Multiple Vulnerabilities in Systems Running Microsoft Windows
- Microsoft Windows systems; specifically, some versions of the following programs:
- Microsoft Windows NT
- Microsoft Windows 2000
- Microsoft Windows XP
- Microsoft Windows Server 2003
- Microsoft Windows 98
- Microsoft Windows Millennium Edition
- Microsoft Internet Explorer 5
- Microsoft Internet Explorer 6
Microsoft has reported two vulnerabilities in the way Internet Explorer processes certain types of images. Attackers may be able to gain control of your machine if you view a malicious image, visit a web page, or open an email message that contains these images.
Microsoft has also published an update to address the cross-domain vulnerability discussed in SA04-163A. This vulnerability may allow an attacker to alter a web site to point to a different location. If the attacker can convince you to visit the site, they may be able to gain control of your machine.
Apply a patch
Microsoft has issued updates that resolve this problem. Obtain the appropriate update from Windows Update
Use caution with email attachments
Never open unexpected email attachments. Before opening an attachment, save it to a disk and scan it with anti-virus software. Make sure to turn off the option to automatically download attachments.
View email messages in plain text
Email programs like Outlook and Outlook Express interpret HTML code the same way that Internet Explorer does. Attackers may be able to take advantage of that by sending malicious HTML-formatted email messages.
Maintain updated anti-virus software
It is important that you use anti-virus software and keep it up to date. Most anti-virus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many anti-virus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.
In Microsoft Security Bulletin MS04-025, Microsoft describes a critical vulnerability in the way Internet Explorer processes .GIF and .BMP images. An attacker can use malicious images on a web page or in HTML-formatted email messages. If the attacker can convince a user to visit the web page, open the message, or otherwise view the image, the attacker may be able to gain control of the user's machine.
There is also a vulnerability in the way Internet Explorer processes scripts. An attacker may be able to take advantage of frames to redirect users to a malicious web site.
- Windows Security Updates for July 2004 - <http://www.microsoft.com/security/bulletins/200407_windows.mspx>
- Multiple Remote Code Execution Vulnerabilities in Microsoft Internet Explorer - <http://www.us-cert.gov/cas/techalerts/TA04-212A.html>
- Microsoft Security Bulletin MS04-025 - <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>
- US-CERT Computer Virus Resources - <http://www.us-cert.gov/other_sources/viruses.html>
- Understanding Anti-Virus Software - <http://www.us-cert.gov/cas/tips/ST04-005.html>
- Using Caution with Email Attachments - <http://www.us-cert.gov/cas/tips/ST04-010.html>
- Home Network Security - <http://www.cert.org/tech_tips/home_networks.html>
- Home Computer Security - <http://www.cert.org/homeusers/HomeComputerSecurity/
Author: Mindi McDowell. Feedback can be directed to the