Results 1 to 12 of 12

Thread: MS Security Bulletins - Vol. 5

  1. #1
    socalgal
    Guest

    Lightbulb MS Security Bulletins - Vol. 5

    Continued from: MS Security Bulletins - Vol. 4

    ============================

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Re-release of Microsoft Security Bulletin MS99-046
    --------------------------------------------------

    In November, we withdrew a previously released patch that improved the
    randomness of TCP initial sequence numbers in Windows NT 4.0. The patch was
    withdrawn because it contained the same regression error that was present in
    Windows NT 4.0 SP6. We have eliminated the regression error and re-released
    the patch. The security bulletin has been updated and is available at
    http://www.microsoft.com/Security/Bu...s/ms99-046.asp ; the FAQ also has
    been updated and is available at
    http://www.microsoft.com/Security/Bu...s99-046faq.asp

    All versions of the original patch were affected by the regression error,
    although the error only manifested itself in certain situations. When
    applying the new patch, it's not necessary to uninstall the original patch
    first. Just install the patch as normal. Here's how to determine which
    patch to apply:
    - If you are running Windows NT 4.0 SP4 or SP5 on an Intel machine, go
    to http://www.microsoft.com/Downloads/R...eleaseID=16763 and
    select q243835sp5i.exe.
    - If you are running Windows NT 4.0 SP6 on an Intel machine, go to
    http://www.microsoft.com/Downloads/R...eleaseID=16764 and
    select q243835i.exe.
    - If you are running Windows NT 4.0 SP4 or SP5 on an Alpha machine, go
    to http://www.microsoft.com/Downloads/R...eleaseID=16763 and
    select q243835sp5a.exe.
    - If you are running Windows NT 4.0 SP6 on an Alpha machine, go
    to http://www.microsoft.com/Downloads/R...eleaseID=16764 and
    select q243835a.exe.

    We are very sorry for any inconvenience caused by the regression error, and
    will do our best to prevent similar problems in the future. Regards,

    The Microsoft Security Response Team

  2. #2
    socalgal
    Guest

    Exclamation

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-001)
    --------------------------------------

    Patch Available for "Malformed IMAP Request" Vulnerability
    Originally Posted: January 04, 2000

    Summary
    =======
    Microsoft has released a patch that eliminates a vulnerability in the
    Microsoft(r) Commercial Internet System (MCIS) Mail server. The
    vulnerability could allow a malicious user to remotely cause services on
    the server to fail, or cause arbitrary code to run on the server.

    Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bu...S00-001faq.asp

    Issue
    =====
    The IMAP service included in MCIS Mail has an unchecked buffer. If a
    malformed request containing random data were passed to the service, it
    could cause the web publishing, IMAP, SMTP, LDAP and other services to
    crash. If the malformed request contained specially crafted data, it could
    also be used to run arbitrary code on the server via a classic buffer
    overrun attack.

    Affected Software Versions
    ==========================
    - Microsoft Commercial Internet System 2.0 and 2.5.

    Patch Availability
    ==================
    - Intel:
    http://www.microsoft.com/Downloads/R...eleaseID=17124

    - Alpha:
    http://www.microsoft.com/Downloads/R...eleaseID=17122

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-001,
    http://www.microsoft.com/security/bu...S00-001faq.asp
    - Microsoft Knowledge Base (KB) article Q246731,
    MCIS: MCIS Mail Services unexpectedly stop,
    http://support.microsoft.com/support.../q246/7/31.asp
    (Note: It may take 24 hours from the original posting of this
    bulletin for the KB article to be visible.)
    - Microsoft Security Advisor web site,
    http://www.microsoft.com/security/default.asp

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical Support is available at
    http://support.microsoft.com/support...ct/default.asp

    Acknowledgments
    ===============
    Microsoft acknowledges Tristan Goode for bringing this issue to our
    attention.

    Revisions
    =========
    - January 04, 2000: Bulletin Created.


