Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security vulnerability in an optional service that ships with Microsoft:registered: Windows NT:registered: 4.0 and Windows:registered: 2000 Servers. The vulnerability could allow a malicious user to execute hostile code on a remote server that is running the service.

Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-094.asp

Affected Software Versions

Microsoft Windows NT 4.0 Server
Microsoft Windows NT 4.0 Server, Enterprise Edition
Microsoft Windows 2000 Server
Microsoft Windows 2000 Advanced Server

NOTE: The Phone Book Service can only be installed on IIS 4 or IIS 5 servers.

Patch Availability

Microsoft Windows NT 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26193

Microsoft Windows 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25531

NOTE: The NT 4.0 fix can be applied to systems running NT 4.0 Service Pack 6a. This fix will be included in NT 4.0 Service Pack 7. The Windows 2000 fix can be applied to Windows 2000 Gold or Service Pack 1. This fix will be included in Windows 2000 Service Pack 2.

Security 10918 Published by Philipp Esselbach 0

Patch Available for "Browser Print Template" and "File Upload via Form" Vulnerabilities

Summary
Microsoft has released a patch that eliminates four security vulnerabilities in Microsoft:registered: Internet Explorer:

The Browser Print Template vulnerability, which could enable a malicious web site operator to take unauthorized actions on the computer of a user who visited her site.
The File Upload via Form vulnerability, which could enable a malicious web site operator to read files on a visiting user's computer.
New variants of the Scriptlet Rendering and Frame Domain Verification vulnerabilities, both of which could enable a malicious web site operator to read files on a visiting user's computer.

Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-093.asp

Affected Software Versions
Microsoft Internet Explorer 5.x

Patch Availability
http://www.microsoft.com/windows/ie/download/critical/279328

Note: The patch requires IE 5.5 or IE 5.01 SP1 to install. Customers who install this patch on other versions may receive a message reading "This update does not need to be installed on this system". This message is incorrect. More information is available in KB article Q279328.

Note: Although one of the vulnerabilities discussed here only affects IE 5.5, the patch above is suitable for installation on either IE 5.5 or IE 5.01 SP1. The patch will detect the version of IE and only install the needed components.

Note: Per the normal security support policy for IE, security patches for Internet Explorer version 4.x are no longer being produced. Microsoft recommends that IE 4.x customers who are concerned about this issue consider upgrading to either IE 5.5 or IE 5.01 SP1.

Note: The fix for this issue will be included in IE 5.5 SP1 and IE 5.01 SP2.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security vulnerability in Microsoft:registered: SQL Server and Microsoft SQL Server Desktop Engine (MSDE). The vulnerability could enable a malicious user to run code on the server, subject to a number of restrictions.

Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-092.asp

Affected Software Versions
Microsoft SQL Server 7.0
Microsoft SQL Server 2000
Microsoft Data Engine 1.0 (MSDE 1.0)
Microsoft SQL Server Desktop Engine 2000 (MSDE 2000)
Note: MSDE 1.0 was released with SQL Server 7.0. MSDE 2000 was released with SQL Server 2000.

Patch Availability
http://support.microsoft.com/support/sql/xp_security.asp
Note: The SQL Server 7.0 patch can be applied atop Service Pack 2. It will be included in SQL Server 7.0 Service Pack 3.

Note: The SQL Server 2000 patch can be applied atop SQL Server 2000. It will be included in SQL Server 2000 Service Pack 1.

Security 10918 Published by Philipp Esselbach 0

On November 06, 2000, Microsoft released the original version of this bulletin, announcing the availability of a patch that eliminates a security vulnerability in Microsoft:registered: Internet Information Services 5.0. The vulnerability could enable a malicious user to run operating system commands on a web server. Since its original issuance, the bulletin has been updated several times:

On November 10, 2000, the bulletin was updated to clarify the scope of the issue.
On November 21, 2000, it was updated to discuss two newly-discovered variants of the original vulnerability.
On November 30, 2000, it was updated to discuss a newly-discovered regression error in the IIS 5.0 patch and recommend that customers apply an updated version of the patch.

The newly-discovered regression error only affects the IIS 5.0 version of the patch. It has no effect on the effectiveness of the patch against the vulnerability discussed here, but it does cause servers to be vulnerable to the Web Server Directory Traversal discussed in Microsoft Security Bulletin MS00-078, even if the patch provided in MS00-078 has been applied. Microsoft therefore recommends that all IIS 5.0 customers apply the new patch provided below. It protects against both the Web Server File Request Parsing and Web Server Directory Traversal vulnerabilities. The IIS 4.0 version of the patch does not contain the error, and customers who have applied the IIS 4.0 patch do not need to take any action.

Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-086.asp

Affected Software Versions
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0

Patch Availability
Internet Information Server 4.0:
http://www.microsoft.com/ntserver/nts/downloads/critical/q277873
Internet Information Services 5.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25547

Note: The IIS 5.0 patch can be applied atop systems running either Windows 2000 Gold or Service Pack 1. It will be included in Windows 2000 Service Pack 2.

Note: The IIS 4.0 patch can be applied atop systems running Windows NT 4.0 Service Pack 6a. It will be included in Windows NT 4.0 Service Pack 7.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security vulnerability in Microsoft:registered: Windows NT 4.0 and a recommended workaround for Windows 95, 98, 98 Second Edition, and Windows Me. The vulnerability could allow a malicious user to temporarily prevent an affected machine from providing any networking services or cause it to stop responding entirely.
Frequently asked questions regarding this vulnerability and the patch can be found at http://www.microsoft.com/technet/security/bulletin/fq00-091.asp

Affected Software Versions
Windows NT 4.0
Windows 95, 98, 98 Second Edition, and Windows Me
Note: Windows 2000 is not affected by this vulnerability.

Patch Availability
Microsoft Windows NT 4.0 (Intel):
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25114
Note: The patch has been tested on a Windows NT 4.0 computer with Service Pack 6a. Customers needing the Alpha version should contact PSS under the "Obtaining Support on this Issue" section below.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates two security
vulnerabilities in Microsoft(r) Windows Media(tm) Player. These
vulnerabilities could potentially enable a malicious user to cause a
program of his choice to run on another user´s computer.

Frequently asked questions regarding this vulnerability
and the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-090.asp

Affected Software Versions
==========================
- Microsoft Windows Media Player 6.4
- Microsoft Windows Media Player 7

Note: The ".ASX Buffer Overrun" affects Windows Media Player versions
6.4 and 7. The ".WMS Script Execution" affects only Windows Media
Player version 7. The patch installs the correct fix(es) for the
particular version of Windows Media Player in use.

Patch Availability
==================
- Windows Media Player 6.4:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26069
- Windows Media Player 7:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26067

Note: The fix for this issue also will be available as part of the
next periodic update, scheduled for December 2000.

Security 10918 Published by Philipp Esselbach 0

On November 06, 2000, Microsoft released the original version of this
bulletin, announcing the availability of a patch that eliminates a
security vulnerability in Microsoft(r) Internet Information Services
5.0. The vulnerability could enable a malicious user to run
operating system commands on a web server. On November 10, 2000, we
updated the bulletin to clarify the scope of the issue. On November
21, 2000, we updated it again, to discuss two newly-discovered
variants of the original vulnerability.

The new variants don´t change the effect of exploiting the
vulnerability. However, they do affect a larger number of products.
The original variant affected IIS 5.0 in all cases, but only affected
IIS 4.0 when a service pack prior to Windows NT 4.0 Service Pack 6a
was in use. The new variants affect both IIS 4.0 and IIS 5.0
regardless of the service pack is in use. Microsoft recommends that
all affected customers apply the new versions of the patches.

Frequently asked questions regarding this vulnerability
and the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-086.asp

Affected Software Versions
==========================
- Microsoft Internet Information Server 4.0
- Microsoft Internet Information Services 5.0

Patch Availability
==================
- Internet Information Server 4.0:
http://www.microsoft.com/ntserver/nts/downloads/critical/q277873
- Internet Information Services 5.0:
http://www.microsoft.com/Windows2000/downloads/critical/q277873

Note: The IIS 5.0 patch can be applied atop systems running either
Windows 2000 Gold or Service Pack 1. It will be included in Windows
2000 Service Pack 2.

Note: The IIS 4.0 patch can be applied atop systems running Windows
NT 4.0 Service Pack 6a. It will be included in Windows NT 4.0
Service Pack 7.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows 2000. The vulnerability could
allow a malicious user to use repeated attempts to guess an account
password even if the domain administrator had set an account lockout
policy.

Frequently asked questions regarding this vulnerability and
the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-089.asp

Affected Software Versions
==========================
- Microsoft Windows 2000 Professional, Service Pack 1
- Microsoft Windows 2000 Server, Service Pack 1
- Microsoft Windows 2000 Advanced Server, Service Pack 1
- Microsoft Windows 2000 Datacenter, Service Pack 1

Note Windows 2000 Gold is not affected by this vulnerability.

