|
|
|
DirectX
|
ActiveMac
|
Downloads
|
Forums
|
Interviews
|
News
|
MS Games & Hardware
|
Reviews
|
Support Center
|
Windows 2000
|
Windows Me
|
Windows Server 2003
|
Windows Vista
|
Windows XP
|
|
|
|
News Centers
|
Windows/Microsoft
|
DVD
|
Apple/Mac
|
Xbox
|
News Search
|
|
|
|
ActiveXBox
|
Xbox News
|
Box Shots
|
Inside The Xbox
|
Released Titles
|
Announced Titles
|
Screenshots/Videos
|
History Of The Xbox
|
Links
|
Forum
|
FAQ
|
|
|
|
Windows
XP
|
Introduction
|
System Requirements
|
Home Features
|
Pro Features
|
Upgrade Checklists
|
History
|
FAQ
|
Links
|
TopTechTips
|
|
|
|
FAQ's
|
Windows Vista
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows Server 2002
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
Xbox 360
|
DirectX
|
DVD's
|
|
|
|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 5
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|
|
|
|
ActiveDVD
|
DVD News
|
DVD Forum
|
Glossary
|
Tips
|
Articles
|
Reviews
|
News Archive
|
Links
|
Drivers
|
|
|
|
Latest Reviews
|
Xbox/Games
|
Fallout 3
|
|
Applications
|
Windows Server 2008 R2
|
Windows 7
|
|
Hardware
|
iPod Touch 32GB
|
|
|
|
Latest Interviews
|
Steve Ballmer
|
Jim Allchin
|
|
|
|
Site News/Info
|
About This Site
|
Affiliates
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
News Archive
|
Site Search
|
Awards
|
|
|
|
Credits
©1997-2012, Active Network, Inc. All Rights Reserved.
Please click
here
for full terms of use and restrictions or read our Light Tower
Privacy
Statement.
|
|
|
|
|
Microsoft
Security Bulletin Summary List 2002
Security Bulletin Name,
Brief Description
|
ID Number, Date/Link
|
Unchecked Buffer in Windows Shell Could Enable
System Compromise: The Windows Shell is responsible for
providing the basic framework of the Windows user interface
experience. It is most familiar to users as the Windows Desktop, but
also provides a variety of other functions to help define the user's
computing session, including organizing files and folders, and
providing the means to start applications.
An unchecked buffer exists in one of the functions used
by the Windows Shell to extract custom attribute information from
audio files. A security vulnerability results because it is possible
for a malicious user to mount a buffer overrun attack and attempt to
exploit this flaw. |
(MS02-072) |
December 18, 2002 |
|
(MS02-071) |
December 12, 2002 |
|
(MS02-070) |
December 12, 2002 |
|
(MS02-069) |
December 12, 2002 |
|
(MS02-068) |
December 04, 2002 |
|
(MS02-067) |
December 04, 2002 |
|
(MS02-066) |
November 20, 2002 |
|
(MS02-065) |
November 20, 2002 |
|
(MS02-064) |
October 31, 2002 |
|
(MS02-063) |
October 31, 2002 |
|
(MS02-062) |
October 31, 2002 |
|
(MS02-061) |
October 16, 2002 |
|
(MS02-060) |
October 16, 2002 |
|
(MS02-059) |
October 16, 2002 |
|
(MS02-058) |
October 12, 2002 |
|
(MS02-057) |
October 2, 2002 |
Cumulative Patch for SQL Server:
|
(MS02-056) |
October 02, 2002 |
Unchecked Buffer in Windows Help Facility Could Enable
Code Execution: |
(MS02-055) |
October 02, 2002 |
Unchecked Buffer in File Decompression Functions Could
Lead to Code Execution: |
(MS02-054) |
October 02, 2002 |
|
(MS02-053) |
September 25, 2002 |
Flaw in Microsoft VM JDBC Classes Could Allow Code Execution:
|
(MS02-052) |
September 18, 2002 |
Cryptographic Flaw in RDP Protocol can Lead to Information
Disclosure: |
(MS02-051) |
September 18, 2002 |
Certificate Validation Flaw Could Enable Identity Spoofing:
|
(MS02-050) |
September 04, 2002 |
Flaw Could Enable Web Page to Launch Visual FoxPro 6.0
Application Without Warning: |
(MS02-049) |
September 04, 2002 |
Flaw in Certificate Enrollment Control Could Allow Deletion
of Digital Certificates: |
(MS02-048) |
August 28, 2002 |
Cumulative Patch for Internet Explorer:
|
(MS02-047) |
August 22, 2002 |
Buffer Overrun in TSAC ActiveX Control Could Allow Code
Execution: |
(MS02-046) |
August 22, 2002 |
|
(MS02-045) |
August 22, 2002 |
Unsafe Functions in Office Web Components:
The Office Web Components (OWC) contain several ActiveX controls
that give users limited functionality of Microsoft Office in a web browser
without requiring that the user install the full Microsoft Office application.
This allows users to utilize Microsoft Office applications in situations
where installation of the full application is infeasible or undesirable.
The control contains three security vulnerabilities, each
of which could be exploited either via a web site or an HTML mail.
The vulnerabilities result because of implementation errors in the following
methods and functions the controls expose: |
(MS02-044) |
August 21, 2002 |
Cumulative Patch for SQL Server:
|
(MS02-043) |
August 14, 2002 |
Flaw in Network Connection Manager Could Enable Privilege
Elevation: |
(MS02-042) |
August 14, 2002 |
Unchecked Buffer in Content Management Server Could Enable
Server Compromise: |
(MS02-041) |
July 31, 2002 |
Unchecked Buffer in MDAC Function Could Enable SQL Server
Compromise: |
(MS02-040) |
July 31, 2002 |
Buffer Overruns in SQL Server 2000 Resolution Service Could
Enable Code Execution: |
(MS02-039) |
July 24, 2002 |
Unchecked Buffer in SQL Server 2000 Utilities Could Allow
Code Execution: |
(MS02-038) |
July 24, 2002 |
Server Response To SMTP Client EHLO Command Results In
Buffer Overrun: |
(MS02-037) |
July 24, 2002 |
Authentication Flaw in Microsoft Metadirectory Services
Could Allow Privilege Elevation: |
(MS02-036) |
July 24, 2002 |
SQL Server Installation Process May Leave Passwords on
System: |
(MS02-035) |
July 11, 2002 |
Cumulative Patch for SQL Server: This is
a cumulative patch that includes the functionality of all previously released
patches for SQL Server 2000. In addition, it eliminates three newly discovered
vulnerabilities affecting SQL Server 2000 and MSDE 2000 (but not any previous
versions of SQL Server or MSDE): - - A buffer overrun vulnerability in
a procedure used to encrypt SQL Server credential information. An attacker
who was able to successfully exploit this vulnerability could gain significant
control over the database and possibly the server itself depending on
the account SQL server runs as. - - A buffer overrun vulnerability in
a procedure that relates to the bulk inserting of data in SQL Server tables.
An attacker who was able to successfully exploit this vulnerability could
gain significant control over the database and possibly the server itself.
- - A privilege elevation vulnerability that results because of in- correct
permissions on the Registry key that stores the SQL Server service account
information. An attacker who was able to success- fully exploit this vulnerability
could gain greater privileges on the system than had been granted by the
system administrator -- potentially even the same rights as the operating
system. |
(MS02-034) |
July 11, 2002 |
Unchecked Buffer in Profile Service Could Allow Code Execution
in Commerce Server: |
(MS02-033) |
June 26, 2002 |
Cumulative Patch for Windows Media Player:
|
(MS02-032) |
June 26, 2002 |
Cumulative Patches for Excel and Word for Windows:
|
(MS02-031) |
June 19, 2002 |
Unchecked Buffer in SQLXML Could Lead to Code Execution:
|
(MS02-030) |
June 12, 2002 |
Unchecked Buffer in Remote Access Service Phonebook Could
Lead to Code Execution: |
(MS02-029) |
June 12, 2002 |
Heap Overrun in HTR Chunked Encoding Could Enable Web Server
Compromise:
|
(MS02-028) |
June 12, 2002 |
Unchecked Buffer in Gopher Protocol Handler Can Run
Code of Attacker's Choice: There is an unchecked buffer
in a piece of code which handles the response from Gopher servers. This
code is used independently in IE, ISA, and Proxy Server. A security vulnerability
results because it is possible for an attacker to attempt to exploit this
flaw by mounting a buffer overrun attack through a specially crafted server
response. The attacker could seek to exploit the vulnerability by crafting
a web page that contacted a server under the attacker's control. The attacker
could then either post this page on a web site or send it as an HTML email.
