Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VULNERABLITIES - December 13, 2005

Dec 13, 2005 6:06AM PST

TITLE:
Microsoft Windows Kernel APC Queue List Handling Privilege Escalation

SECUNIA ADVISORY ID:
SA15821

VERIFY ADVISORY:
http://secunia.com/advisories/15821/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Server
http://secunia.com/product/20/

DESCRIPTION:
A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to an error in the Kernel when
processing items in the APC (Asynchronous Procedure Call) queue list.
This can be exploited by logon users to gain escalated privileges by
running a malicious program.

Successful exploitation requires a valid logon to the affected
system.

SOLUTION:
Apply patches.

Microsoft Windows 2000 (requires SP 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=3832FF23-6B04-4CA2-80B9-D344B4CC98EA

PROVIDED AND/OR DISCOVERED BY:
The vendor credits eEye Digital Security.

ORIGINAL ADVISORY:
MS05-055 (KB908523):
http://www.microsoft.com/technet/security/Bulletin/MS05-055.mspx

Discussion is locked

- Collapse -
Microsoft Internet Explorer Multiple Vulnerabilities
Dec 13, 2005 6:07AM PST

TITLE:
Microsoft Internet Explorer Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA15368

VERIFY ADVISORY:
http://secunia.com/advisories/15368/

CRITICAL:
Highly critical

IMPACT:
Security Bypass, Exposure of sensitive information, System access

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6.x
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
Five vulnerabilities have been reported in Microsoft Internet
Explorer, which can be exploited by malicious people to view
potentially sensitive information, to trick users into downloading
and executing arbitrary programs, and to compromise a user's system.

1) A design error in the processing of keyboard shortcuts for certain
security dialogs can e.g. be exploited to delay the "File Download"
dialog box and trick users into executing a malicious ".bat" file
after pressing the "r" key.

2) A design error in the processing of mouse clicks in new browser
windows and the predictability of the position of the "File Download"
dialog box can be exploited to trick the user into clicking on the
"Run" button of the dialog box. This is exploited by first causing a
"File Download" dialog box to be displayed underneath a new browser
window, and then tricking the user into double-clicking within a
specific area in the new window. This will result in an unintended
click of the "Run" button in the hidden "File Download" dialog box.

3) An error exists in Internet Explorer when used with a HTTPS proxy
server that requires clients to use Basic Authentication. This may
cause web addresses that are sent from Internet Explorer to be
disclosed to a third-party even when HTTPS connection is used.

4) An error exists when certain COM objects that are not intended to
be used with Internet Explorer are instantiated in Internet Explorer.
This can be exploited to execute arbitrary code via a malicious
webpage that instantiates a vulnerable COM object.

This is related to:
SA16480

5) An error exists in the initialisation of certain objects when the
"window()" function is used in conjunction with the "<body onload>"
event. This can be exploited to execute arbitrary code via a
malicious webpage.

For more information:
SA15546

The vulnerabilities #1, #2, and #5 have been confirmed on a fully
patched system with Internet Explorer 6.0 and Microsoft Windows XP
SP2. Other versions may also be affected.

SOLUTION:
Apply patches.

Internet Explorer 5.01 SP 4 on Microsoft Windows 2000 (requires SP
4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=4005B74A-D6E6-4A32-A3B1-276686B4A428

Internet Explorer 6 SP 1 on Microsoft Windows 2000 (requires SP 4) or
on Microsoft Windows XP (requires SP 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=A8443CD2-D98D-427B-9F0E-BD7E19FCB994

Internet Explorer 6 for Microsoft Windows XP (requires SP 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=E4B5BA57-D4F2-4798-9154-2869E371C9D1

Internet Explorer 6 for Microsoft Windows Server 2003 (with or
without SP 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=9D70FB20-C7C9-43AF-A864-6DBC9A542CC6

Internet Explorer 6 for Microsoft Windows Server 2003 (Itanium) (with
or without SP 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=1EE790B9-E596-4344-AEC3-FCB3289D7E9C

Internet Explorer 6 for Microsoft Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=8E9C23E5-7988-42DA-A8BD-2C1A534BF995

Internet Explorer 6 for Microsoft Windows XP Professional x64
Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=E1652B4A-6339-4B31-8ACF-D2A844C24F70

For Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft
Windows Millennium Edition, see the vendors original advisory.

PROVIDED AND/OR DISCOVERED BY:
1) Andreas Sandblad, Secunia Research
2) Jakob Balle, Secunia Research
4) Will Dormann, CERT/CC

ORIGINAL ADVISORY:
Secunia Research:
http://secunia.com/secunia_research/2005-7/advisory/
http://secunia.com/secunia_research/2005-21/advisory/

MS05-054 (KB905915):
http://www.microsoft.com/technet/security/Bulletin/MS05-054.mspx

- Collapse -
Opera Suppressed "Download Dialog" File Execution Vulnerabil
Dec 13, 2005 6:18AM PST

TITLE:
Opera Suppressed "Download Dialog" File Execution Vulnerability

SECUNIA ADVISORY ID:
SA15781

VERIFY ADVISORY:
http://secunia.com/advisories/15781/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
From remote

SOFTWARE:
Opera 8.x
http://secunia.com/product/4932/

DESCRIPTION:
Secunia Research has discovered a vulnerability in Opera, which can
be exploited by malicious people to trick users into downloading and
executing arbitrary programs on a user's system.

A design error in the processing of mouse clicks in new browser
windows and the predictability of the position of the "File Download"
dialog box can be exploited to trick the user into clicking on the
"Run" button of the dialog box. This is exploited by first causing a
"File Download" dialog box to be displayed underneath a new browser
window, and then tricking the user into double-clicking within a
specific area in the new window. This will result in an unintended
click of the "Open" button in the hidden "File Download" dialog box.

The vulnerability has been confirmed in version 8.01. Other versions
may also be affected.

SOLUTION:
Update to version 8.02 or later.
http://www.opera.com/download/

PROVIDED AND/OR DISCOVERED BY:
Jakob Balle, Secunia Research

ORIGINAL ADVISORY:
http://secunia.com/secunia_research/2005-19/