Patch Availability
==================
- http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25606

Note: Windows 2000 users connected to a Windows 2000 domain, stand
alone Windows 2000 machines, and users of NT 4.0 do not need to take
any action.

Note: The Windows 2000 patch can be applied to systems running
Windows 2000 Service Pack 1. Users of Windows 2000 Gold are not
affected and do not need to take any action. This patch will be
included in Windows 2000 Service Pack 2.

Security 10918 Published by Philipp Esselbach 0

Noted bug hunter Georgi Guninski reported the vulnerability on the Bugtraq security mailing list. He said the problem affects Internet Explorer 5.5 and Microsoft´s Outlook and Outlook Express email clients.

The vulnerability exploits ".chm" files, a compressed help file format, Guninski said.

Microsoft could not immediately be reached for comment. In the Bugtraq posting, Guninski said he had notified Microsoft about the security hole Nov. 15.

Read more

Security 10918 Published by Philipp Esselbach 0

On October 23, 2000, Microsoft released the original version of this
bulletin, to discuss the availability of a patch that eliminates a
security vulnerability in Microsoft(r) Internet Information Server.
The vulnerability could allow a malicious user to "hijack" another
user´s secure web session, under a very restricted set of
circumstances.

On November 20, 2000, we re-released the bulletin to advise customers
using IIS 4.0 on Alpha platforms, or IIS 5.0 on x86 platforms, that
new versions of these patch are available, to correct an error in the
original version of the patch. The x86 IIS 4.0 patch was not affected
by the error, and customers using these systems do not need to take
any action.

Frequently asked questions regarding this vulnerability and
the patch can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-080.asp

Affected Software Versions
==========================
- Microsoft Internet Information Server 4.0
- Microsoft Internet Information Services 5.0

Patch Availability
==================
- IIS 4.0:
x86 platforms:
http://www.microsoft.com/ntserver/nts/downloads/critical/q274149
Alpha platforms:
Available from Microsoft Product Support Services
- IIS 5.0:
http://www.microsoft.com/Windows2000/downloads/critical/q274149

Note: The patch installs support for secure Session ID cookies, but
does not enable it for reasons of application compatibility. As
discussed in the Knowledge Base article, it can be enabled or
disabled on a site-by-site basis.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Exchange 2000 Server and Exchange 2000
Enterprise Server. This vulnerability could potentially allow an
unauthorized user to remotely login to an Exchange 2000 server and
possibly other servers on the affected computer´s network.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-088.asp

Affected Software Versions
==========================
- Microsoft Exchange 2000 Server CDs without "Rev. A" stamped on the
CD on the line below the Part No.
- Microsoft Exchange 2000 Enterprise Server CDs without "Rev. A"
stamped on the CD below the Part No.

Note: This also applies to evaluation editions and to Microsoft
Exchange 2000 Server and Microsoft Exchange 2000 Enterprise Server
included on the October 2000 Select CDs.

Patch Availability
==================
- The Tool can be downloaded from:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25866

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows NT 4.0 Terminal Server. The
vulnerability could allow a malicious user to cause the Terminal
Server to fail or, in certain instances, to execute hostile code on
the server.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-087.asp

Affected Software Versions
==========================
- Microsoft Windows NT 4.0 Terminal Server

Patch Availability
==================
- Microsoft Windows NT 4.0 Terminal Server:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25565

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a serious security
vulnerability in Microsoft(r) Internet Information Services 5.0. The
vulnerability could enable a malicious user to run operating system
commands on an affected web server.

Microsoft strongly urges all customers using IIS 5.0 to apply the
patch immediately. IIS 4.0 is not affected by the vulnerability.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-086.asp

Affected Software Versions
==========================
- Microsoft Internet Information Service 5.0

Note: IIS 4.0 is not affected by the vulnerability.

Patch Availability
==================
- English:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25547
- Simplified Chinese:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25580
- Traditional Chinese:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25581
- German:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25582
- Japanese:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25583

Note: This patch can be applied atop system running either Windows
2000 Gold or Service Pack 1. It will be included in Windows 2000
Service Pack 2.

Security 10918 Published by Philipp Esselbach 0

Microsoft has released a patch that eliminates a security
vulnerability in Microsoft(r) Windows 2000. The vulnerability could
allow enable a malicious user to potentially run code on another
user´s machine.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-085.asp

Affected Software Versions
==========================
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server

Patch Availability
==================
- http://www.microsoft.com/Downloads/Release.asp?ReleaseID=25532