When the page was displayed and the server's response received and processed,
the attack would be carried out. A successful attack requires that the
attacker be able to send information to the intended target. Anything
which inhibited connectivity could protect against attempts to exploit
this vulnerability. In the case of IE, the code would be run in the user's
context. As a result, any limitations on the user would apply to the attacker's
code as well. |
(MS02-027) |
June 11, 2002 |
Unchecked Buffer in ASP.NET Worker Process:
ASP.NET provides for session state management through a variety of
modes. One of these modes is StateServer mode. This mode stores session
state information in a separate, running process. That process can run
on the same machine or a different machine from the ASP.NET application.
There is an unchecked buffer in one of the routines that handles the processing
of cookies in StateServer mode. A security vulnerability results because
it is possible for an attacker to seek to exploit it by mounting a buffer
overrun attack. A successful attack could cause the ASP.NET application
to restart. As a result, all current users of the web-based application
would see their current session restart and their current session information
would be lost. The StateServer mode is not the default mode for session
state management in ASP.NET. ASP.NET applications using StateServer mode
that do not use cookies are not vulnerable. |
(MS02-026) |
June 06, 2002 |
Malformed Mail Attribute can Cause Exchange 2000
to Exhaust CPU Resources: A security vulnerability results because
it is possible for an attacker to seek to exploit this flaw and mount
a denial of service attack. An attacker could attempt to levy an attack
by connecting directly to the Exchange server and passing a raw, hand-crafted
mail message with a specially malformed attribute. When the message was
received and processed by the Store service, the CPU would spike to 100%.
The effects of the attack would last as long as it took for the Exchange
Store service to process the message. Neither restarting the service nor
rebooting the server would remedy the denial of service. |
(MS02-025) |
May 29, 2002 |
Authentication Flaw in Windows Debugger can Lead
to Elevated Privileges: The Windows debugging facility provides
a means for programs to perform diagnostic and analytic functions on applications
as they are running on the operating system. One of these capabilities
allows for a program, usually a debugger, to connect to any running program,
and to take control of it. The program can then issue commands to the
controlled program, including the ability to start other programs. These
commands would then execute in the same security context as the controlled
program. There is a flaw in the authentication mechanism for
the debugging facility such that an unauthorized program can gain access
to the debugger. A vulnerability results because an attacker can use this
to cause a running program to run a program of her choice. Because many
programs run as the operating system, this means that an attacker can
exploit this vulnerability to run code as the operating system itself.
She could take any action on the system including deleting data, adding
accounts with administrative access, or reconfiguring the system. |
(MS02-024) |
May 22, 2002 |
Cumulative Patch for Internet Explorer:
|
(MS02-023) |
May 15, 2002 |
Unchecked Buffer in MSN Chat Control Can Lead to Code Execution:
|
(MS02-022) |
May 8, 2002 |
E-mail Editor Flaw Could Lead to Script Execution
on Reply or Forward: Outlook 2000 and 2002 provide the option
to use Microsoft Word as the e-mail editor when creating and editing e-mail
in either Rich-Text or HTML format. A security vulnerability exists when
Outlook is configured this way and the user forwards or replies to a mail
from an attacker.
The vulnerability results from a difference in the security
settings that are applied when displaying a mail versus editing one. When
Outlook displays an HTML e-mail, it applies Internet Explorer security
zone settings that disallow scripts from being run. However, if the user
replies to or forwards a mail message and has selected Word as the e-mail
editor, Outlook opens the mail and puts the Word editor into a mode for
creating e-mail messages. Scripts are not blocked in this mode. |
(MS02-021) |
April 25, 2002 |
SQL Extended Procedure Functions Contain Unchecked Buffers:
SQL Server 7.0 and 2000 provide
for extended stored procedures, which are external routines written in
a programming language such as C. These procedures appear to users as
normal stored procedures and are executed in the same way. SQL Server
7.0 and 2000 include a number of extended stored procedures which are
used for various helper functions. Several of the Microsoft-provided extended
stored procedures have a flaw in common – namely, they fail to perform
input validation correctly, and are susceptible to buffer overruns as
a result Exploiting the flaw could enable an attacker to either cause
the SQL Server service to fail, or to cause code to run in the security
context in which SQL Server is running. SQL Server can be configured to
run in various security contexts, and by default runs as a domain user.
The precise privileges the attacker could gain would depend on the specific
security context that the service runs in. |
(MS02-020) |
April 17, 2002 |
Unchecked Buffer in Internet Explorer and Office for Mac
Can Cause Code to Execute: |
(MS02-019) |
April 16, 2002 |
Cumulative Patch for Internet Information
Services:
This patch is a cumulative patch that includes the functionality
of all security patches released for IIS 4.0 since Windows NT 4.0 Service
Pack 6a, and all security patches released to date for IIS 5.0 and 5.1.
