Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в ядре Microsoft Windows
Опубликовано:10 марта 2009 г.
Источник:
SecurityVulns ID:9725
Тип:клиент
Уровень опасности:
10/10
Описание:Многочисленные уязвимости позволяют выполнение кода при просмотре файлов EMF/WMF
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
CVE:CVE-2009-0083 (The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 does not properly handle invalid pointers, which allows local users to gain privileges via an application that triggers use of a crafted pointer, aka "Windows Kernel Invalid Pointer Vulnerability.")
 CVE-2009-0082 (The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate handles, which allows local users to gain privileges via a crafted application that triggers unspecified "actions," aka "Windows Kernel Handle Validation Vulnerability.")
 CVE-2009-0081 (The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability.")
Оригинальный текстdocumentSECURITY, Microsoft Security Bulletin MS09-006 – Critical Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690) (10.03.2009)
Файлы:Microsoft Security Bulletin MS09-006 – Critical Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)

Помдена служебных записей в службах DNS и WINS Microsoft Windows
Опубликовано:10 марта 2009 г.
Источник:
SecurityVulns ID:9727
Тип:удаленная
Уровень опасности:
5/10
Описание:Возможно подменить записи WPAD и ISATAP.
Затронутые продукты:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows 2008 Server
CVE:CVE-2009-0234 (The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 does not properly cache crafted DNS responses, which makes it easier for remote attackers to predict transaction IDs and poison caches by sending many crafted DNS queries that trigger "unnecessary lookups," aka "DNS Server Response Validation Vulnerability.")
 CVE-2009-0233 (The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not reuse cached DNS responses in all applicable situations, which makes it easier for remote attackers to predict transaction IDs and poison caches by simultaneously sending crafted DNS queries and responses, aka "DNS Server Query Validation Vulnerability.")
Оригинальный текстdocumentMICROSOFT, Microsoft Security Bulletin MS09-008 – Important Vulnerabilities in DNS and WINS Server Could Allow Spoofing (962238) (10.03.2009)
Файлы:Microsoft Security Bulletin MS09-008 – Important Vulnerabilities in DNS and WINS Server Could Allow Spoofing (962238)

Повреждение памяти в SChannel Microsoft Windows
дополнено с 10 марта 2009 г.
Опубликовано:11 августа 2010 г.
Источник:
SecurityVulns ID:9726
Тип:библиотека
Уровень опасности:
8/10
Описание:Повреждение памяти при разборе сертификата TLS/SSL, подмена сертификата, перехват соединения.
CVE:CVE-2010-2566 (The Secure Channel (aka SChannel) security package in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, does not properly validate certificate request messages from TLS and SSL servers, which allows remote servers to execute arbitrary code via a crafted SSL response, aka "SChannel Malformed Certificate Request Remote Code Execution Vulnerability.")
 CVE-2009-3555 (The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.)
 CVE-2009-0085 (The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability.")
Оригинальный текстdocumentMICROSOFT, Microsoft Security Bulletin MS10-049 - Critical Vulnerabilities in SChannel could allow Remote Code Execution (980436) (11.08.2010)
 documentMICROSOFT, Microsoft Security Bulletin MS09-007 - Important Vulnerability in SChannel Could Allow Spoofing (960225) (10.03.2009)
Файлы:Microsoft Security Bulletin MS09-007 - Important Vulnerability in SChannel Could Allow Spoofing (960225)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород