Presentation is loading. Please wait.

Presentation is loading. Please wait.

2 New Security Bulletins and AdvisoriesNew Security Bulletins and Advisories –1 New Security Advisory –1 New Critical Bulletin –1 New Moderate Bulletin.

Similar presentations


Presentation on theme: "2 New Security Bulletins and AdvisoriesNew Security Bulletins and Advisories –1 New Security Advisory –1 New Critical Bulletin –1 New Moderate Bulletin."— Presentation transcript:

1

2 2 New Security Bulletins and AdvisoriesNew Security Bulletins and Advisories –1 New Security Advisory –1 New Critical Bulletin –1 New Moderate Bulletin Other Security ResourcesOther Security Resources –Detection and Deployment –Links Contact InformationContact Information

3 MS09-034972260 Internet Explorer Internet Explorer on Windows 2000, Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008 MS09-035969706 Visual Studio Microsoft Visual Studio.NET 2003, Microsoft Visual Studio 2005, Microsoft Visual Studio 2008, Microsoft Visual C++ 2005, Microsoft Visual C++ 2008

4 Title & KB Article: Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution Affected Software: All controls and components created using vulnerable Active Template LibraryAll controls and components created using vulnerable Active Template Library Purpose of Advisory: This advisory provides customers with Workarounds, Mitigating Factors, and Suggested Actions for the publicly disclosed vulnerabilities that are discussed Security Bulletins MS09-032, MS09-034, and MS09-035This advisory provides customers with Workarounds, Mitigating Factors, and Suggested Actions for the publicly disclosed vulnerabilities that are discussed Security Bulletins MS09-032, MS09-034, and MS09-035 ATL Information: The Active Template Library (ATL) is a set of template-based C++ classes that lets you create small, fast Component Object Model (COM) objects. ATL has special support for key COM features, including stock implementations, dual interfaces, standard COM enumerator interfaces, connection points, tear-off interfaces, and ActiveX controls. ATL Vulnerability: The issue is caused in some cases by the way ATL is used, and in other cases by the ATL code itself. In these cases, data streams may be handled incorrectly, which can lead to memory corruption, information disclosure, and instantiation of objects without regard to security policy.The issue is caused in some cases by the way ATL is used, and in other cases by the ATL code itself. In these cases, data streams may be handled incorrectly, which can lead to memory corruption, information disclosure, and instantiation of objects without regard to security policy.

5 Title & KB Article: Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution (969706) Affected Software: Visual Studio.NET 2003 SP1Visual Studio.NET 2003 SP1 Visual Studio 2005 SP1 and Visual Studio 2005 SP1 64-bit Hosted Visual C++ ToolsVisual Studio 2005 SP1 and Visual Studio 2005 SP1 64-bit Hosted Visual C++ Tools Visual Studio 2008 and Visual Studio 2008 SP1Visual Studio 2008 and Visual Studio 2008 SP1 Visual C++ 2005 SP1 Redistributable PackageVisual C++ 2005 SP1 Redistributable Package Visual C++ 2008 and Visual C++ 2008 SP1 Redistributable PackageVisual C++ 2008 and Visual C++ 2008 SP1 Redistributable Package Replaced Updates: NoneNone Vulnerabilities: CVE-2009-0901 | ATL Uninitialized Object Vulnerability CVE-2009-0901 | ATL Uninitialized Object Vulnerability CVE-2009-2493 | ATL COM Initialization Vulnerability CVE-2009-2493 | ATL COM Initialization Vulnerability CVE-2009-2495 | ATL Null String Vulnerability CVE-2009-2495 | ATL Null String Vulnerability Publicly Disclosed / and/or Exploited: These vulnerabilities have not been publicly disclosed prior to releaseThese vulnerabilities have not been publicly disclosed prior to release These vulnerabilities have not been exploited in the wild at releaseThese vulnerabilities have not been exploited in the wild at release Exploitability Index: __ 1 - Consistent exploit code likely | __ 2 - Inconsistent exploit code likely | __ 3 - Functioning exploit code unlikely