A complete listing of the patches superseded by this patch is provided
below, in the section titled "Additional information about this patch".
Before applying the patch, system administrators should take note of the
caveats discussed in the same section. |
(MS02-018) |
April 10, 2002 |
Unchecked buffer in the Multiple UNC Provider Could
Enable Code Execution:
The Multiple UNC Provider (MUP) is a Windows service that assists in locating
network resources that are identified via UNC (uniform naming convention).
The MUP receives commands containing UNC names from applications and sends
the name to each registered UNC provider, LAN Manager workstation, and
any others that are installed. When a provider identifies a UNC name as
its own, the MUP automatically redirects future instances of that name
to that provider. |
(MS02-017) |
April 4, 2002 |
Opening Group Policy Files for Exclusive Read Blocks Policy Application:
Group Policy in Windows 2000 is implemented by storing data in the Active
Directory and the system volume on the domain controller. This storage
location is called the Group Policy Object (GPO). When a machine or user
logs onto the domain, it reads the GPO and applies the settings it contains.
Most of these settings are also refreshed by default every 90 minutes.
However, like most operating systems, Windows 2000 provides several types
of read access, including exclusive-read, and this could enable an attacker
to lock the Group Policy files, thereby allowing a user to prevent Group
Policy from being applied for all users affected by the GPO. |
(MS02-016) |
April 4, 2002 |
Microsoft Security Bulletin
MS02-015:
This is a cumulative patch
that includes the functionality of all previously released patches for
IE 5.01, 5.5 and IE 6. In addition, it eliminates the following two newly
discovered vulnerabilities:
1. A vulnerability in the zone
determination function that could allow a script embedded in a cookie
to be run in the Local Computer zone. While HTML scripts can be stored
in cookies, they should be handled in the same zone as the hosting site
associated with them, in most cases the Internet zone. An attacker could
place script in a cookie that would be saved to the user?s hard disk.
When the cookie was opened by the site the script would then run in the
Local Computer zone, allowing it to run with fewer restrictions than it
would otherwise have.
2. A vulnerability in the handling of object tags
that could allow an attacker to invoke an executable already present on
the user?s machine. A malicious user could create HTML web page that includes
this object tag and cause a local program to run on the victim?s machine.
|
(MS02-015) |
March 28, 2002 |
Unchecked Buffer in Windows Shell Could
Lead to Code Execution: |
(MS02-014) |
March 07, 2002 |
Java Applet Can
Redirect Browser Traffic: The
Microsoft VM is a virtual machine for the Win32 operating environment.
It runs atop Microsoft Windows 95, Microsoft Windows 98, ME, Windows NT
4.0 , Windows 2000 and Windows XP. It ships as part of Windows 98, ME,
and Windows 2000 and also as part of Internet Explorer 5.5 and earlier.
The version of the Microsoft VM that ships with Internet Explorer version
4.x and 5.x contains a flaw affecting how Java requests for proxy resources
are handled. A malicious Java applet could exploit this flaw to re-direct
web traffic once it has left the proxy server to a destination of the
attacker's choice. |
(MS02-013) |
March 04, 2002 |
Malformed Data
Transfer Request can Cause Windows SMTP Service to Fail:
An SMTP service installs by default as part of Windows 2000 server products.
