MS Security Bulletin MS04-003

User avatar
Tyby
Dungeon Keeper
Posts: 602
Joined: Sun Jul 06, 2003 10:39 pm
Location: Bucuresti
Contact:

MS Security Bulletin MS04-003

Postby Tyby » Wed Jan 14, 2004 3:26 am

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms04-003.asp

Update 32bits platforms: http://www.microsoft.com/downloads/details.aspx?FamilyId=39472EE8-C14A-47B4-BFCC-87988E062D91&displaylang=en

Update 64bits 2003 srv: http://www.microsoft.com/downloads/details.aspx?FamilyId=1D93D9E4-2B22-4595-B8C5-643824857EC0&displaylang=en
Technical description:

Microsoft Data Access Components (MDAC) is a collection of components that provides the underlying functionality for a number of database operations, such as connecting to remote databases and returning data to a client. When a client system on a network tries to see a list of computers that are running SQL Server and that reside on the network, it sends a broadcast request to all the devices that are on the network. Because of a vulnerability in a specific MDAC component, an attacker could respond to this request with a specially-crafted packet that could cause a buffer overflow.

An attacker who successfully exploited this vulnerability could gain the same level of privileges over the system as the program that initiated the broadcast request. The actions an attacker could carry out would be dependent on the permissions under which the program using MDAC ran. If the program ran with limited privileges, an attacker would be limited accordingly; however, if the program ran under the local system context, the attacker would have the same level of permissions.

Since the original version of MDAC on your system may have changed from updates available on the Microsoft Web site, we recommend using the following tool to determine the version of MDAC you have on your system: Microsoft Knowledge Base article 301202 "HOW TO: Check for MDAC Version" discusses this tool and explains how to use it. Also, Microsoft Knowledge Base article 231943 discusses the release history of the different versions of MDAC.

Mitigating factors:

For an attack to be successful an attacker would have to simulate a SQL server that is on the same IP subnet as the target system.
When a client system on a network tries to see a list of computers that are running SQL Server and that reside on the network, it sends a broadcast request to all the devices that are on the network. A target system must initiate such a broadcast request to be vulnerable to an attack. An attacker would have no way of launching this first step but would have to wait for anyone to enumerate computers that are running SQL Server on the same subnet. Also, a system is not vulnerable by having these SQL management tools installed.
Code executed on the client system would only run under the privileges of the client program that made the broadcast request.
Severity Rating:

Microsoft Data Access Components 2.5 (included with Windows 2000) Important
Microsoft Data Access Components 2.6 (included with SQL Server 2000) Important
Microsoft Data Access Components 2.7 (included with Windows XP) Important
Microsoft Data Access Components 2.8 (included with Windows Server 2003) Important

The above assessment is based on the types of systems that are affected by the vulnerability, their typical deployment patterns, and the effect that exploiting the vulnerability would have on them.

Vulnerability identifier: CAN-2003-0903
formerly known as gaurika ...

May the best from your past be the worst in your future!

Tyby out!

User avatar
branix
newbie
newbie
Posts: 21
Joined: Sun Jul 06, 2003 4:25 pm

Postby branix » Wed Jan 14, 2004 11:05 pm

Haideti sa va arat ce am primit noi astazi:
http://www.cert.org/advisories/CA-2004-01.html
<b>CERT Advisory CA-2004-01 Multiple H.323 Message Vulnerabilities</b>

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2004-01 Multiple H.323 Message Vulnerabilities

Original release date: January 13, 2004
Last revised: --
Source: CERT/CC, NISCC

A complete revision history can be found at the end of this file.

Systems Affected

* Many software and hardware systems that implement the H.323
protocol

Examples include
+ Voice over Internet Protocol (VoIP) devices and software
+ Video conferencing equipment and software
+ Session Initiation Protocol (SIP) devices and software
+ Media Gateway Control Protocol (MGCP) devices and software
+ Other networking equipment that may process H.323 traffic
(e.g., routers and firewalls)

Overview

A number of vulnerabilities have been discovered in various
implementations of the multimedia telephony protocol H.323. Voice over
Internet Protocol (VoIP) and video conferencing equipment and software
can use these protocols to communicate over a variety of computer
networks.

http://www.cert.org/advisories/CA-2004-01.html


Iar partea cea mai buna:
Appendix A. - Vendor Information

This appendix contains information provided by vendors for this
advisory. Please see the Systems Affected section of Vulnerability
Note VU#749342 and the Vendor Information section of NISCC
Vulnerability Advisory 006489/H323 for the latest information
regarding the response of the vendor community to this issue.