6 Vulnerability Summary: A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to an issue in the ATL headers that could allow an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized. Because of this, the attacker can control what happens when VariantClear is called during handling of an error by supplying a corrupt stream. This vulnerability only directly affects systems with components and controls installed that were built using Visual Studio ATL. This issue could allow a remote, unauthenticated user to perform remote code execution on an affected system.A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to an issue in the ATL headers that could allow an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized. Because of this, the attacker can control what happens when VariantClear is called during handling of an error by supplying a corrupt stream. This vulnerability only directly affects systems with components and controls installed that were built using Visual Studio ATL. This issue could allow a remote, unauthenticated user to perform remote code execution on an affected system. Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Mitigations: By default, Visual Studio as a product is not vulnerable to this issue. Instead, components and controls built with the vulnerable versions of ATL may be vulnerableBy default, Visual Studio as a product is not vulnerable to this issue. Instead, components and controls built with the vulnerable versions of ATL may be vulnerable Mitigating factors and Workarounds for potentially vulnerable components and controls are located in Microsoft Security Advisory (973882)Mitigating factors and Workarounds for potentially vulnerable components and controls are located in Microsoft Security Advisory (973882) Workaround:

7 Vulnerability Summary: A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to issues in the ATL headers that handle instantiation of an object from data streams. This vulnerability only directly affects systems with components and controls installed that were built using Visual Studio ATL. For components and controls built using ATL, unsafe usage of OleLoadFromStream could allow the instantiation of arbitrary objects which can bypass related security policy, such as kill bits within Internet Explorer.A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to issues in the ATL headers that handle instantiation of an object from data streams. This vulnerability only directly affects systems with components and controls installed that were built using Visual Studio ATL. For components and controls built using ATL, unsafe usage of OleLoadFromStream could allow the instantiation of arbitrary objects which can bypass related security policy, such as kill bits within Internet Explorer. Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Mitigations: By default, Visual Studio as a product is not vulnerable to this issue. Instead, components and controls built with the vulnerable versions of ATL may be vulnerableBy default, Visual Studio as a product is not vulnerable to this issue. Instead, components and controls built with the vulnerable versions of ATL may be vulnerable Mitigating factors and Workarounds for potentially vulnerable components and controls are located in Microsoft Security Advisory (973882)Mitigating factors and Workarounds for potentially vulnerable components and controls are located in Microsoft Security Advisory (973882) Workaround:

8 Vulnerability Summary: An information disclosure vulnerability exists in the Microsoft Active Template Library (ATL) that could allow a string to be read without a terminating NULL character. An attacker could manipulate this string to read extra data beyond the end of the string and thus disclose information in memory.An information disclosure vulnerability exists in the Microsoft Active Template Library (ATL) that could allow a string to be read without a terminating NULL character. An attacker could manipulate this string to read extra data beyond the end of the string and thus disclose information in memory. Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Mitigations: By default, Visual Studio as a product is not vulnerable to this issue. Instead, components and controls built with the vulnerable versions of ATL may be vulnerableBy default, Visual Studio as a product is not vulnerable to this issue. Instead, components and controls built with the vulnerable versions of ATL may be vulnerable Mitigating factors and Workarounds for potentially vulnerable components and controls are located in Microsoft Security Advisory (973882)Mitigating factors and Workarounds for potentially vulnerable components and controls are located in Microsoft Security Advisory (973882) Workaround:

9 Affected Platform Windows Update Microsoft Update MBSA 2.1 WSUS 3.0 WSUS 3.0 SMS SUSFP SMS ITMU SCCM 2007 Visual Studio.NET 2003 NoNoNoNoYesNoNo Visual Studio 2005 NoYesYesYesNoYesYes Visual Studio 2005 64-bit Hosted Visual C++ Tools NoYesYesYesNoYesYes Visual Studio 2008 NoYesYesYesNoYesYes Visual C++ 2005 Redistributable Package NoYesYesYesNoYesYes Visual C++ 2008 Redistributable Package NoYesYesYesNoYesYes

10 Restart Requirement: You MUST restart your system after you apply this security updateYou MUST restart your system after you apply this security update Installation and Removal: Use Add / Remove Programs tool in Control PanelUse Add / Remove Programs tool in Control Panel More Information: For more Information, please review these links: Microsoft Security Bulletin MS09-035 http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Microsoft Knowledge Base Article (969706) http://support.microsoft.com/kb/969706 http://support.microsoft.com/kb/969706

