-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0675 -- [Win]
         MS08-038 - Vulnerability in Windows Explorer Could Allow
                           Remote Code Execution
                                9 July 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Microsoft Windows Vista
                      Microsoft Windows Server 2008
Publisher:            Microsoft
Operating System:     Windows
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-1435

Original Bulletin:  
  http://www.microsoft.com/technet/security/bulletin/ms08-038.mspx

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerability in Windows Explorer Could Allow Remote Code Execution (950582)

This security update resolves a publicly reported vulnerability in Windows 
Explorer that could allow remote code execution when a specially crafted 
saved-search file is opened and saved. If a user is logged on with 
administrative user rights, an attacker who successfully exploited this 
vulnerability could take complete control of an affected system. An attacker 
could then install programs; view, change, or delete data; or create new 
accounts with full user rights. Users whose accounts are configured to have
fewer user rights on the system could be less impacted than users who operate
with administrative user rights.

This security update is rated Important for all supported editions of Windows 
Vista and Windows Server 2008. For more information, see the subsection, 
Affected and Non-Affected Software, in this section.

The security update addresses these vulnerabilities by modifying the way that 
Windows Explorer parses saved searches. For more information about the 
vulnerability, see the Frequently Asked Questions (FAQ) subsection for the 
specific vulnerability entry under the next section, Vulnerability Information.

Recommendation. 

Microsoft recommends that customers apply the update at the earliest 
opportunity. 

Affected Software: 

    - Windows Vista and
      Windows Vista Service Pack 1
    - Windows Vista x64 Edition and
      Windows Vista x64 Edition Service Pack 1
    - Windows Server 2008 for 32-bit Systems
      (Windows Server 2008 Server Core installation affected)
    - Windows Server 2008 for x64-based Systems
      (Windows Server 2008 Server Core installation affected)
    - Windows Server 2008 for Itanium-based Systems

Non-Affected Software

    - Microsoft Windows 2000 Service Pack 4
    - Windows XP Service Pack 2 and Windows XP Service Pack 3
    - Windows XP Professional x64 Edition and 
      Windows XP Professional x64 Edition Service Pack 2
    - Windows Server 2003 Service Pack 1 and 
      Windows Server 2003 Service Pack 2
    - Windows Server 2003 x64 Edition and 
      Windows Server 2003 x64 Edition Service Pack 2
    - Windows Server 2003 with SP1 for Itanium-based Systems and 
      Windows Server 2003 with SP2 for Itanium-based Systems

Vulnerability Information

Windows Saved Search Vulnerability - CVE-2008-1435

A remote code execution vulnerability exists when saving a specially crafted
search file within Windows Explorer. This operation causes Windows Explorer 
to exit and restart in an exploitable manner.

Workaround

Workaround refers to a setting or configuration change that does not correct 
the underlying vulnerability but would help block known attack vectors before
you apply the update. Microsoft has tested the following workarounds and 
states in the discussion whether a workaround reduces functionality.

Workaround 1 

Temporarily change the file type associated with the “.search-ms” file 
extension. Enter the following command at an elevated command prompt:

assoc .search-ms=xmlfile

Impact of workaround. 

Saved-search files will open as XML files in Internet Explorer.

How to undo the workaround. Enter the following command at an elevated 
command prompt:

assoc .search-ms=SearchFolder

Workaround 2

Modify the registry to deny users the ability to open saved-search files or
to access the saved search folder.

To modify the registry key, follow these steps:

Note Using Registry Editor incorrectly can cause serious problems that may 
require you to reinstall your operating system. Microsoft cannot guarantee 
that problems resulting from the incorrect use of Registry Editor can be
solved. Use Registry Editor at your own risk. For information about how to 
edit the registry, view the "Changing Keys And Values" Help topic in Registry
Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" 
and "Edit Registry Data" Help topics in Regedt32.exe.

1. Click Start, click Run, type Regedit in the Open box, and then click OK.
2. Locate and then expand the following registry subkey:

   HKEY_CLASSES_ROOT\SearchFolder

   Click Edit, and then click Permissions

   Note Make a note of the permissions that are listed in this dialog box so 
   that you can restore them to their original values at a later time.

3. Click Advanced.
4. Click to clear the Include inheritable permissions from this object's 
   parent check box. You are prompted to click Copy, Remove, or Cancel. 
   Click Remove, and then click OK.
5. You receive a message that states that no one will be able to access this 
   registry key. Click Yes, and then click OK to close the Permissions for 
   SearchFolder dialog box.

Impact of workaround. 

Users will be unable to open saved search files or access the saved search 
folder.

How to undo the workaround. 

Restore the previously configured permissions on the registry key by clicking 
to check Include inheritable permissions from this object's parent and then 
clicking OK two times.


Workaround 3 - Unregister the SearchFolder file type.

To modify the registry key, follow these steps:

Note Using Registry Editor incorrectly can cause serious problems that may 
require you to reinstall your operating system. Microsoft cannot guarantee 
that problems resulting from the incorrect use of Registry Editor can be 
solved. Use Registry Editor at your own risk. For information about how to 
edit the registry, view the "Changing Keys And Values" Help topic in 
Registry Editor (Regedit.exe) or view the "Add and Delete Information in the 
Registry" and "Edit Registry Data" Help topics in Regedt32.exe.

Using the Interactive Method

1. Click Start, click Run, type Regedit in the Open box, and then click OK.
2. Locate and then click the following registry subkey:

   HKEY_CLASSES_ROOT\SearchFolder

3. Click the File menu and select Export.
4. In the Export Registry File dialog box, enter 
   SearchFolder_file_association_registry_backup.reg and click Save.

   Note This will create a backup of this registry key in the 
   My Documentsfolder by default.

5. Press the Delete key on the keyboard to delete the registry key. When 
   prompted to delete the registry key via the Confirm Key Delete dialog box, 
   click Yes.

Using a Managed Deployment Script

1. Create a backup copy of the registry keys by using a managed deployment 
   script that contains the following commands:

   Regedit.exe /e SearchFolder_registry_backup.reg
   HKEY_CLASSES_ROOT\SearchFolder

2. Next, save the following to a file with a .REG extension, such as 
   Delete_SearchFolder_file_association.reg:

Windows Registry Editor Version 5.00
[-HKEY_CLASSES_ROOT\SearchFolder]

3. Run the above registry script on the target machine with the following 
   command from an elevated command prompt:

   Regedit.exe /s Delete_SearchFolder_file_association.reg

Impact of workaround. 

Double-clicking on a saved search folder will no longer open a window 
displaying the search results.

How to undo the workaround:

Using the Interactive Method

1. Click Start, click Run, type Regedit in the Open box, and then click OK.
2. Click the File menu and select Import.
3. In the Import Registry File dialog box, select 
   SearchFolder_file_association_registry_backup.reg and click Open.

Using a Managed Deployment Script

Restore the original state by running the following command:

Regedit.exe /s SearchFolder_registry_backup.reg

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBSHQoXih9+71yA2DNAQIubAP+LXq7QtD1jdquKUzM6mSicaVJpF3vlEdD
NiX21PSqmmlybhWc/WrAym69po8Gf2v0DCuI3sgBVBKt7SGC74zTsW6/U+NZP/ZD
jWUA6UW3MfE+RL4PrVDhDQNwKUTGMLWLZtkziOcIMLEEzo202PSBBMek2wrTD1kr
63H22x22HbE=
=Dvv5
-----END PGP SIGNATURE-----