iTnews

Microsoft fixes 11 vulnerabilities, 8 'critical,' on Patch Tuesday

By Jim Carr on Jul 11, 2007 10:47AM
Microsoft fixes 11 vulnerabilities, 8 'critical,' on Patch Tuesday

Microsoft released six patches covering 11 vulnerabilities on July's monthly Patch Tuesday, including "critical" fixes impacting Active Directory on Windows 2000 and 2003 Server and its .Net Framework products. In all, Microsoft rated eight of the 11 vulnerabilities as critical.

Active Directory and .Net Framework vulnerabilities have the potential to significantly negative impact enterprise systems, noted Eric Shultze, the chief security architect at Shavlik Technologies.

The Active Directory patch (bulletin MS07-039) is particularly dangerous because it "can allow any user on the network to take over a domain controller," he said.

It does so "by leveraging a problem in LDAP [the Lightweight Directory Access Protocol] turned on by default" by Microsoft in Windows 2000 and 2003 Server systems, he added. It's "critical" because it could allow an attacker take over a domain controller and gain access to every user name and password on the system, he added.

That would include discovering the master password for the security controller, Shultze said. "This is the crown jewel" of a Microsoft-based domain and should be fixed ASAP, he added. If an enterprise "loses control of the domain controller, there's no sense in patching the others, because attacker now has you."

IBM X-Force researcher Neel Mehta, who created a proof-of-concept exploit code, discovered the Active Directory flaw in July, 2007.

The .Net Framework vulnerability has the potential to affect a broad range of applications on all of Microsoft's Windows platforms, said Don Leatham, director of business development for PatchLink.

"It's such a pervasive part of Microsoft technology," he said, noting that it's used as the foundation in many organisations' internal as well as commercial shrink-wrapped applications.

"Because so many businesses use .Net Framework to develop business applications, both software-development and operations teams must patch their systems," Andrew Storms, director of security operations at nCircle.

Although Microsoft rated MS07-041 as "important," Shultze called the vulnerability, which affects Microsoft's Internet Information Server (IIS) running on Windows XP, as critical.

"Microsoft says because ISS is not installed by default -- that you have to go out of way to run it --it's not critical," he explains. "But it's critical if you have a web server on XP because a remote attacker can send one URL and can gain complete access to XP machine."

The final Microsoft-labeled "critical" patch involves a flaw in Excel. Opening an Excel file with malicious code on an unpatched Windows PC could allow a remote user to hijack the system via a buffer overflow.

Microsoft also patched a flaw in a process called "teredo," which manages IPV6 and IPV4 bridging. The flaw that can open a hole in the Windows Vista firewall in the presence of a malicious URL, according to Shultze.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:
118criticalfixesmicrosoftonpatchsecuritytuesdayvulnerabilities

Partner Content

Operationalising net zero to be centre stage at IoT Impact conference
Partner Content Operationalising net zero to be centre stage at IoT Impact conference
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Matt Tett to lead essential primer session on security by design
Partner Content Matt Tett to lead essential primer session on security by design

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Jim Carr
Jul 11 2007
10:47AM
0 Comments

Related Articles

  • VMware admins asked to patch eight vulnerabilities
  • Microsoft pushes patch for exploited flaw in on-prem Exchange
  • Edtech vendors invaded student privacy: Human Rights Watch
  • Microsoft security patches breaking authentication
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

What to expect from the incoming Labor government

What to expect from the incoming Labor government

Digital Nation

COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.