11

12 Title & KB Article: Cumulative Security Update for Internet Explorer (972260) Affected Software: IE 5.01 and IE 6 SP1 on Windows 2000 (All Supported Versions)IE 5.01 and IE 6 SP1 on Windows 2000 (All Supported Versions) IE 6.0, IE 7, and IE 8 on Windows XP (All Supported Versions)IE 6.0, IE 7, and IE 8 on Windows XP (All Supported Versions) IE 6.0, IE 7, and IE 8 on Windows Server 2003 (All Supported Versions)IE 6.0, IE 7, and IE 8 on Windows Server 2003 (All Supported Versions) IE 7 and IE 8 on Windows Vista (All Supported Versions)IE 7 and IE 8 on Windows Vista (All Supported Versions) IE 7 and IE 8 on Windows Server 2008 (All Supported Versions)IE 7 and IE 8 on Windows Server 2008 (All Supported Versions) Replaced Updates: MS09-019MS09-019 Vulnerabilities: CVE-2009-1917 | Memory Corruption Vulnerability CVE-2009-1917 | Memory Corruption Vulnerability CVE-2009-1918 | HTML Objects Memory Corruption Vulnerability CVE-2009-1918 | HTML Objects Memory Corruption Vulnerability CVE-2009-1919 | Uninitialized Memory Corruption Vulnerability CVE-2009-1919 | Uninitialized Memory Corruption Vulnerability Publicly Disclosed / and/or Exploited: These vulnerabilities have not been publicly disclosed prior to releaseThese vulnerabilities have not been publicly disclosed prior to release These vulnerabilities have not been exploited in the wild at releaseThese vulnerabilities have not been exploited in the wild at release Exploitability Index: __ 1 - Consistent exploit code likely | __ 2 - Inconsistent exploit code likely | __ 3 - Functioning exploit code unlikely

13 Summary: As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL.As a defense-in-depth measure, this Internet Explorer security update helps mitigate known attack vectors within Internet Explorer for those components and controls that have been developed with vulnerable versions of ATL. : Defense-in-Depth Details: The first defense-in-depth measure is enabled by default and modifies how ATL-based ActiveX controls read persisted data. The first mitigation is a change to modify how ATL-based controls read persisted data by detecting specific call patterns that are problematic.The first defense-in-depth measure is enabled by default and modifies how ATL-based ActiveX controls read persisted data. The first mitigation is a change to modify how ATL-based controls read persisted data by detecting specific call patterns that are problematic. The second defense-in-depth measure is related to the first, but provides stronger protections and increases application compatibility risk. This defense- in-depth measure is disabled by default and offers the ability to regulate usage of IPersistStream* and IPersistStorage* interface implementations within individual controls.The second defense-in-depth measure is related to the first, but provides stronger protections and increases application compatibility risk. This defense- in-depth measure is disabled by default and offers the ability to regulate usage of IPersistStream* and IPersistStorage* interface implementations within individual controls. FEATURE_RESTRICT_OBJECT_DATA_ATTRIBUTE FEATURE_RESTRICT_OBJECT_DATA_ATTRIBUTE Additional Defense in Depth Mitigations and Workaround : By default, the majority of ActiveX controls are not included in the default allow-list for ActiveX controls in IE 7 or IE 8By default, the majority of ActiveX controls are not included in the default allow-list for ActiveX controls in IE 7 or IE 8 IE 8 offers enhanced protections by enabling DEP/NX memory protections by default for users on Windows XP SP3, Windows Vista SP1 and SP2, and Windows 7IE 8 offers enhanced protections by enabling DEP/NX memory protections by default for users on Windows XP SP3, Windows Vista SP1 and SP2, and Windows 7 IE 7 and IE 8 on Windows Vista and later operating systems run in Protected Mode by default in the Internet security zoneIE 7 and IE 8 on Windows Vista and later operating systems run in Protected Mode by default in the Internet security zone

