Most aren't going to need this one. I didn't due to a firewall and router, and a couple other things. In all of these, always be sure to read the "Mitigating factors" area at the M$ site to see if you need the updates. -Clint
----- Original Message ----- TITLE: Microsoft Windows OLE / COM Two Vulnerabilities SECUNIA ADVISORY ID: SA14193 VERIFY ADVISORY: http://secunia.com/advisories/14193/ CRITICAL: Highly critical IMPACT: Privilege escalation, System access WHERE: >From remote OPERATING SYSTEM: Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/ Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows Millenium http://secunia.com/product/14/ Microsoft Windows 98 Second Edition http://secunia.com/product/13/ Microsoft Windows 98 http://secunia.com/product/12/ Microsoft Windows 2000 Server http://secunia.com/product/20/ Microsoft Windows 2000 Professional http://secunia.com/product/1/ Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/ Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows XP Professional http://secunia.com/product/22/ DESCRIPTION: Cesar Cerrudo has reported two vulnerabilities in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. 1) An unspecified error in the way memory is accessed when processing COM structured storage files allows malicious, local users to execute code with escalated privileges. 2) An unchecked buffer in the process that validates OLE data can be exploited to execute arbitrary code via messages containing maliciously crafted OLE objects. The following operating systems and software is affected by one or both of the vulnerabilities: Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows XP 64-Bit Edition Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium) Microsoft Windows Server 2003 Microsoft Windows Server 2003 (Itanium) Microsoft Exchange 2000 Server Microsoft Exchange Server 2003 Microsoft Exchange Server 5.0 Microsoft Exchange Server 5.5 Microsoft Windows 98 Microsoft Windows 98 Second Edition (SE) Microsoft Windows Millennium Edition (ME) Microsoft Office XP Outlook 2002 Word 2002 Excel 2002 PowerPoint 2002 FrontPage 2002 Publisher 2002 Access 2002 Microsoft Office 2003 Outlook 2003 Word 2003 Excel 2003 PowerPoint 2003 FrontPage 2003 Publisher 2003 Access 2003 InfoPath 2003 OneNote 2003 NOTE: All software is vulnerable because it uses OLE from the underlying operating system. Third party application may also be affected. SOLUTION: Apply patches. Microsoft Windows 2000 (requires Service Pack 3 or Service Pack 4): http://www.microsoft.com/downloads/details.aspx?FamilyId=84B4F65E-39D5-4521-B692-051F76F2492E Microsoft Windows XP (requires Service Pack 1 or Service Pack 2): http://www.microsoft.com/downloads/details.aspx?FamilyId=A0E59D77-8AC1-4AC0-9572-A7E1C2E4A66A Microsoft Windows XP 64-Bit Edition (requires Service Pack 1) (Itanium): http://www.microsoft.com/downloads/details.aspx?FamilyId=F80EABC3-6D39-4532-9178-7967626977EE Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium): http://www.microsoft.com/downloads/details.aspx?FamilyId=A2C9E842-551C-458E-BF19-1C2BA9F21A06 Microsoft Windows Server 2003: http://www.microsoft.com/downloads/details.aspx?FamilyId=83B97ECE-0010-443E-9353-82FFCAF73771 Microsoft Windows Server 2003 (Itanium): http://www.microsoft.com/downloads/details.aspx?FamilyId=A2C9E842-551C-458E-BF19-1C2BA9F21A06 ORIGINAL ADVISORY: MS05-012 (KB873333): http://www.microsoft.com/technet/security/bulletin/ms05-012.mspx ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
