---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Internet Explorer Three Vulnerabilities SECUNIA ADVISORY ID: SA16373 VERIFY ADVISORY: http://secunia.com/advisories/16373/ CRITICAL: Highly critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: Microsoft Internet Explorer 6.x http://secunia.com/product/11/ Microsoft Internet Explorer 5.5 http://secunia.com/product/10/ Microsoft Internet Explorer 5.01 http://secunia.com/product/9/ DESCRIPTION: Three vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. 1) A memory corruption error within the processing of JPEG images can be exploited to execute arbitrary code by tricking a user into e.g. visiting a web site or view an HTML e-mail containing a specially crafted JPEG image. 2) A validation error during the interpretation of certain URLs when browsing from a web site to a web folder view using WebDAV can be exploited to execute arbitrary script code in another domain (e.g. on the user's system in the "Local Machine" security zone). 3) An error in the way COM objects are instantiated as ActiveX controls can be exploited to corrupt system memory and allows execution of arbitrary code on a user's system when e.g. a malicious web site is visited. SOLUTION: Apply patches. Internet Explorer 5.01 (requires SP4) on Windows 2000 SP4: http://www.microsoft.com/downloads/details.aspx?FamilyId=194E0EE7-919C-4A8B-AD8D-01A4FE771942 Internet Explorer 6 (requires SP1) on Windows 2000 SP4 or Windows XP SP1: http://www.microsoft.com/downloads/details.aspx?FamilyId=68300B15-1CF9-45FB-875E-2EF6D2FBC9ED Internet Explorer 6 for Windows XP SP2: http://www.microsoft.com/downloads/details.aspx?FamilyId=648B6F0E-1695-44E5-826A-43406DF4858E Internet Explorer 6 for Windows Server 2003 (optionally with SP1): http://www.microsoft.com/downloads/details.aspx?FamilyId=0B96EC3-E954-423A-9AB0-5712B9F14637 Internet Explorer 6 for Windows Server 2003 for Itanium-based systems (optionally with SP1): http://www.microsoft.com/downloads/details.aspx?FamilyId=C24D3738-213A-41B8-84A3-2842B34D7B10 Internet Explorer 6 for Windows Server 2003 x64 Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=F2D544E7-33F5-4A65-A574-15495B05B883 Internet Explorer 6 for Microsoft Windows XP Professional x64 Edition: http://www.microsoft.com/downloads/details.aspx?FamilyId=1181BC67-0A1D-4A06-99AC-5B2BC6DFE0F6 Internet Explorer 5.5 (requires SP2) on Windows ME: Patches are available from the Windows Update web site. NOTE: See vendor advisory for Slovenian and Slovakian patches for Windows ME. Internet Explorer 6 (requires SP1) on Windows 98, Windows 98 SE, or Windows ME: Patches are available from the Windows Update web site. NOTE: See vendor advisory for Slovenian and Slovakian patches for Windows ME. PROVIDED AND/OR DISCOVERED BY: 3) The vendor credits the following people: * NSFOCUS Security Team * Bernhard Mueller and Martin Eiszner, SEC Consult. ORIGINAL ADVISORY: MS05-038 (KB896727): http://www.microsoft.com/technet/security/Bulletin/MS05-038.mspx OTHER REFERENCES: Known problems when installing the cumulative update: http://support.microsoft.com/kb/896727 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------