  3. #3
    Member
    Join Date
    May 1999
    Location
    nederland
    Posts
    371

    Thumbs up

    thanks for the good news ~!

    jakob buitenhuis
    the netherlands

  4. #4
    socalgal
    Guest

    Exclamation

    buitenb - you're welcome!
    =========================
    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-003)
    --------------------------------------

    Patch Available for "Spoofed LPC Port Request" Vulnerability
    Originally Posted: January 13, 2000

    Summary
    =======
    Microsoft has released a patch that eliminates a security vulnerability in
    Microsoft(r) Windows NT(r) 4.0. The vulnerability could allow a user logged
    onto a Windows NT 4.0 machine from the keyboard to become an administrator
    on the machine.

    Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bu...00-003faq.asp.

    Issue
    =====
    LPC Ports is a facility that allows LPC calls on a machine. One of the
    functions in the LPC Ports API set enables, by design, a server thread to
    impersonate a client thread on the same machine. However, a flaw in the
    validation portion of the function would allow a malicious user to create
    both the client and server threads, and manipulate the impersonation request
    to allow it to run in the context of any desired user on the local machine,
    including the System itself.

    The primary risk from this vulnerability is that a malicious user could
    exploit this vulnerability to gain additional privileges on the local
    machine. However, it also could be used to cause audit logs to indicate that
    certain actions were taken by another user. A malicious user would require
    the ability to log onto the target machine interactively and run arbitrary
    programs in order to exploit this vulnerability, and as a result,
    workstations and terminal servers would be at greatest risk.

    Affected Software Versions
    ==========================
    - Microsoft Windows NT 4.0 Workstation
    - Microsoft Windows NT 4.0 Server
    - Microsoft Windows NT 4.0 Server, Enterprise Edition
    - Microsoft Windows NT 4.0 Server, Terminal Server Edition

    Patch Availability
    ==================
    - Microsoft Windows NT 4.0 Workstation, Server and Server, Enterprise
    Edition:
    Intel:
    http://www.microsoft.com/downloads/r...eleaseID=17382
    Alpha:
    http://www.microsoft.com/downloads/r...eleaseID=17383
    - Microsoft Windows NT 4.0 Server, Terminal Server Edition:
    To be released shortly.

    NOTE: Additional security patches are available at the Microsoft Download
    Center.

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Microsoft Security Bulletin MS00-003: Frequently Asked Questions,
    http://www.microsoft.com/security/bu...00-003faq.asp.
    - Microsoft Knowledge Base (KB) article Q247869,
    Local Procedure Call may Permit Unauthorized Account Usage,
    http://support.microsoft.com/support...q247/8/69.asp.
    (Note: It may take 24 hours from the original posting of this bulletin
    for the KB article to be visible.)
    - Microsoft Security Advisor web site,
    http://www.microsoft.com/security/default.asp.

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical Support is available at http://support.microsoft.com/support...t/default.asp.

    Acknowledgments
    ===============
    Microsoft thanks Bindview's RAZOR Security Team www.bindview.com for
    reporting this issue to us and working with us to protect customers.

    Revisions
    =========
    - January 13, 2000: Bulletin Created.



  5. #5
    socalgal
    Guest

    Exclamation

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-005)
    --------------------------------------

    Patch Available for "Malformed RTF Control Word" Vulnerability
    Originally Posted: January 17, 2000

    Summary
    =======
    Microsoft has released a patch that eliminates a security vulnerability in
    the Rich Text Format (RTF) reader that ships as part of Microsoft(r)
    Windows(r) 95 and 98, and Windows NT(r) 4.0. Under certain conditions, the
    vulnerability could be used to cause email programs to crash.

    Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bu...00-005faq.asp.

    Issue
    =====
    RTF files consist of text and control information. The control information
    is specified via directives called control words. The default RTF reader
    that ships as part of many Windows platforms has an unchecked buffer in the
    portion of the reader that parses control words. If an RTF file contains a
    specially-malformed control word, it could cause the application to crash.

    Microsoft believes that this is a denial of service vulnerability only, and
    that there is no capability to use this vulnerability to run arbitrary
    code. The most serious risk from this vulnerability would result if a user
    had preview mode enabled on a mail program like Outlook, and received an
    email that exploited the vulnerability. Because preview mode causes the
    mail to be parsed without user assent, the mail program would continue to
    crash until a subsequent mail was received or the mail program was started
    with preview mode disabled.

    Affected Software Versions
    ==========================
    - Microsoft Windows 95
    - Microsoft Windows 98
    - Microsoft Windows 98 Second Edition
    - Microsoft Windows NT 4.0 Workstation
    - Microsoft Windows NT 4.0 Server
    - Microsoft Windows NT 4.0 Server, Enterprise Edition
    - Microsoft Windows NT 4.0 Server, Terminal Server Edition

    NOTE: Windows 2000 is not affected by this vulnerability.

    Patch Availability
    ==================
    - Windows 95:
    http://www.microsoft.com/windows95/downloads/contents/WUCritical/rtfcontrol/default.asp
    - Window 98:
    http://www.microsoft.com/windows98/downloads/contents/WUCritical/rtfcontrol/default.asp
    - Windows NT 4.0 Workstation, Windows NT 4.0 Server, and
    Windows NT 4.0 Server, Enterprise Edition:
    Intel:
    http://www.microsoft.com/Downloads/R...eleaseID=17510
    Alpha:
    http://www.microsoft.com/Downloads/R...eleaseID=17511
    - Windows NT 4.0 Server, Terminal Server Edition:
    To be released shortly.

    NOTE: The Windows 95 and 98 versions of the patch will also be available via
    WindowsUpdate shortly. When this happens, we will modify the bulletin to
    note this fact.

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-005,
    http://www.microsoft.com/security/bu...S00-005faq.asp
    - Microsoft Knowledge Base (KB) article Q249973,
    Default RTF File Viewer Interrupts Normal Application Processing,
    http://support.microsoft.com/support.../q249/9/73.asp
    (Note: It may take 24 hours from the original posting of this bulletin
    for this KB article to be visible.)
    - Rich Text Format (RTF) Specification and Sample RTF Reader Program,
    Version 1.5,
    http://msdn.microsoft.com/library/specs/richtextformatrtfspecificatio nsamplertfreaderprogramversion15.htm
    - Microsoft Security Advisor web site,
    http://www.microsoft.com/security/default.asp

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical
    Support is available at http://support.microsoft.com/support...t/default.asp.

    Revisions
    =========
    - January 17, 2000: Bulletin Created.


    (Note: Line breaks have been removed by poster. -socalgal)



    [This message has been edited by socalgal (edited 01-17-2000).]

  6. #6
    socalgal
    Guest

    Exclamation

    **Apologies for this late posting!
    ------

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-002)
    --------------------------------------

    Patch Available for "Malformed Conversion Data" Vulnerability
    Originally Posted: January 20, 2000

    Summary
    =======
    Microsoft has released a patch that eliminates a security vulnerability in a
    utility that converts Japanese, Korean and Chinese Microsoft(r) Word(r) 5
    documents to more-recent formats. The primary shipment vehicles for the
    utility are the Japanese, Korean and Chinese (both Simplified and
    Traditional) versions of Word and PowerPoint(r) for Windows. (A
    comprehensive listing of affected products is provided below) The
    vulnerability could allow arbitrary code to be executed on a machine that
    opened a specially-modified Word 5 document using an affected version of the
    utility.

    Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bu...S00-002faq.asp

    Issue
    =====
    Microsoft Office includes a conversion utility that converts older Word
    documents to more recent formats. The conversion utility for Word 5
    documents in East Asian languages (Japanese, Korean, Simplified Chinese and
    Traditional Chinese) has an unchecked buffer. By using a hexadecimal editor
    to insert specially-malformed information into a document, a malicious user
    could cause Word to run code of his or her choice when the document was
    opened using an affected version of the converter.

    A Word 5 converter installs by default as part of Word and PowerPoint, and
    can be installed at user behest as part of a converter pack. However, the
    vulnerability affects only the East Asian language versions of the
    converter, and only the Windows versions of them. No other language
    versions of the converter are affected, and no version of the converter for
    Macintosh is affected.