14 Vulnerability Summary: 3 remote code execution vulnerabilities exist in the way Internet Explorer handles a memory object, handles table operations in specific situations, and accesses an object that has been deleted, which could allow an attacker to take complete control of an affected system if a user views a specially crafted Web page3 remote code execution vulnerabilities exist in the way Internet Explorer handles a memory object, handles table operations in specific situations, and accesses an object that has been deleted, which could allow an attacker to take complete control of an affected system if a user views a specially crafted Web page Attack Vectors: Maliciously Crafted Web PageMaliciously Crafted Web Page Mitigations: Users would have to be persuaded to visit a malicious web siteUsers would have to be persuaded to visit a malicious web site Exploitation only gains the same user rights as the logged on accountExploitation only gains the same user rights as the logged on account By default, all supported versions of Microsoft Outlook and Microsoft Outlook Express open HTML e-mail messages in the Restricted Sites zoneBy default, all supported versions of Microsoft Outlook and Microsoft Outlook Express open HTML e-mail messages in the Restricted Sites zone By default, IE on Windows 2003 and Windows 2008 runs in a restricted modeBy default, IE on Windows 2003 and Windows 2008 runs in a restricted mode IE 5.01 SP4 on Windows 2000 is not affected by CVE-2009-1917IE 5.01 SP4 on Windows 2000 is not affected by CVE-2009-1917 Workaround: Set Internet and local Intranet settings to High to prompt before running ActiveX and Active Scripting in these zonesSet Internet and local Intranet settings to High to prompt before running ActiveX and Active Scripting in these zones Configure IE to prompt before running ActiveX and Active ScriptingConfigure IE to prompt before running ActiveX and Active Scripting

15 *SMS SUSFP does not support Internet Explorer 7, Internet Explorer 8, Exchange Server 2007, Windows Media Player 11, Works 8.5 and 9.0, Office System 2007, OneNote 2007, Windows Vista, Windows Server 2008, or any Windows x64 or Windows ia64 systems Affected Platform Windows Update Microsoft Update MBSA 2.1 WSUS 3.0 WSUS 3.0 SMS SUSFP SMS ITMU SCCM 2007 Windows 2000 YesYesYesYesYesYesYes Windows XP YesYesYesYesYesYesYes Windows XP x64 YesYesYesYes No * YesYes Windows 2003 YesYesYesYesYesYesYes Windows 2003 x64 YesYesYesYes No * YesYes Windows 2003 ia64 YesYesYesYes No * YesYes Windows Vista YesYesYesYes No * YesYes Windows Vista x64 YesYesYesYes No * YesYes Windows 2008 YesYesYesYes No * YesYes Windows 2008 x64 YesYesYesYes No * YesYes Windows 2008 ia64 YesYesYesYes No * YesYes

16 Restart Requirement: You must restart your system after you apply this security updateYou must restart your system after you apply this security update Installation and Removal: Use Add / Remove Programs tool in Control PanelUse Add / Remove Programs tool in Control Panel Scriptable installation and removal supported (except Windows Vista and Windows Server 2008)Scriptable installation and removal supported (except Windows Vista and Windows Server 2008) More Information: For more Information, please review these links: Microsoft Security Bulletin MS09-034 http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Microsoft Knowledge Base Article (972260) http://support.microsoft.com/kb/972260 http://support.microsoft.com/kb/972260

17

18 YesYesYesYes Yes 1 YesYes NoYesYesYes No 1 YesYes 1.SMS SUSFP does not support Internet Explorer 7, Internet Explorer 8, Office System 2007, Works 8.5 & 9.0, ISA 2006, DirectX, Virtual PC and Virtual Server, Windows Vista, Windows Server 2008, or any Windows x64 or Windows ia64 systems 2.Windows Update only supports native Windows Security Update packages

