Tags Palabras claves

[Seguridad] Internet Explorer Multiple Vulnerabilities

13/10/2004 - 01:19 por fermu | Informe spam
Publico esto en el foro de win98 e IE6, porque me parece que no lo ha
publicado nadie hasta la fecha y la informacion me parece importante.
Transcribo el testo integro de uno de los boletinos remitidos por Secunia,
a pie de post van los enlaces para parchear convenientemente nuestro IE
para solventar en la medida de lo posible la incidencia de estas
vulnerabilidades

Seguimiento de respuestas en el foro de IE6
TITLE:
Internet Explorer Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA12806

VERIFY ADVISORY:
http://secunia.com/advisories/12806/

CRITICAL:
Extremely critical

IMPACT:
Spoofing, Exposure of sensitive information, System access

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
Multiple vulnerabilities have been reported in Internet Explorer,
where the most critical can be exploited by malicious people to
compromise a user's system.

1) A boundary error within the processing of CSS (Cascading Style
Sheets) can be exploited to cause a buffer overflow via a malicious
web page or HTML e-mail message.

Successful exploitation allows execution of arbitrary code.

2) An error in the cross-domain security model within the handling of
navigation methods by functions with similar names can be exploited to
execute arbitrary script code in the "Local Machine" security zone or
access information in a different domain.

For more information:
SA12048

3) A boundary error in the Install Engine (Inseng.dll) can be
exploited to cause a buffer overflow via a malicious web page or HTML
e-mail message.

Successful exploitation allows execution of arbitrary code.

4) Insufficient validation of drag and drop events issued from the
"Internet" zone to local resources can be exploited by malicious
people to plant arbitrary executable files on a user's system.

For more information:
SA12321

5) A canonicalization error within the processing of URLs on DBCS
(Double Byte Character Set) systems can be exploited to spoof
information displayed in the address bar.

6) An error within the processing of plug-in navigations can be
exploited to spoof information displayed in the address bar.

7) An error within the way scripts are processed in image tags can be
exploited to save files on a user's system by tricking the user into
visiting a malicious web site or view a malicious e-mail message.

For more information:
SA12048

8) An error within the handled of cached SSL content can be exploited
to access sensitive information or spoof content on SSL-protected web
sites.

SOLUTION:
Apply patches.

Internet Explorer 5.01 SP3 on Windows 2000 SP3:
http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 5.01 SP4 on Windows 2000 SP4:
http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 5.5 SP2 on Microsoft Windows Me:
http://www.microsoft.com/downloads/...laylang=en
        
Internet Explorer 6 on Windows XP:
http://www.microsoft.com/downloads/...laylang=en
        
Internet Explorer 6 SP1 on Windows 2000 SP3/SP4, Windows XP, or
Windows XP SP1:
http://www.microsoft.com/downloads/...x?FamilyId|1404E6-F5D4-4FED-9573-DD83F2DFF074&displaylang=en

Internet Explorer 6 SP1 on Windows NT Server 4.0 SP6a, Windows NT
Server 4.0 TSE SP6, Windows 98 and SE, or Windows Me:
http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows XP SP1 (64-Bit Edition):
http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows Server 2003:
http://www.microsoft.com/downloads/...x?FamilyIdE69E5F-9C98-49AD-A61F-4F82A4014412&displaylang=en

Internet Explorer 6 for Windows Server 2003 64-Bit Edition and
Windows XP 64-Bit Edition Version 2003:
http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows XP SP2:
http://www.microsoft.com/downloads/...laylang=en

PROVIDED AND/OR DISCOVERED BY:
3) Greg Jones of KPMG UK and Peter Winter-Smith of Next Generation
Security Software.
8) Mitja Kolsek, ACROS Security.

ORIGINAL ADVISORY:
MS04-038 (KB834707):
http://www.microsoft.com/technet/se...4-038.mspx

OTHER REFERENCES:
SA12048:
http://secunia.com/advisories/12048/

SA12321:
http://secunia.com/advisories/12321/

Saludos
Fernando M. / Registered Linux User #367696

Preguntas similare

Leer las respuestas

#1 José Gallardo
13/10/2004 - 07:40 | Informe spam
Muchas gracias... ¡Nos vas a hacer leer mucho! ;-)


"fermu" escribió en el mensaje
news:
Publico esto en el foro de win98 e IE6, porque me parece que no lo ha
publicado nadie hasta la fecha y la informacion me parece importante.
Transcribo el testo integro de uno de los boletinos remitidos por Secunia,
a pie de post van los enlaces para parchear convenientemente nuestro IE
para solventar en la medida de lo posible la incidencia de estas
vulnerabilidades

Seguimiento de respuestas en el foro de IE6
TITLE:
Internet Explorer Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA12806

VERIFY ADVISORY:
http://secunia.com/advisories/12806/

CRITICAL:
Extremely critical

IMPACT:
Spoofing, Exposure of sensitive information, System access

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
Multiple vulnerabilities have been reported in Internet Explorer,
where the most critical can be exploited by malicious people to
compromise a user's system.

1) A boundary error within the processing of CSS (Cascading Style
Sheets) can be exploited to cause a buffer overflow via a malicious
web page or HTML e-mail message.

Successful exploitation allows execution of arbitrary code.

2) An error in the cross-domain security model within the handling of
navigation methods by functions with similar names can be exploited to
execute arbitrary script code in the "Local Machine" security zone or
access information in a different domain.

For more information:
SA12048

3) A boundary error in the Install Engine (Inseng.dll) can be
exploited to cause a buffer overflow via a malicious web page or HTML
e-mail message.

Successful exploitation allows execution of arbitrary code.

4) Insufficient validation of drag and drop events issued from the
"Internet" zone to local resources can be exploited by malicious
people to plant arbitrary executable files on a user's system.

For more information:
SA12321

5) A canonicalization error within the processing of URLs on DBCS
(Double Byte Character Set) systems can be exploited to spoof
information displayed in the address bar.

6) An error within the processing of plug-in navigations can be
exploited to spoof information displayed in the address bar.

7) An error within the way scripts are processed in image tags can be
exploited to save files on a user's system by tricking the user into
visiting a malicious web site or view a malicious e-mail message.

For more information:
SA12048

8) An error within the handled of cached SSL content can be exploited
to access sensitive information or spoof content on SSL-protected web
sites.

SOLUTION:
Apply patches.

Internet Explorer 5.01 SP3 on Windows 2000 SP3:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 5.01 SP4 on Windows 2000 SP4:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 5.5 SP2 on Microsoft Windows Me:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 on Windows XP:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 SP1 on Windows 2000 SP3/SP4, Windows XP, or
Windows XP SP1:



http://www.microsoft.com/downloads/...x?FamilyId|1404E6-F5D4-4FED-9573-DD83F2DFF074&displaylang=en

Internet Explorer 6 SP1 on Windows NT Server 4.0 SP6a, Windows NT
Server 4.0 TSE SP6, Windows 98 and SE, or Windows Me:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows XP SP1 (64-Bit Edition):



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows Server 2003:



http://www.microsoft.com/downloads/...x?FamilyIdE69E5F-9C98-49AD-A61F-4F82A4014412&displaylang=en

Internet Explorer 6 for Windows Server 2003 64-Bit Edition and
Windows XP 64-Bit Edition Version 2003:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows XP SP2:



http://www.microsoft.com/downloads/...laylang=en

PROVIDED AND/OR DISCOVERED BY:
3) Greg Jones of KPMG UK and Peter Winter-Smith of Next Generation
Security Software.
8) Mitja Kolsek, ACROS Security.

ORIGINAL ADVISORY:
MS04-038 (KB834707):
http://www.microsoft.com/technet/se...4-038.mspx

OTHER REFERENCES:
SA12048:
http://secunia.com/advisories/12048/

SA12321:
http://secunia.com/advisories/12321/


-
Saludos
Fernando M. / Registered Linux User #367696
Respuesta Responder a este mensaje
#2 José Gallardo
13/10/2004 - 12:43 | Informe spam
Vuelvo a darte las gracias. Ya lo hice esta mañana, pero parece que mi post
es ha perdido en el "ciberlimbo". Por lo menos a mí no me aparece. :-)


"fermu" escribió en el mensaje
news:
Publico esto en el foro de win98 e IE6, porque me parece que no lo ha
publicado nadie hasta la fecha y la informacion me parece importante.
Transcribo el testo integro de uno de los boletinos remitidos por Secunia,
a pie de post van los enlaces para parchear convenientemente nuestro IE
para solventar en la medida de lo posible la incidencia de estas
vulnerabilidades

Seguimiento de respuestas en el foro de IE6
TITLE:
Internet Explorer Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA12806

VERIFY ADVISORY:
http://secunia.com/advisories/12806/

CRITICAL:
Extremely critical

IMPACT:
Spoofing, Exposure of sensitive information, System access

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
Multiple vulnerabilities have been reported in Internet Explorer,
where the most critical can be exploited by malicious people to
compromise a user's system.

1) A boundary error within the processing of CSS (Cascading Style
Sheets) can be exploited to cause a buffer overflow via a malicious
web page or HTML e-mail message.

Successful exploitation allows execution of arbitrary code.

2) An error in the cross-domain security model within the handling of
navigation methods by functions with similar names can be exploited to
execute arbitrary script code in the "Local Machine" security zone or
access information in a different domain.