    Affected Software Versions
    ==========================
    - Microsoft Converter Pack 2000 for Windows
    - Microsoft Office 2000 for Windows with Multilanguage Pack
    - Japanese, Korean, Chinese (Simplified and Traditional) versions of:
    - Microsoft Word 97, 98 and 2000 for Windows, which is available as a
    standalone product or as part of:
    - Office 97, Office 97 Powered by Word 98, Office 2000 for Windows
    - Works Suite 2000 for Windows
    - Microsoft PowerPoint 97 and 2000 for Windows, which is available as a
    standalone product or as part of:
    - Office 97, Office 97 Powered by Word 98, Office 2000 for Windows

    Patch Availability
    ==================
    - Word 97 or 98, PowerPoint 98:
    - US: http://officeupdate.microsoft.com/do...ils/ww5pkg.htm
    - Japan: http://officeupdate.microsoft.com/ja...medData-97.htm
    - Korea: http://officeupdate.microsoft.com/ko...medData-97.htm
    - China: http://officeupdate.microsoft.com/ch...medData-97.htm
    - Taiwan: http://officeupdate.microsoft.com/ta...medData-97.htm
    - Hong Kong: http://officeupdate.microsoft.com/hk...medData-97.htm

    - Converter Pack 2000; Office 2000 with Multilanguage Pack; Word 2000,
    PowerPoint 2000:
    - US: http://officeupdate.microsoft.com/20...ils/ww5pkg.htm
    - Japan: http://officeupdate.microsoft.com/ja...medData-2K.htm
    - Korea: http://officeupdate.microsoft.com/ko...medData-2K.htm
    - China: http://officeupdate.microsoft.com/ch...medData-2K.htm
    - Taiwan: http://officeupdate.microsoft.com/ta...medData-2K.htm
    - Hong Kong: http://officeupdate.microsoft.com/hk...medData-2K.htm

    (Line breaks removed. -socalgal)

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-002,
    http://www.microsoft.com/security/bu...S00-002faq.asp
    - Microsoft Knowledge Base (KB) article Q249881,
    WD: Patch Available for "Malformed Conversion Data" Vulnerability (East
    Asian Word),
    http://support.microsoft.com/support.../q249/8/81.asp
    (Note: It may take 24 hours from the original posting of this bulletin
    for
    this KB article to be visible.)
    - Microsoft Security Advisor web site,
    http://www.microsoft.com/security/default.asp

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical
    Support is available at http://support.microsoft.com/support...ct/default.asp

    Revisions
    =========
    - January 20, 2000: Bulletin Created.


  7. #7
    KMA
    Join Date
    Nov 1999
    Location
    South Florida
    Posts
    4,067

    Thumbs down

    And people wonder why I don't like Microsoft!

  8. #8
    socalgal
    Guest

    Exclamation

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-004)
    --------------------------------------

    Patch Available for "RDISK Registry Enumeration File" Vulnerability
    Originally Posted: January 21, 2000

    Summary
    =======
    Microsoft has released a patch that eliminates a security vulnerability in
    an administrative utility that ships with Microsoft(r) Windows NT(r) 4.0,
    Terminal Server Edition. The utility creates a temporary file during
    execution that can contain security-sensitive information, but does not
    appropriately restrict access to it. As a result, a malicious user on the
    terminal server could read the file as it was being created.

    Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bu...S00-004faq.asp

    Issue
    =====
    The RDISK utility is used to create an Emergency Repair Disk (ERD) in order
    to record machine state information as a contingency against system
    failure. During execution, RDISK creates a temporary file containing an
    enumeration of the registry. The ACLs on the file allow global read
    permission, and as a result, a malicious user who knew that the
    administrator was running RDISK could open the file and read the registry
    enumeration information as it was being created. RDISK erases the file upon
    successful completion, so under normal conditions there would be no lasting
    vulnerability.

    By default, the file is not shared and therefore could not be read by other
    network users. Although the utility is provided as part of all versions of
    Windows NT 4.0, it only poses a threat in the case of terminal servers,
    because the exploit scenario requires the ability for an administrator and
    a normal user to be interactively logged onto the machine simultaneously.

