Rating: Important / Symantec Urgency Rating: 7.4/10)

 

This is a publicly known vulnerability in Internet Explorer, initially documented in BID 28379 on March 21, 2008. The problem occurs in the 'setRequestHeader' function of the 'XmlHttpRequest' object. An attacker can exploit this issue by tricking a victim into viewing a web page containing malicious content. A successful exploit will allow an attacker to bypass the same origin policy to gain access to potentially sensitive information.

 

Affects: Internet Explorer 5.01, 6, 6 SP1, and 7

 

4. MS08-034 Vulnerability in WINS Could Allow Elevation of Privilege (948745)

 

CVE-2008-1451 (BID 29588) Microsoft Windows WINS Server Local Privilege Escalation Vulnerability (MS Rating: Important / Symantec Urgency Rating: 6.6/10)

 

A local privilege escalation vulnerability affects WINS when handling malformed packets. An attacker with local access could send a malicious packet to the vulnerable server to execute code with elevated privileges.

 

Affects: Microsoft Windows 2000 Server SP4, Windows Server 2003 SP1 and SP2, Windows Server 2003 x64 Edition, Windows Server 2003 x64 Edition SP2, and Windows Server 2003 SP1 and SP2 for Itanium-based Systems.

 

5. MS08-032 Cumulative Security Update of ActiveX Kill Bits (950760)

 

CVE-2007-0675 (BID 22359) Microsoft Windows Vista Voice Recognition Command Execution Vulnerability (MS Rating: Moderate / Symantec Urgency Rating: 7.6/10)

 

This is a publicly known vulnerability in ActiveX Speech Components (‘sapi.dll’), initially documented in BID 22359 on February 1, 2007. The problem occurs because the speech recognition software may respond to vocal commands issued from an audio file. An attacker must trick a victim into viewing a malicious web page to exploit this issue. A successful exploit will result in the execution of arbitrary commands in the context of the currently logged-in user.

 

Affects: Windows 2000 SP4, Windows XP SP2 and SP3, Windows XP Professional x64 Edition, Windows XP Professional x64 Edition SP2, Windows Server 2003 SP1 and SP2, Windows Server 2003 x64 Edition, Windows Server 2003 x64 Edition SP2, Windows Server 2003 SP1 and SP2 for Itanium-based Systems, Windows Vista, Windows Vista SP1, Windows Vista x64 Edition, Windows Vista x64 Edition SP1, and Windows Server 2008 for 32-bit Systems, x64-based Systems, and Itanium-based Systems

 

This update also sets the kill bit for a third-party ActiveX application from BackWeb (BID 29558 Backweb 'LiteInstActivator.dll' ActiveX Control Remote Code Execution Vulnerability).

 

6. MS08-036 Vulnerabilities in Pragmatic General Multicast (PGM) Could Allow Denial of Service (950762)

 

CVE-2008-1440 (BID 29508) Microsoft Windows PGM Invalid Length Remote Denial of Service Vulnerability (MS Rating: Important / Symantec Urgency Rating: 5.7/10)

 

A denial-of-service vulnerability affects PGM (Pragmatic General Multicast), a protocol used in MSMQ (Microsoft Message Queuing), when handling malformed packets. Specifically, the protocol’s parsing code does not properly validate the option field length of a PGM packet. A remote attacker can exploit this issue to cause a vulnerable computer to become unresponsive, and require a reboot.

 

Affects: Windows XP SP2 and SP3, Windows XP Professional x64 Edition, Windows XP Professional x64 Edition SP2, Windows Server 2003 SP1 and SP2, Windows Server 2003 x64 Edition, Windows Server 2003 x64 Edition SP2, and Windows Server 2003 SP1 and SP2 for Itanium-based Systems

 

CVE-2008-1441 (BID 29509) Microsoft Windows PGM Invalid Fragment Remote Denial of Service Vulnerability (MS Rating: Moderate / Symantec Urgency Rating: 5.7/10)

 

A denial-of-service vulnerability affects PGM (Pragmatic General Multicast), a protocol used in MSMQ (Microsoft Message Queuing), when handling malformed packets with an invalid fragment option. An attacker can exploit this issue by sending a continuous stream of malformed packets to a vulnerability computer causing the computer to become unresponsive.

 

Affects: Windows XP SP2 and SP3, Windows XP Professional x64 Edition, Windows XP Professional x64 Edition SP2, Windows Server 2003 SP1 and SP2, Windows Server 2003 x64 Edition, Windows Server 2003 x64 Edition SP2, Windows Server 2003 SP1 and SP2 for Itanium-based Systems, Windows Vista, Windows Vista SP1, Windows Vista x64 Edition, Windows Vista x64 Edition SP1, and Windows Server 2008 for 32-bit Systems, x64-based Systems, and Itanium-based Systems

 

7. MS08-035 Vulnerability in Active Directory Could Allow Denial of Service (953235)

 

CVE-2008-1445 (BID 29584) Microsoft Windows Active Directory LDAP Request Validation Remote Denial Of Service Vulnerability (MS Rating: Important / Symantec Urgency Rating: 7.1/10)

 

A denial of service vulnerability affects Active Directory when validating malformed LDAP requests. An attacker can exploit this issue by sending a specially crafted LDAP packet to a vulnerable server. The attacker will require authentication credentials to exploit this issue on all systems except Windows 2000 server. A successful exploit will result in a restart of the vulnerable computer.

 

Affects: Active Directory, ADAM (Active Directory Application Mode), and AD LDS (Active Directory Lightweight Directory Services)

 

More information on this and other vulnerabilities is available at Symantec’s free SecurityFocus portal and to our customers through the DeepSight Threat Management System.