Date: 12 November 2003
References: AU-2003.019 AL-2004.024 ESB-2004.0650
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2003.0775 -- CIAC BULLETIN O-021
Microsoft Cumulative Security Update for Internet Explorer
12 November 2003
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Internet Explorer 6 SP1
Internet Explorer 6 SP1 (64-Bit Edition)
Internet Explorer 6
Internet Explorer 5.5 SP2
Internet Explorer 5.01 SP4
Internet Explorer 5.01 SP3
Internet Explorer 5.01 SP2
Publisher: CIAC
Operating System: Windows 2003 Server
Windows XP
Windows 2000 SP2/SP3/SP4
Windows NT Terminal Server Edition SP6
Windows NT
Windows ME
Windows 98SE
Windows 98
Impact: Execute Arbitrary Code/Commands
Access Required: Remote
CVE Names: CAN-2003-0814 CAN-2003-0815 CAN-2003-0816
CAN-2003-0817 CAN-2003-0823
See the Microsoft site for more information:
http://www.microsoft.com/technet/security/bulletin/MS03-048.asp
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
__________________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
__________________________________________________________
INFORMATION BULLETIN
Microsoft Cumulative Security Update for Internet Explorer
[MS03-048]
November 11, 2003 18:00 GMT Number O-021
______________________________________________________________________________
PROBLEM: There are three new vulnerabilities:
1) A cross-domain security model problem could result in the
execution of script in the My Computer zone.
2) The way zone information is passed to an XML object within
Internet Explorer could allow an attacker to read local files on
a user's system.
3) While performing a drag-and-drop operation during dynamic HTML
(DHTML) events in Internet Explorer, files could be saved in a
target locaiton on the user's system.
SOFTWARE: Microsoft Windows 98
Microsoft Windows 98 Second Edition
Microsoft Windows Millemmium Edition
Microsoft Windows NT Workstation 4.0 Service Pack 6a
Microsoft Windows NT Server 4.0 Service Pack 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition, Service
Pack 6
Microsoft Windows 2000 Service Pack 2, Service Pack 3, Service
Pack 4
Microsoft Windows XP, Microsoft Windows XP Service Pack 1
Microsoft Windows XP 64-Bit Edition
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows Server 2003
Microsoft Windows Server 2003, 64-Bit Edition
Affected Components:
Internet Explorer 6 Service Pack 1
Internet Explorer 6 Service Pack 1 (64-Bit Edition)
Internet Explorer 6 Service Pack 1 for Windows Server 2003
Internet Explorer 6 Service Pack 1 for Windows Server 2003
(64-Bit Edition)
Internet Explorer 6 Internet Explorer 5.5 Service Pack 2
Internet Explorer 5.01 Service Pack 4
Internet Explorer 5.01 Service Pack 3
Internet Explorer 5.01 Service Pack 2
DAMAGE: 1) An attacker having a malicious web site could access files
on a user's system and run arbitrary code as the currently
logged on user.
2) An attacker having a malicious web site could read local
files that are in a known location on the user's system.
3) An attacker having a malicious web site could persuade a user
to click a link causing code of the attacker's choice to be
saved on the user's computer in a targeted location.
SOLUTION: Install the security update immediately.
NOTE--This is a cumulative update that includes all previous
updates to Internet Explorer. This update replaces the one that
is provided in MS03-040 (CIAC Bulletin O-002) which is itself a
cumulative update.
______________________________________________________________________________
VULNERABILITY The risk is HIGH. An attacker would gain privileges up to and
ASSESSMENT: including Administrator.
______________________________________________________________________________
LINKS:
CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-021.shtml
ORIGINAL BULLETIN: Microsoft Security Bulletin MS03-048
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-048.asp
CVE/CAN: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=
CVE-2003-0814 CVE-2003-0815 CVE-2003-0816 CVE-2003-0817
CVE-2003-0823
______________________________________________________________________________
- -----BEGIN PGP SIGNATURE-----
Version: 4.0 Business Edition
iQCVAwUBP7FftrnzJzdsy3QZAQF0LQP8DXd8SgaLF3CWi5g/BwdT21IgMhS//1hz
/oNaJl+eQj6Ovm7KFb9QXh36v+O94LiaNSpLkDmKCmqCwOqoLle/WPsFOky0dITx
LZNnMzj5Gu1FkTBPlDaySPKblBpnjnRXXvohZZ9QsZUbUu9QvivAd9MVznhmDZZi
VOqEhI6EJEg=
=eRVM
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBP7F9wyh9+71yA2DNAQHqAAP/SEkm5FLbNx1H+5SzupypjrA+bg9VIhBD
aU3aGt0FKw3tJfScaoYDyqtSpFLC6MarEdXxAhj88DBW5wlYTEcwmhNj/xnBHV5W
92NT/XFKzDdmSy0QYj1jaBs4ZQ3/bNiSAHshal3BU/Tavd3SwZyNo0iNpufDJHoa
oYlk/GUkrZQ=
=IxUM
-----END PGP SIGNATURE-----
|