Exchange 2000, which can only be installed on Windows 2000, uses the native
Windows 2000 SMTP service rather than providing its own. In addition,
Windows 2000 and Windows XP workstation products provide an SMTP service
that is not installed by default. All of these implementations contain
a flaw that could enable denial of service attacks to be mounted against
the service. |
(MS02-012) |
February 27, 2002 |
Authentication
Flaw Could Allow Unauthorized Users To Authenticate To SMTP Service:
An SMTP service installs by default as part of Windows 2000 server products
and as part of the Internet Mail Connector (IMC) for Microsoft Exchange
Server 5.5. (The IMC, also known as the Microsoft Exchange Internet Mail
Service, provides access and message exchange to and from any system that
uses SMTP). A vulnerability results in both services because of a flaw
in the way they handle a valid response from the NTLM authentication layer
of the underlying operating system. |
(MS02-011) |
February 27, 2002 |
Unchecked Buffer
in ISAPI Filter Could Allow Commerce Server Compromise:
By default, Commerce Server 2000 installs a .dll with an ISAPI filter
that allows the server to provide extended functionality in response to
events on the server. This filter, called AuthFilter, provides support
for a variety of authentication methods. Commerce Server 2000 can also
be configured to use other authentication methods. A security vulnerability
results because AuthFilter contains an unchecked buffer in a section of
code that handles certain types of authentication requests. An attacker
who provided authentication data that overran the buffer could cause the
Commerce Server process to fail, or could run code in the security context
of the Commerce Server process. The process runs with LocalSystem privileges,
so exploiting the vulnerability would give the attacker complete control
of the server. |
(MS02-010) |
February 21, 2002 |
Incorrect VBScript
Handling in IE can Allow Web Pages to Read Local Files:
Frames are used in Internet Explorer to provide for a fuller browsing
experience. By design, scripts in the frame of one site or domain should
be prohibited from accessing the content of frames in another site or
domain. However, a flaw exists in how VBScript is handled in IE relating
to validating cross-domain access. This flaw can allow scripts of one
domain to access the contents of another domain in a frame. A malicious
user could exploit this vulnerability by using scripting to extract the
contents of frames in other domains, then sending that content back to
their web site. This would enable the attacker to view files on the user's
local machine or capture the contents of third-party web sites the user
visited after leaving the attacker's site. The latter scenario could,
in the worst case, enable the attacker to learn personal information like
user names, passwords, or credit card information. In both cases, the
user would either have to go to a site under the attacker's control or
view an HTML email sent by the attacker. In addition, the attacker would
have to know the exact name and location of any files on the user's system.
Further, the attacker could only gain access to files that can be displayed
in a browser window, such as text files, HTML files, or image files. |
(MS02-009) |
February 21, 2002 |
XMLHTTP Control
Can Allow Access to Local Files:Microsoft
XML Core Services (MSXML) includes the XMLHTTP ActiveX control, which
allows web pages rendering in the browser to send or receive XML data
via HTTP operations such as POST, GET, and PUT. The control provides security
measures designed to restrict web pages so they can only use the control
to request data from remote data sources. A flaw exists in how the XMLHTTP
control applies IE security zone settings to a redirected data stream
returned in response to a request for data from a web site. A vulnerability
results because an attacker could seek to exploit this flaw and specify
a data source that is on the user's local system. The attacker could then
use this to return information from the local system to the attacker's
web site. An attacker would have to entice the user to a site under his
control to exploit this vulnerability. It cannot be exploited by HTML
email. In addition, the attacker would have to know the full path and
file name of any file he would attempt to read. Finally, this vulnerability
does not give an attacker any ability to add, change or delete data. |
(MS02-008) |
February 21, 2002 |
SQL Server Remote
Data Source Function Contain Unchecked Buffers:
One of the features of Structured Query Language (SQL) in SQL Server 7.0
and 2000 is the ability to connect to remote data sources. One capability
of this feature is the ability to use "ad hoc" connections to connect
to remote data sources without setting up a linked server for less-often
used data-sources. This is made possible through the use of OLE DB providers,
which are low-level data source providers. This capability is made possible
by invoking the OLE DB provider directly by name in a query to connect
to the remote data source. An unchecked buffer exists in the handling
of OLE DB provider names in ad hoc connections. A buffer overrun could
occur as a result and could be used to either cause the SQL Server service
to fail, or to cause code to run in the security context of the SQL Server.
SQL Server can be configured to run in various security contexts, and
by default runs as a domain user. The precise privileges the attacker
could gain would depend on the specific security context that the service
runs in. |
(MS02-007) |
February 20, 2002 |
Unchecked Buffer
in SNMP Service Could Enable Arbitrary Code to be Run:
Simple Network Management Protocol (SNMP) is an Internet standard protocol
for managing disparate network devices such as firewalls, computers, and
routers. All versions of Windows except Windows ME provide an SNMP implementation,
which is neither installed nor running by default in any version. A buffer
overrun is present in all implementations. By sending a specially malformed
management request to a system running an affected version of the SNMP
service, an attacker could cause a denial of service. In addition, it
is possible that he cause code to run on the system in LocalSystem context.
This could potentially give the attacker the ability to take any desired
action on the system. A patch is under development to eliminate the vulnerability.
In the meantime, Microsoft recommends that customers who use the SNMP
service disable it temporarily. Patches will be available shortly, at
which time we will re-release this bulletin with updated details. |
(MS02-006) |
February 12, 2002 |
11 February 2002
Cumulative Patch for Internet Explorer:
This is a cumulative patch that, when installed, eliminates all previously
discussed security vulnerabilities affecting IE 5.01, 5.5 and IE 6.
|
(MS02-005) |
February 11, 2002 |
Unchecked Buffer
in Telnet Server Could Lead to Arbitrary Code Execution:
The Telnet protocol provides remote shell capabilities. Microsoft has
implemented the Telnet protocol by providing a Telnet Server in several
products. The implementations in two of these products - - - Windows 2000
and Interix 2.2 - contain unchecked buffers in the code that handles the
processing of telnet protocol options. An attacker could use this vulnerability
to perform a buffer overflow attack. A successful attack could cause the
Telnet Server to fail, or in some cases, could possibly allow an attacker
to execute code of her choice on the system. Such code would execute using
the security context of the Telnet service, but this context varies from
product to product. In Windows 2000, the Telnet service always runs as
System; in the Interix implementation, the administrator selects the security
context in which to run as part of the installation process.
|
(MS02-004) |
February 7, 2002 |
Exchange 2000 System
Attendant Incorrectly Sets Remote Registry Permissions:
The Microsoft Exchange System Attendant is one of the core services in
Microsoft Exchange. It performs a variety of functions related to the
on-going maintenance of the Exchange system. To allow remote administration
of an Exchange Server using the Exchange System Manager Microsoft Management
Console (MMC) snap in, the System Attendant makes changes to the permissions
on the Windows Registry to allow Exchange Administrators to remotely update
configuration settings stored in the Registry. There is a flaw in how
the System Attendant makes these Registry configuration changes. This
flaw could allow an unprivileged user to remotely access configuration
information on the server. Specifically, this flaw inappropriately gives
the "Everyone" group privileges to the WinReg key. This key controls the
ability of users and groups to remotely connect to the Registry. By default,
only Administrators are given the ability to remotely connect to the Registry,
by granting permissions on this key. The flaw does not grant any abilities
beyond the ability to connect remotely. However, an attacker's ability
to make changes to the Registry once they have successfully connected
would be dictated by the permissions on the specific keys within the Registry
itself. Thus, while this vulnerability does not itself give an attacker
the ability to change Registry settings, it could be used in conjunction
with inappropriately permissive registry settings to gain access to, and
make changes to a systems Registry. |
(MS02-003) |
February 7, 2002 |
Malformed Network
Request can cause Office v. X for Mac to Fail:
Office v. X contains a network-aware anti-piracy mechanism that detects
multiple copies of Office using the same product identifier (PID) running
on the local network. This feature, called the Network Product Identification
(PID) Checker, announces Office's own unique product ID and listens for
other announcements at regular intervals. If a duplicate PID is detected,
Office shuts down. A security vulnerability results because of a flaw
in the Network PID Checker. Specifically, the Network PID Checker doesn't
correctly handle a particular type of malformed announcement - receiving
one causes the Network PID Checker to fail. When the Network PID fails
like this, the Office v. X application will fail as well. If more than
one Office v. X application was running when the packet was received,
the first application launched during the session would fail. An attacker
could use this vulnerability to cause other users' Office applications
to fail, with the loss of any unsaved data. An attacker could craft and
send this packet to a victim's machine directly, by using the machine's
IP address. Or, he could send this same directive to a broadcast and multicast
domain and attack all affected machines |
(MS02-002) |
February 6, 2002 |
Trusting Domains
Do Not Verify Domain Membership of SIDs in Authorization Data:
Trust relationships are created between Windows NT or Windows 2000 domains
to allow users in one domain to access resources in other domains without
requiring them to authenticate separately to each domain. When a user
in a trusted domain requests access to a resource in a trusting domain,
the trusted domain supplies authorization data in the form of a list of
Security Identifiers (SIDs) that indicate the user's identity and group
memberships. The trusting domain uses this data to determine whether to
grant the user's request. A vulnerability exists because the trusting
domain does not verify that the trusted domain is actually authoritative
for all the SIDs in the authorization data. If one of the SIDs in the
list identified a user or security group that is not in the trusted domain,
the trusting domain would accept the information and use it for subsequent
access control decisions. If an attacker inserted SIDs of his choice into
the authorization data at the trusted domain, he could elevate his privileges
to those associated with any desired user or group, including the Domain
Administrators group for the trusting domain. This would enable the attacker
to gain full Domain Administrator access on computers in the trusting
domain. |
(MS02-001) |
January 30, 2002 |
For the most update information, visit:
http://www.microsoft.com/technet
For past Security Bulletins Please Visit Here:
http://www.activewin.com/bugs/secb2001.shtml
Return To
Support
Center
|
|
|
|