News

Microsoft Releases 3 Security Fixes for Windows, Exchange

As expected, Microsoft Corp. today released three new security bulletins today as part of its monthly Patch Tuesday announcement, with two of the patches being rated as "critical."

As expected, Microsoft Corp. today released three new security bulletins today as part of its monthly Patch Tuesday announcement, with two of the patches being rated as "critical."

One of the critical bullitens is for Microsoft Exchange, the company's popular messaging software; the other is for a vulnerability Windows that have Adobe's Macromedia Flash Player installed. The third patch, deemed "moderate," replaces a fix released a year ago that affected the MSDTC service.

The Exchange flaw, covered by bulletin MS06-19, affects Exchange Server 2000 with Service Pack 3, and Exchange Server 2003 with Service Pack 1 and 2. It fixes a recently discovered remote code execution flaw that was reported to Microsoft privately, in which an attacker might take over a system through a specially crafted e-mail with CDO objects attached or with certain vCAl or iCal properties, which is then sent through a targeted Exchange server. An attacker who gets into a compromised system through this method would then be able to view, change or delete data, as well as create new accounts with full user rights.

Bulletin MS06-020, also rated critical by Microsoft, fixes another remote code execution flaw that mainly affects Windows XP with Service Packs 1 and 2, as well as Windows 98, 98SE and Millenium Edition that have the Macromedia Flash Player versions 5 and 6 installed. The flaw can allow an attacker to get access to a user's system if that user is logged on with administrative user rights, so the flaw does carry less risk.

The fix isn't applicable to Windows 2000 or Windows Server 2003 (with or without SP3), since those systems don't come with Flash installed by default. However, because Flash is a popular media program used on many Web sites, Microsoft points to guidance on the Adobe Systems Web site for further help with fixes.

Microsoft rates bulletin MS06-018 as moderate; it replaces bulletin MS05-051 that was issued a year ago. The flaw allows an attacker who gains access by sending a network message to an infected system to launch a denial of service attack, which could cause the Microsoft Distributed Transaction Coordinator service to stop responding. The vulnerability exists due to an unchecked buffer in the MSDTC service.

Windows 2000 systems are mainly at risk, but so to are Windows XP SP1 and Windows Server 2003 system that have the service turned on.

More details can be found here.

Featured

comments powered by Disqus

Subscribe on YouTube