19 ATL Issue Landing Page | http://www.microsoft.com/atlATL Issue Landing Page | http://www.microsoft.com/atlhttp://www.microsoft.com/atl Security Bulletin MS09-034 | http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspxSecurity Bulletin MS09-034 | http://www.microsoft.com/technet/security/Bulletin/MS09-034.mspxhttp://www.microsoft.com/technet/security/Bulletin/MS09-034.mspx Knowledge Base Article (972260) | http://support.microsoft.com/kb/972260 Knowledge Base Article (972260) | http://support.microsoft.com/kb/972260http://support.microsoft.com/kb/972260 Security Bulletin MS09-035 | http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspxSecurity Bulletin MS09-035 | http://www.microsoft.com/technet/security/Bulletin/MS09-035.mspxhttp://www.microsoft.com/technet/security/Bulletin/MS09-035.mspx Knowledge Base Article (969706) | http://support.microsoft.com/kb/969706 Knowledge Base Article (969706) | http://support.microsoft.com/kb/969706http://support.microsoft.com/kb/969706 Security Advisory 973882 | http://www.microsoft.com/technet/security/advisory/973882.mspxSecurity Advisory 973882 | http://www.microsoft.com/technet/security/advisory/973882.mspxhttp://www.microsoft.com/technet/security/advisory/973882.mspx Knowledge Base Article (973882) | http://support.microsoft.com/kb/973882 Knowledge Base Article (973882) | http://support.microsoft.com/kb/973882http://support.microsoft.com/kb/973882 MSDN ATL Guidance | http://msdn.microsoft.com/en-us/library/3ax346b7(VS.71).aspxMSDN ATL Guidance | http://msdn.microsoft.com/en-us/library/3ax346b7(VS.71).aspxhttp://msdn.microsoft.com/en-us/library/3ax346b7(VS.71).aspx ICASI / Verizon Business ATL Scan Tool | http://www.icasi.org/ICASI / Verizon Business ATL Scan Tool | http://www.icasi.org/http://www.icasi.org/ The Microsoft Security Response Center (MSRC) Blog | http://blogs.technet.com/msrcThe Microsoft Security Response Center (MSRC) Blog | http://blogs.technet.com/msrchttp://blogs.technet.com/msrc Security Research & Defense Blog | http://blogs.technet.com/srdSecurity Research & Defense Blog | http://blogs.technet.com/srdhttp://blogs.technet.com/srd The Security Development Lifecycle Blog | http://blogs.technet.com/sdlThe Security Development Lifecycle Blog | http://blogs.technet.com/sdlhttp://blogs.technet.com/sdl

20 Bulletins Links: Bulletins Links: Security Bulletins Search http://www.microsoft.com/technet/security/current.aspx Security Bulletins Search http://www.microsoft.com/technet/security/current.aspxhttp://www.microsoft.com/technet/security/current.aspx Security Advisories http://www.microsoft.com/technet/security/advisory Security Advisories http://www.microsoft.com/technet/security/advisoryhttp://www.microsoft.com/technet/security/advisory Microsoft Security Bulletin Summary for July 2009 Microsoft Security Bulletin Summary for July 2009 http://www.microsoft.com/technet/security/bulletin/ms09-jul.mspx http://www.microsoft.com/technet/security/bulletin/ms09-jul.mspxhttp://www.microsoft.com/technet/security/bulletin/ms09-jul.mspx Supplemental updated monthly reference articles: Supplemental updated monthly reference articles: KB961747 Detection and deployment guidance for Microsoft Security Updates http://support.microsoft.com/kb/961747 KB961747 Detection and deployment guidance for Microsoft Security Updates http://support.microsoft.com/kb/961747http://support.microsoft.com/kb/961747 KB894199 Description of Software Update Services and Windows Server Update Services changes in content for 2009 http://support.microsoft.com/kb/894199 KB894199 Description of Software Update Services and Windows Server Update Services changes in content for 2009 http://support.microsoft.com/kb/894199http://support.microsoft.com/kb/894199 New, Revised, and Rereleased Updates for Microsoft Products other than Microsoft Windows http://technet.microsoft.com/en-us/wsus/bb466214.aspx New, Revised, and Rereleased Updates for Microsoft Products other than Microsoft Windows http://technet.microsoft.com/en-us/wsus/bb466214.aspxhttp://technet.microsoft.com/en-us/wsus/bb466214.aspx KB890830 The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows Vista, Windows Server 2003, Windows XP, or Windows 2000 http://support.microsoft.com/kb/890830 KB890830 The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows Vista, Windows Server 2003, Windows XP, or Windows 2000 http://support.microsoft.com/kb/890830http://support.microsoft.com/kb/890830 Blogs: Blogs: MSRC Blog http://blogs.technet.com/msrc MSRC Blog http://blogs.technet.com/msrchttp://blogs.technet.com/msrc SRD Team Blog SRD Team Blog http://blogs.technet.com/srd http://blogs.technet.com/srdhttp://blogs.technet.com/srd MSRC Ecosystem Strategy Team http://blogs.technet.com/ecostrat MSRC Ecosystem Strategy Team http://blogs.technet.com/ecostrathttp://blogs.technet.com/ecostrat MMPC Team Blog MMPC Team Blog http://blogs.technet.com/mmpc http://blogs.technet.com/mmpchttp://blogs.technet.com/mmpc


Download ppt "2 New Security Bulletins and AdvisoriesNew Security Bulletins and Advisories –1 New Security Advisory –1 New Critical Bulletin –1 New Moderate Bulletin."

Similar presentations


Ads by Google