U.S. Flag Official website of the Department of Homeland Security

Note: This page is part of the us-cert.gov archive.This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact info@us-cert.gov if you have any questions about the US-CERT website archive.

TLP:WHITE

Alert (TA06-220A)

Microsoft Products Contain Multiple Vulnerabilities

Original release date: August 08, 2006 | Last revised: August 14, 2006

Systems Affected

  • Microsoft Windows
  • Microsoft Office (Windows and Mac)
  • Microsoft Works Suite
  • Microsoft Visual Basic Basic for Applications (VBA)
  • Microsoft Internet Explorer

For more complete information, refer to the August 2006 Microsoft Security Bulletins.

Overview

Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Office, Works Suite, Visual Basic for Applications, and Internet Explorer. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

The update for MS06-040 addresses a critical vulnerability in the Windows Server service (VU#650769). We have received reports of active exploitation of this vulnerability.

Description

Microsoft Security Bulletin Summary for August 2006 addresses vulnerabilities in Microsoft products including Windows, Office, and Internet Explorer.

Further information is available in the following Vulnerability Notes:

VU#650769 - Microsoft Windows Server service buffer overflow

A stack-based buffer overflow exists in the Windows Server service. This vulnerability may allow a remote, unauthenticated attacker execute arbitrary code with SYSTEM privileges.
(CVE-2006-3439)

Note that we have received reports that VU#650769 is actively being exploited.

VU#908276 - Microsoft Winsock buffer overflow

A buffer overflow vulnerability in Microsoft Winsock may allow a remote attacker to execute arbitrary code on an affected system.
(CVE-2006-3440)

VU#794580 - Microsoft DNS Client buffer overflow

The Microsoft DNS Client service contains a remote code execution vulnerability that could allow a remote attacker to take complete control of the affected system.
(CVE-2006-3441)

VU#883108 - Microsoft Internet Explorer HTML Document object cross-domain vulnerability

Microsoft Internet Explorer contains a cross-domain vulnerability in how it handles redirected object data. This could allow an attacker to access the content of a web page in a different domain.
(CVE-2006-3280)

VU#119180 - Microsoft Internet Explorer fails to properly interpret layout positioning

Microsoft Internet Explorer fails to properly handle certain combinations of layout positioning. This can allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3450)

VU#262004 - Microsoft Internet Explorer fails to properly handle chained Cascading Style Sheets

Microsoft Internet Explorer fails to properly handle chained Cascading Style Sheets (CSS). This can allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3451)

VU#340060 - Microsoft Internet Explorer HTML layout rendering vulnerability

Microsoft Internet Explorer fails to properly render certain HTML layout combinations. This can allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3637)

VU#959049 - Multiple COM objects cause memory corruption in Microsoft Internet Explorer

Microsoft Internet Explorer (IE) allows instantiation of COM objects not designed for use in the browser, which may allow a remote attacker to execute arbitrary code or crash IE.
(CVE-2006-3638)

VU#252764 - Microsoft Internet Explorer source element cross-domain vulnerability

Microsoft Internet Explorer fails to properly handle redirects for source elements. This can allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3639)

VU#891204 - Microsoft Windows fails to properly parse the MHTML protocol

Microsoft Windows fails to properly handle MHTML. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-2766)

VU#927548 - Microsoft Management Console cross-site scripting vulnerability

Microsoft Management Console (MMC) is vulnerable to cross-site scripting, which may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3643)

VU#159484 - Microsoft Visual Basic for Applications buffer overflow

Microsoft Visual Basic for Applications fails to properly validate document properties. This vulnerability could allow a remote attacker to execute arbitrary code.
(CVE-2006-3649)

VU#936945 - Microsoft PowerPoint contains an unspecified remote code execution vulnerability

Microsoft PowerPoint contains an unspecified vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3590)

VU#884252 - Microsoft PowerPoint fails to properly handle malformed records

Microsoft PowerPoint fails to properly handle malformed records allowing a buffer overflow to occur. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
(CVE-2006-3449)

VU#411516 - Microsoft Windows kernel fails to properly manage exception handling

An exception handling vulnerability in the Microsoft Windows kernel may allow a remote attacker to execute arbitrary code.
(CVE-2006-3648)

Impact

A remote, unauthenticated attacker could execute arbitrary code on a vulnerable system. An attacker may also be able to cause a denial of service.

Solution

Apply updates

Microsoft has provided updates for these vulnerabilities in the August 2006 Security Bulletins.

When prioritizing updates, it is strongly encouraged to apply the update for MS06-040 (VU#650769) first.

Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Microsoft Office 2000 updates are available on the Microsoft Office Update site. Apple Mac OS X users should obtain updates from the Mactopia web site.

System administrators may wish to consider using Windows Server Update Services (WSUS).


Appendix A. References


Revision History

  • August 08, 2006: Initial release, called out critical vulnerabilities
    August 09, 2006: Fixed incorrect CVE-2006-2127 reference
    August 14, 2006: Fixed incorrect appendix heading

This product is provided subject to this Notification and this Privacy & Use policy.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top