For more information:
SA12048

3) A boundary error in the Install Engine (Inseng.dll) can be
exploited to cause a buffer overflow via a malicious web page or HTML
e-mail message.

Successful exploitation allows execution of arbitrary code.

4) Insufficient validation of drag and drop events issued from the
"Internet" zone to local resources can be exploited by malicious
people to plant arbitrary executable files on a user's system.

For more information:
SA12321

5) A canonicalization error within the processing of URLs on DBCS
(Double Byte Character Set) systems can be exploited to spoof
information displayed in the address bar.

6) An error within the processing of plug-in navigations can be
exploited to spoof information displayed in the address bar.

7) An error within the way scripts are processed in image tags can be
exploited to save files on a user's system by tricking the user into
visiting a malicious web site or view a malicious e-mail message.

For more information:
SA12048

8) An error within the handled of cached SSL content can be exploited
to access sensitive information or spoof content on SSL-protected web
sites.

SOLUTION:
Apply patches.

Internet Explorer 5.01 SP3 on Windows 2000 SP3:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 5.01 SP4 on Windows 2000 SP4:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 5.5 SP2 on Microsoft Windows Me:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 on Windows XP:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 SP1 on Windows 2000 SP3/SP4, Windows XP, or
Windows XP SP1:



http://www.microsoft.com/downloads/...x?FamilyId|1404E6-F5D4-4FED-9573-DD83F2DFF074&displaylang=en

Internet Explorer 6 SP1 on Windows NT Server 4.0 SP6a, Windows NT
Server 4.0 TSE SP6, Windows 98 and SE, or Windows Me:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows XP SP1 (64-Bit Edition):



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows Server 2003:



http://www.microsoft.com/downloads/...x?FamilyIdE69E5F-9C98-49AD-A61F-4F82A4014412&displaylang=en

Internet Explorer 6 for Windows Server 2003 64-Bit Edition and
Windows XP 64-Bit Edition Version 2003:



http://www.microsoft.com/downloads/...laylang=en

Internet Explorer 6 for Windows XP SP2:



http://www.microsoft.com/downloads/...laylang=en

PROVIDED AND/OR DISCOVERED BY:
3) Greg Jones of KPMG UK and Peter Winter-Smith of Next Generation
Security Software.
8) Mitja Kolsek, ACROS Security.

ORIGINAL ADVISORY:
MS04-038 (KB834707):
http://www.microsoft.com/technet/se...4-038.mspx

OTHER REFERENCES:
SA12048:
http://secunia.com/advisories/12048/

SA12321:
http://secunia.com/advisories/12321/


-
Saludos
Fernando M. / Registered Linux User #367696
Respuesta Responder a este mensaje
#3 fermu
13/10/2004 - 14:09 | Informe spam
Hash: SHA1

José Gallardo wrote:
| Vuelvo a darte las gracias. Ya lo hice esta mañana, pero parece que mi
post
| es ha perdido en el "ciberlimbo". Por lo menos a mí no me aparece. :-)

De nada Pepe, me parece que ya posteo Enrique anteriormente este mismo
aviso en el grupo de IE6, pero no en el de Win98... de todas formas, no
creo que venga mal recordar estas cosillas. :-)

Este post lleva Crossposting, simplemente para volver a advertir que el
post que genero el hilo original lleva followup al grupo de IE6, por lo
que todas las contestaciones se ven solo en ese grupo (IE6), saludos y
disculpas a los dos grupos por volver a repetir el Cross

Saludos
Fernando M. / Registered Linux User #367696
En benificio de todos, preguntas y respuestas en el foro :-)
Respuesta Responder a este mensaje
#4 fermu
13/10/2004 - 14:09 | Informe spam
Hash: SHA1

José Gallardo wrote:
| Vuelvo a darte las gracias. Ya lo hice esta mañana, pero parece que mi
post
| es ha perdido en el "ciberlimbo". Por lo menos a mí no me aparece. :-)

De nada Pepe, me parece que ya posteo Enrique anteriormente este mismo
aviso en el grupo de IE6, pero no en el de Win98... de todas formas, no
creo que venga mal recordar estas cosillas. :-)

Este post lleva Crossposting, simplemente para volver a advertir que el
post que genero el hilo original lleva followup al grupo de IE6, por lo
que todas las contestaciones se ven solo en ese grupo (IE6), saludos y
disculpas a los dos grupos por volver a repetir el Cross

Saludos
Fernando M. / Registered Linux User #367696
En benificio de todos, preguntas y respuestas en el foro :-)
email Siga el debate Respuesta Responder a este mensaje
Ads by Google
Help Hacer una preguntaRespuesta Tengo una respuesta
Search Busqueda sugerida