News

Tuesday, September 11, 2007

Security Alert: 4 Microsoft Security Bulletins for September 2007

PLEASE VISIT OUR SPONSOR, WHO BRINGS YOU SECURITY ALERT FOR FREE:

ALERT: "How a Hacker Launches a SQL Injection Attack!" White Paper
It's as simple as placing additional SQL commands into a Web form
input box giving hackers complete access to all your backend systems!
Firewalls and IDS will not stop such attacks because SQL injections are
not seen as intruders. Download this *FREE* white paper from SPI
Dynamics for a complete guide to protection!

http://list.windowsitpro.com/t?ctl=65738:4160B336D0B60CB1D2614AC485C4C85C


=== SECURITY ALERT =============================================

4 Microsoft Security Bulletins for September 2007
by Orin Thomas, MVP Windows Security, orin@windowsitpro.com

Microsoft released four security updates for September, rating one of
them as critical. Here's a brief description of each update; for more
information, go to

http://list.windowsitpro.com/t?ctl=65739:4160B336D0B60CB1D2614AC485C4C85C

MS07-051: Vulnerability in Microsoft Agent Could Allow Remote Code
Execution

The attack vector for this exploit is a specially crafted URL that
targets Microsoft Agent on computers running Windows 2000 SP4

Applies to: Windows 2000 SP4.

Recommendation: Although Microsoft rates this update as critical, the
vulnerability has not been publicly disclosed. Given that the affected
component is Microsoft Agent, it's likely that nefarious third parties
will be working hard to develop an exploit for this vulnerability.
Prioritize testing of this update and deploy it on an accelerated
schedule if your organization is using this OS version.

MS07-052: Vulnerability in Crystal Reports for Visual Studio Could
Allow Remote Code Execution

The attack vector for this exploit is a specially crafted Crystal
Reports (.rpt) file. If the file is opened on a system, the system will
be vulnerable to a remote code execution attack. Such an attack can be
executed with the full rights and privileges of the currently logged on
user.

Applies to: Editions of Visual Studio that include Crystal Reports.
These are the Enterprise Architect, Enterprise Developer, and
Professional editions of Visual Studio .NET 2002 SP1 and Visual Studio
.NET 2003 (including SP1); and the Professional, Team Edition for
Software Architects, Team Edition for Software Developers, Team Suite,
and Team Edition for Software Testers editions of Visual Studio 2005
(including SP1).

Recommendation: Remind users to not open files from untrusted users.
This vulnerability has been publicly disclosed. If your organization
uses the targeted software, you should rigorously test the update and
deploy it as a part of your organization's normal patch management
cycle.

MS07-053: Vulnerability in Windows Services for UNIX Could Allow
Elevation of Privilege

The attack vector for this exploit is a specially crafted binary file
that can be used to elevate privileges on a computer running the
affected software.

Applies to: Windows Services for UNIX 3.0, Windows Services for UNIX
3.5, and Subsystem for UNIX-based Applications.

Recommendation: This exploit has been publicly disclosed, but cannot be
remotely exploited. If your organization uses the software that the
exploit targets, you should remind users not to run files from
untrusted sources, rigorously test the update, and deploy it as a part
of your organization's normal patch management cycle.

MS07-054: Vulnerability in MSN Messenger and Windows Live Messenger
could allow Remote Code Execution

The attack vector for this exploit is an incoming video chat request
made to an MSN Messenger or Windows Live Messenger client. If
unpatched, a successful exploit of this vulnerability could allow an
attacker to gain control of a target system with the full rights and
privileges of the currently logged on user.

Applies to: All versions of MSN Messenger (except MSN Messenger
7.0.0820 on Windows 2000 SP4) and all versions of Windows Live
Messenger (except Windows Live Messenger 8.1).

Recommendation: This exploit has been publicly disclosed, and it's
likely that with the release of this bulletin, nefarious third parties
will be working hard to develop an exploit. If clients in your
organization use MSN Messenger or Windows Live Messenger, prioritize
testing of this update and deploy on an accelerated schedule.


================================================================

Security UDPATE is brought to you by the Windows IT Pro Web site's
Security page (first URL below) and Security Pro VIP (second URL
below).

http://list.windowsitpro.com/t?ctl=6573C:4160B336D0B60CB1D2614AC485C4C85C

http://list.windowsitpro.com/t?ctl=6573E:4160B336D0B60CB1D2614AC485C4C85C

Subscribe to Security UPDATE at

http://list.windowsitpro.com/t?ctl=6573B:4160B336D0B60CB1D2614AC485C4C85C

Unsubscribe by clicking

http://list.windowsitpro.com/u?id=4160B336D0B60CB1D2614AC485C4C85C

Be sure to add Security_UPDATE@list.windowsitpro.com
to your antispam software's list of allowed senders.

To contact us:
About Security UPDATE content -- letters@windowsitpro.com
About technical questions -- http://list.windowsitpro.com/t?ctl=6573D:4160B336D0B60CB1D2614AC485C4C85C

About your product news -- products@windowsitpro.com
About your subscription -- windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at

http://list.windowsitpro.com/t?ctl=6573A:4160B336D0B60CB1D2614AC485C4C85C

Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2007, Penton Media, Inc. All rights reserved.

No comments:

Blog Archive