    Affected Software Versions
    ==========================
    - Microsoft Windows NT 4.0, Terminal Server Edition

    Patch Availability
    ==================
    - http://www.microsoft.com/Downloads/R...eleaseID=17384

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-004,
    http://www.microsoft.com/security/bu...S00-004faq.asp
    - Microsoft Knowledge Base (KB) article Q249108,
    Registry Data Is Viewable By All Users During Rdisk Repair Update,
    http://support.microsoft.com/support.../q249/1/08.asp
    (Note: It may take 24 hours from the original posting of this
    bulletin for this KB article to be visible.)
    - Microsoft Knowledge Base (KB) article Q156328,
    Description of Windows NT Emergency Repair Disk,
    http://support.microsoft.com/support.../q156/3/28.asp
    - Microsoft Security Advisor web site,
    http://www.microsoft.com/security/default.asp

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical Support is available at http://support.microsoft.com/support...ct/default.asp

    Acknowledgments
    ===============
    Microsoft thanks Arne Vidstrom http://ntsecurity.nu for reporting this
    issue to us and working with us to protect customers.

    Revisions
    =========
    - January 21, 2000: Bulletin Created.


  9. #9
    Ultimate Member
    Join Date
    Jan 2000
    Location
    gold hills rd, dahlonega, ga, USA
    Posts
    3,328

    Lightbulb

    Thanks Socal, I also remind all to "read this first" on the Windows Update page cuz lots of items look necessary but are not relevant to your operating environment. To those who don't "like" MS products, that is your priveledge. Personally I don't care much for the open source code os's for the likelyhood of an intruder to have access to the system.. at least MS does what it can to address the issues. In the E-world all things are liquid, that is nothing is secure forever, with so many folks making new programs and wierd freaking maggots using their brilliant minds for destruction rather than a constructive usage, it's no wonder that MS has a tought time keeping up. just my $0.02 worth. DrVette md

  10. #10
    socalgal
    Guest

    Exclamation

    Thanks, DrVette. Valid advice to read carefully before using any patch/update, to make sure it applies to one's application/situation.
    ==================

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-006)
    --------------------------------------

    Patch Available for "Malformed Hit-Highlighting Argument" Vulnerability

    Originally Posted: January 26, 2000

    Summary
    =======

    Microsoft has released a patch that eliminates two security vulnerabilities
    in Microsoft(r) Index Server. The first vulnerability could allow a
    malicious user to view -- but not to change, add or delete -- files on a
    web server. The second vulnerability could reveal where web directories are
    physically located on the server.

    Frequently asked questions regarding this vulnerability and the patch can be
    found at http://www.microsoft.com/technet/sec...n/fq00-006.asp

    Issue
    =====
    This patch eliminates two vulnerabilities whose only relationship is that
    both occur in Index Server. The first is the "Malformed Hit-Highlighting
    Argument" vulnerability. The ISAPI filter that implements the
    hit-highlighting (also known as "WebHits") functionality does not adequately
    constrain what files can be requested. By providing a deliberately-malformed
    argument in a request to hit-highlight a document, it is possible to escape
    the virtual directory. This would allow any file residing on the server
    itself, and on the same logical drive as the web root directory, to be
    retrieved regardless of permissions.

    The second vulnerability involves the error message that is returned when a
    user requests a non-existent Internet Data Query file. The error message
    provides the physical path to the web directory that was contained in the
    request. Although this vulnerability would not allow a malicious user to
    alter or view any data, it could be a valuable reconnaissance tool for
    mapping the file structure of a web server.

