Site icon Secplicity – Security Simplified

Six Windows Updates Fix Nine Security Vulnerabilities

Bulletins Affect .NET Framework, Kernel-Mode Drivers, Indeo Codec, and More

Severity: High

Summary:

Exposure:

Today, Microsoft released six security bulletins describing nine vulnerabilities affecting Windows and components that ship with it. One of the bulletins also describes flaws in the .NET Framework and Silverlight, two optional yet popular Windows development frameworks.

Each vulnerability affects different versions of Windows to varying degrees. However, a remote attacker could exploit the worst of these flaws to gain complete control of your Windows PC. The summary below lists the vulnerabilities, in order from highest to lowest severity.

The kernel is the core component of any computer operating system. Windows also ships with a kernel-mode device driver (win32k.sys), which handles the OS’s device interactions at a kernel level. The kernel-mode driver suffers from two vulnerabilities. The worst is a serious code execution flaw, stemming from the kernel-mode driver’s lack of input validation when handling inputs passed from the Windows GDI. By enticing one of your users to either visit a malicious web site, open a specially crafted email, or run an evil program, an attacker could exploit this flaw to gain complete control of your Windows computer. This is a very serious flaw, which you should patch as quickly as possible.

Microsoft rating: Critical

Msvcrt.dll is a Dynamic Link Library (DLL) that many of Windows’ system level components call on to perform routine tasks. It suffers from an unspecified buffer overflow vulnerability. By enticing you to open a specially crafted media file (either via email or the web), an attacker can exploit this flaw to execute code on your computer with your privileges. If you are a local administrator, the attacker gains full control of your PC.

Microsoft rating: Critical

The .NET Framework is software framework used by developers to create new Windows and web applications. The .NET Framework and SilverLight suffers from two code execution vulnerabilities. Though the two issues differ technically, they share the same scope and impact. If an attacker can entice a user who’s installed the .NET Framework to a specially crafted web site, he can exploit this flaw to execute code on that user’s computer, with that user’s privileges. As always, if your users have local administrator privileges, attackers can leverage this to gain full control of their computers. This flaw can also affect Web servers and sites that use .NET Framework or Silverlight elements, as well as any custom .NET-based programs, which you might develop and run in house. In short, if you’ve installed the .NET framework on your servers or clients, you should update them.

Microsoft rating: Critical

The Ancillary Function Driver (AFD) is a Windows component that helps manage Winsock TCP/IP communications. It suffers from two local elevation of privilege (EoP) issues. By running a specially crafted application, an attacker can leverage either flaw to execute code with full system privileges, regardless of his actual user privilege. However, in order to run his special program, the attacker would first need to gain local access to your Windows computers using valid credentials. This factor significantly reduces the risk of this flaw.

Microsoft rating: Important.

Windows 7 ships with various “Desktop Experience” features, including the Color Control Panel. Windows Server 2008 and Server 2008 R2 do not install these Desktop Experience features by default, but  they do offer them as options. Unfortunately, the Server 2008 version of the Color Control Panel suffers from a Dynamic Link Library (DLL) loading class of vulnerability that we’ve described in many previous Microsoft alerts. In a nutshell, this class of flaw involves an attacker enticing one of your users into opening some sort of booby-trapped file from the same location as a specially crafted, malicious DLL file. If you do open the booby-trapped file, it will execute code in the malicious DLL file with your privileges. If you have local administrative privileges, the attacker could exploit this type of issue to gain complete control of your computer. In this particular case, the vulnerability is triggered by files types associated with the Color Control Panel–specifically .ICM and .ICC files.  This flaw only affects  Windows Server 2008 and Server 2008 R2 users who have installed the optional Color Control Panel feature.

Microsoft rating: Important.

The Indeo codec is a legacy video codec that Windows uses to play specifically compressed and formatted videos. The Indeo codec that ships with Windows XP suffers from an insecure library loading vulnerability exactly like the one described above. The only difference is that an attacker would have to entice you to download an .AVI file from the same location as a malicious DLL. This flaw only affects Windows XP.

Microsoft rating: Important.

Solution Path:

Microsoft has released patches for Windows which correct all of these vulnerabilities. You should download, test, and deploy the appropriate Windows patches throughout your network immediately. If you choose, you can also let Windows Update automatically download and install these updates for you.

The links below should take you directly to the “Affected and Non-Affected Software” section of each bulletin, where you can find links for the various updates:

For All WatchGuard Users:

Attackers can exploit these flaws using diverse exploitation methods. A properly configured firewall can mitigate the risk of some of these issues. Furthermore, WatchGuard’s proxy policies can block some of the content necessary to exploit some of these flaws. That said, our appliances cannot protect you from local attacks. You should install Microsoft’s updates to completely protect yourself from these flaws.

Status:

Microsoft has released patches correcting these issues.

References:

This alert was researched and written by Corey Nachreiner, CISSP (@SecAdept).

Exit mobile version