<b>Microsoft Corporation</b>

Please see
http://www.microsoft.com/technet/securi ... 04-001.asp


Ok, si ce-i cu asta? Pai ...

Affected Software:

* Microsoft Internet Security and Acceleration Server 2000 - Download the update


Ok, si?

The page cannot be displayed
There is a problem with the page you are trying to reach and it cannot be displayed.

Please try the following:

* Click the Refresh button, or try again later.
* Open the ftp.roedu.net home page, and then look for links to the information you want.
* If you typed the page address in the Address bar, make sure that it is spelled correctly.
* Verify that the Internet access policy on your network allows you to view this this page.
* If you believe you should be able to view this directory or page, please contact the Web site administrator by using the e-mail address or phone number listed on the ftp.roedu.net home page.

<b>HTTP 502 Proxy Error - The ISA Server denies the specified Uniform Resource Locator (URL). (12202)
Internet Security and Acceleration Server</b>

Technical Information (for support personnel)

* Background:
The gateway could not retrieve the requested page.

* ISA Server: drcaisili2.umfcluj.ro
Via: 1.1 <b>venus.osmcluj.ro</b>:3128 (squid/2.5.STABLE3)


In concluzie: cautam oameni priceputi la asa ceva :) sa ne inlature balaurul ce ne incatuseaza de doua luni de zile!!!

Spre ghinionul nostru in cateva zile ne tragem fibra separat si nu o sa mai trebuiasca sa avem de a face cu dr. caisa <drcaisili2.umfcluj.ro>. ;)

User avatar
sl0bizz
elder
elder
Posts: 671
Joined: Mon Jul 14, 2003 7:33 pm
Location: Boston
Contact:

Postby sl0bizz » Fri Jan 16, 2004 1:40 pm

Apropos de chestia asta, am inteles ca la o vreme cei virusati din reteaua locala erau redirectionati de la internet la o pagina in care li se explica ce sa faca.
Microsoft ofera gratis Software Update Servvices, un program care trebuie instalat pe un IIS si care indeplieste acelasi rol cu situl de baza pentru Windows Update. Nu am putea sa incercam asta? Nu vrea nimeni sa tina asta pe PC-ul lui si cu ocazia asta sa se antreneze putin cu IIS?
http://www.microsoft.com/windowsservers ... fault.mspx
Daca va prisosesc sau va trebuie obiecte, incercati Freecycle Bucuresti. Daca nu va trebuie nimic, ma supar.

User avatar
Dan
Master of Disaster
Posts: 2869
Joined: Sun Jul 06, 2003 1:59 am
Location: ...on the highway to hell...
Contact:

Postby Dan » Fri Jan 16, 2004 3:37 pm

Cu Blaster a fost simplu pentru ca are un pattern usor de recunoscut si e usor sa-i pui pe useri pe lista neagra a redirectatilor. :lol: Ar fi misto daca ar merge chestia asta pe un apache...pentru ca l-am pune pe server si ala e tot timpul up. In principiu gasim o solutie pt toata reteaua. Putina rabdare. 8)
Eu din muntii mei...
http://www.imed.ro/forum

User avatar
Tyby
Dungeon Keeper
Posts: 602
Joined: Sun Jul 06, 2003 10:39 pm
Location: Bucuresti
Contact:

Postby Tyby » Fri Jan 16, 2004 3:54 pm

din ce-am citit, nu prea pute a apache ... mie mi s-a luat oricum de implementarile ASP de pe apache ... cam suck ... big time :(
plus ca e cam greu sa convingi SUSu' sa mearga pe linuz ... are shi el mandria lui :D
formerly known as gaurika ...



May the best from your past be the worst in your future!



Tyby out!


Return to “Software”

Who is online

Users browsing this forum: No registered users and 2 guests