    Affected Software Versions
    ==========================
    - Microsoft Index Server 2.0
    - Indexing Service in Windows 2000

    Patch Availability
    ==================
    Index Server 2.0:
    - Intel:
    http://www.microsoft.com/downloads/r...eleaseID=17727
    - Alpha:
    http://www.microsoft.com/downloads/r...eleaseID=17728

    Indexing Services for Windows 2000:
    - Intel:
    http://www.microsoft.com/downloads/r...eleaseID=17726

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-006,
    http://www.microsoft.com/technet/sec...n/fq00-006.asp
    - Microsoft Knowledge Base (KB) article Q251170,
    Malformed Argument in Hit-Highlighting Request Allows Access
    to Web Server Files,
    http://www.microsoft.com/technet/sup....asp?ID=251170
    - Microsoft Knowledge Base (KB) article Q252463,
    Index Server Error Message Reveals Physical Location of Web
    Directories,
    http://www.microsoft.com/technet/sup....asp?ID=252463
    - Microsoft TechNet Security web site,
    http://www.microsoft.com/technet/security

    (Note: It may take 24 hours from the original posting of this bulletin for
    the above KB articles to be visible.)

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical Support is available at http://support.microsoft.com/support...ct/default.asp

    Acknowledgments
    ===============
    Microsoft thanks David Litchfield of Cerberus Information Security,
    Ltd http://www.cerberus-infosec.co.uk for reporting the
    "Malformed Hit-Highlighting Argument" vulnerability to us and
    working with us to protect customers.

    Revisions
    =========
    - January 26, 2000: Bulletin Created.



    [This message has been edited by socalgal (edited 01-27-2000).]

  11. #11
    socalgal
    Guest

    Exclamation

    The following is a Security Bulletin from the Microsoft Product Security
    Notification Service.

    Please do not reply to this message, as it was sent from an unattended
    mailbox.
    ********************************

    Microsoft Security Bulletin (MS00-007)
    --------------------------------------

    Patch Available for "Recycle Bin Creation" Vulnerability

    Originally Posted: February 1, 2000

    Summary
    =======
    Microsoft has released a patch that eliminates a security vulnerability in
    Microsoft(r) Windows NT 4.0. Under a very daunting set of conditions, a
    malicious user could create, delete or modify files in the Recycle Bin of
    another user who shared the machine. In most cases, the vulnerability would
    not allow the malicious user to read the files unless they already had read
    permission to do so.

    Frequently asked questions regarding this vulnerability and
    the patch can be found at http://www.microsoft.com/technet/sec...n/fq00-007.asp

    Issue
    =====
    The Windows NT Recycle Bin for a given user maps to a folder, whose name is
    based on the owner's SID. The folder is created the first time the user
    deletes a file, and the owner is given sole permissions to it. However, if a
    malicious user could create the folder before the bona fide one were
    created, he or she could assign any desired permissions to it. This would
    allow him or her to create, modify or delete files in the Recycle Bin, but
    in most cases would not enable them to read files unless he or she already
    were able to.

    There are several significant limitations that would make it difficult to
    exploit this vulnerability:
    - The malicious user would need to create the bogus Recycle
    Bin before the user's bona fide one were created.
    - The malicious user would need to share a machine with the
    other user. The vulnerability would only enable the malicious
    user to take action against the Recycle Bin on the particular
    machine, and the particular partition, that was attacked.
    - The malicious user could add files to the Recycle Bin, but this
    vulnerability would not allow him or her to induce the other
    user to retrieve them.

    Affected Software Versions
    ==========================
    - Microsoft Windows NT Workstation 4.0
    - Microsoft Windows NT Server 4.0
    - Microsoft Windows NT Server 4.0, Enterprise Edition

    Patch Availability
    ==================
    - Intel:
    http://www.microsoft.com/downloads/r...eleaseID=17606
    - Alpha:
    http://www.microsoft.com/downloads/r...eleaseID=17607

    NOTE: This patch only needs to be applied to Windows NT systems using NTFS
    file volumes. The vulnerability is moot for FAT volumes, as FAT provides no
    per-user data separation by design. See the FAQ for more information.

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-007,
    http://www.microsoft.com/technet/sec...n/fq00-007.asp
    - Microsoft Knowledge Base (KB) article Q248399,
    Shared Workstation Setup may Permit Access to Recycle Bin Files.
    (A link will be posted here as soon as the article is available,
    in approximately 24 hours)
    - Microsoft TechNet Security web site.

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical Support is available at http://support.microsoft.com/support...ct/default.asp

    Acknowledgments
    ===============
    Microsoft thanks Arne Vistrom and Nobuo Miwa for reporting this issue to us
    and working with us to protect customers.

    Revisions
    =========
    - February 1, 2000: Bulletin Created.


  12. #12
    socalgal
    Guest

    Exclamation

    Patch Available for "RDISK Registry Enumeration File" Vulnerability

    Originally Posted: January 21, 2000
    Revised: February 3, 2000

    Summary
    =======

    On January 21, 2000, Microsoft released the original version of this
    bulletin, discussing a security vulnerability in a Microsoft(r) Windows
    NT(r) 4.0 administrative utility. The original version of the bulletin
    discussed the vulnerability within the context of Windows NT 4.0 Server,
    Terminal Server Edition. However, we have since learned of scenarios under
    which the vulnerability could also affect Windows NT 4.0 servers and
    workstations, and have revised the bulletin accordingly.

    The utility creates a temporary file during execution that can contain
    security-sensitive information, but does not appropriately restrict access
    to it. Under certain conditions, it could be possible for a malicious user
    to read the file as it was being created.

    Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/technet/sec...n/fq00-004.asp

    Issue
    =====
    The RDISK utility is used to create an Emergency Repair Disk (ERD) in order
    to record machine state information as a contingency against system
    failure. During execution, RDISK creates a temporary file containing an
    enumeration of the registry. The ACLs on the file allow global read
    permission, and as a result, a malicious user who knew that the
    administrator was running RDISK could open the file and read the registry
    enumeration information as it was being created. RDISK erases the file upon
    successful completion, so under normal conditions there would be no lasting
    vulnerability.

    By default, the file is not shared and therefore could not be read by other
    network users.

    Affected Software Versions
    ==========================
    - Microsoft Windows NT 4.0 Workstation
    - Microsoft Windows NT 4.0 Server
    - Microsoft Windows NT 4.0, Enterprise Edition
    - Microsoft Windows NT 4.0, Terminal Server Edition

    Patch Availability
    ==================
    Windows NT 4.0 Workstation; Windows NT 4.0 Server; Windows NT 4.0 Server,
    Enterprise Edition:
    - Intel: http://www.microsoft.com/Downloads/R...eleaseID=17745
    - Alpha: http://www.microsoft.com/Downloads/R...eleaseID=17747

    Windows NT 4.0 Server, Terminal Server Edition:
    - http://www.microsoft.com/Downloads/R...eleaseID=17384

    NOTE: Additional security patches are available at the Microsoft Download
    Center

    More Information
    ================
    Please see the following references for more information related to this
    issue.
    - Frequently Asked Questions: Microsoft Security Bulletin MS00-004,
    http://www.microsoft.com/technet/sec...n/fq00-004.asp
    - Microsoft Knowledge Base (KB) article Q249108,
    Registry Data Is Viewable By All Users After Rdisk Repair Update,
    http://www.microsoft.com/technet/sup....asp?ID=249108
    - Microsoft Knowledge Base (KB) article Q156328,
    Description of Windows NT Emergency Repair Disk,
    http://www.microsoft.com/technet/sup....asp?ID=156328
    - Microsoft Security web site,
    http://www.microsoft.com/technet/security/default.asp

    Obtaining Support on this Issue
    ===============================
    This is a fully supported patch. Information on contacting Microsoft
    Technical Support is available at http://support.microsoft.com/support...ct/default.asp

    Acknowledgments
    ===============
    Microsoft thanks Arne Vidstrom http://ntsecurity.nu for reporting this
    issue to us and working with us to protect customers.

    Revisions
    =========
    - January 21, 2000: Bulletin Created.
    - February 3, 2000: Bulletin revised to address other affected versions

    ***************
    Note: I'll start a new thread with the next Bulletin. - socalgal


    EDIT: Continued at MS Security Bulletins - Vol. 6


    [This message has been edited by socalgal (edited 02-16-2000).]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •