Microsoft Updates for Multiple Vulnerabilities
http://jvnrss.ise.chuo-u.ac.jp/jtg/trn/en/TRTA07-345A.html
JVNRSS based Status Tracking Notes: Microsoft has released updates that address critical vulnerabilities in Microsoft Windows and Internet Explorer. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code, gain elevated privileges, or crash a vulnerable system.JVNRSS Feasibility Study Teamjvn@jvn.jpTRTA07-345A2008-01-14T20:46+00:002007-12-16T15:27+00:002008-01-14T20:46+00:00Microsoft DirectX SAMI File Parsing Remote Stack Overflow Exploit
http://www.securityfocus.com/bid/26789
Microsoft DirectX Code Execution Vulnerability Parsing SAMI Files Proof Of Concept (CVE-2007-3901,MS07-064)
#Cid: 26789.py
#Tested: Windows 2000 SP4 [EN], DirectX 7.0 (4.07.00.0700)
Bugtraqhttp://www.us-cert.gov/cas/techalerts/TA07-345A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3901http://www.microsoft.com/technet/security/bulletin/ms07-064.mspx2008-01-082008-01-082008-01-08MS Windows 2000 AS SP4 Message Queue Exploit (MS07-065)
http://www.securityfocus.com/bid/26797
Message Queuing Service Remote Code Execution Vulnerability Proof Of Concept (CVE-2007-3039,MS07-065)
#Cid: MessageQueueexpl.c
#Tested: Windows 2000 Advanced Server [ES]
Bugtraqhttp://www.us-cert.gov/cas/techalerts/TA07-345A.htmlhttp://www.microsoft.com/technet/security/bulletin/MS07-065.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-30392007-12-212007-12-212007-12-21Internet Explorer 6 crashes after you install security update 942615 on a computer that is running Windows XP Service Pack 2
http://support.microsoft.com/kb/946627/en
Cumulative Security Update for Internet Explorer (MS07-069)
MicrosoftKnowledge Base (946627)http://www.microsoft.com/technet/security/bulletin/MS07-069.mspx2007-12-19T09:40-08:002007-12-19T09:40-08:002007-12-19T09:40-08:00Windows Message Queuing Service Remote RPC BOF Exploit (MS07-065)
http://www.securityfocus.com/bid/26797
Message Queuing Service Remote Code Execution Vulnerability Proof Of Concept (CVE-2007-3039,MS07-065)
#Cid: 26797.c
#Tested: Windows 2000 + SP4
Bugtraqhttp://www.us-cert.gov/cas/techalerts/TA07-345A.htmlhttp://www.microsoft.com/technet/security/bulletin/MS07-065.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-30392007-12-182007-12-182007-12-18ThreatCON (2) => (1)
https://tms.symantec.com/
Symantec2007-12-14T18:28+00:002007-12-14T18:28+00:002007-12-14T18:28+00:00Dec 2007 Microsoft Security Bulletin (including three critical patches)
http://www.jpcert.or.jp/at/2007/at070024.txt
JPCERT/CCJPCERT-AT-2007-0024http://www.microsoft.com/technet/security/bulletin/ms07-063.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-064.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-065.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-066.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-067.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-068.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-069.mspx2007-12-12T01:11+00:002007-12-12T01:11+00:002007-12-12T01:11+00:00December black tuesday overview
http://isc.sans.org/diary.html?storyid=3735
Overview of the December 2007 Microsoft patches and their status.
SANS Internet Storm Centerhttp://www.us-cert.gov/cas/techalerts/TA07-345A.htmlhttp://www.microsoft.com/technet/security/bulletin/ms07-063.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-064.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-065.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-066.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-067.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-068.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-069.mspx2007-12-11T23:47+00:002007-12-11T23:47+00:002007-12-11T23:47+00:00Microsoft Updates for Multiple Vulnerabilities
http://www.us-cert.gov/cas/techalerts/TA07-345A.html
Via US-CERT Mailing List
US-CERTTA07-345Ahttp://www.uscert.gov/cas/techalerts/TA07-345A.htmlhttp://www.microsoft.com/technet/security/bulletin/ms07-063.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-064.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-065.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-066.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-067.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-068.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-069.mspx2007-12-11T17:36-05:002007-12-11T17:36-05:002007-12-11T17:36-05:00ThreatCON (1) => (2)
https://tms.symantec.com/
Symantechttp://www.uscert.gov/cas/techalerts/TA07-345A.html2007-12-12T01:00+09:002007-12-12T01:00+09:002007-12-12T01:00+09:00Microsoft Security Bulletin Summary for December 2007
http://www.microsoft.com/technet/security/bulletin/ms07-dec.mspx
Included in this advisory are updates for newly discovered vulnerabilities.
MicrosoftMS07-DEChttp://www.microsoft.com/technet/security/bulletin/ms07-063.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-064.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-065.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-066.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-067.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-068.mspxhttp://www.microsoft.com/technet/security/bulletin/ms07-069.mspx2007-12-11T08:00+00:002007-12-11T08:00+00:002007-12-11T08:00+00:00Microsoft Releases December Security Bulletins
http://www.us-cert.gov/current/archive/2007/12/12/archive.html#microsoft_releases_december_security_bulletins
US-CERT Current Activity
Microsoft has released updates to address vulnerabilities in Windows, DirectX, DirectShow, Windows Media Format Runtime, and Internet Explorer as part of the Microsoft Security Bulletin Summary for December 2007.
US-CERThttp://www.uscert.gov/cas/techalerts/TA07-345A.html2007-12-11T02:07-04:002007-12-11T02:07-04:002007-12-11T02:07-04:00Multiple Microsoft DirectShow Remote Code Execution Vulnerabilities
http://www.iss.net/threats/280.html
Two vulnerabilities in Microsoft DirectShow could allow remote code execution. By creating a malicious file and enticing a user to click a link or open a file, an attacker could remotely execute unauthorized code with the privileges of the user.
IBM Internet Security Systemshttp://xforce.iss.net/xforce/xfdb/38721http://xforce.iss.net/xforce/xfdb/38722http://www.microsoft.com/technet/security/Bulletin/MS07-064.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3901http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-38952007-12-112007-12-112007-12-11Multiple (4) Microsoft Windows Media Player .ASF Remote Code Execution Vulnerabilities
http://www.iss.net/threats/279.html
Four vulnerabilities in Microsoft Windows Media Player could allow remote code execution. By creating a malicious .ASP file and enticing a user to click a link or open a file, an attacker could trigger a heap overflow through a malformed ASF stream and remotely execute unauthorized code with the privileges of the user.
IBM Internet Security Systemshttp://xforce.iss.net/xforce/xfdb/38827http://xforce.iss.net/xforce/xfdb/38828http://xforce.iss.net/xforce/xfdb/38829http://xforce.iss.net/xforce/xfdb/38830http://www.microsoft.com/technet/security/Bulletin/MS07-068.mspxhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-00642007-12-112007-12-112007-12-11Vulnerability in Macrovision SECDRV.SYS Driver on Windows Could Allow Elevation of Privilege
http://www.microsoft.com/technet/security/advisory/944653.mspx
Macrovision Driver Vulnerability (CVE-2007-5587,MS07-067)
MicrosoftMicrosoft Security Advisory (944653)http://www.microsoft.com/technet/security/bulletin/MS07-067.mspxhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-55872007-11-052007-11-052007-11-05Symantec Security Response Weblog: Privilege Escalation Exploit In the Wild
http://www.symantec.com/enterprise/security_response/weblog/2007/10/privilege_escalation_exploit_i.html
Macrovision Driver Vulnerability (CVE-2007-5587,MS07-067)
During the weekend I found an interesting sample exploiting a possibly new and undocumented vulnerability for Windows XP and 2003. The exploit is a local privilege escalation that allows users with a restricted account to gain a SYSTEM shell with higher privileges.
Symantechttp://www.microsoft.com/technet/security/bulletin/MS07-067.mspxhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-55872007-10-16T17:23+00:002007-10-16T17:23+00:002007-10-16T17:23+00:00Microsoft DirectX 7 and 8 DirectShow Stack Buffer Overflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=632
Microsoft DirectX Code Execution Vulnerability Parsing SAMI Files (CVE-2007-3901,MS07-064)
Vulnerability Reported
This vulnerability exists in the DirextShow SAMI parser, which is implemented in quartz.dll. When the SAMI parser copies parameters into a stack buffer, it does not properly check the length of the parameter. As such, parsing a specially crafted SAMI file can cause a stack-based buffer overflow.
iDefensehttp://www.us-cert.gov/cas/techalerts/TA07-345A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3901http://www.microsoft.com/technet/security/bulletin/ms07-064.mspx2007-09-282007-09-282007-09-28Microsoft Internet Explorer Element Tags Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-075.html
Uninitialized Memory Corruption Vulnerability (CVE-2007-5344,MS07-069)
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-075http://www.microsoft.com/technet/security/bulletin/MS07-069.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-53442007-07-202007-07-202007-07-20Microsoft Internet Explorer setExpression Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-073.html
Uninitialized Memory Corruption Vulnerability (CVE-2007-3902,MS07-069)
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-073http://www.microsoft.com/technet/security/bulletin/MS07-069.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-39022007-07-202007-07-202007-07-20Microsoft Internet Explorer Node Manipulation Memory Corruption Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-074.html
Uninitialized Memory Corruption Vulnerability (CVE-2007-3903,MS07-069)
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-074http://www.microsoft.com/technet/security/bulletin/MS07-069.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-39032007-05-222007-05-222007-05-22Microsoft Internet Explorer JavaScript setExpression Heap Corruption Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=631
Uninitialized Memory Corruption Vulnerability (CVE-2007-3902,MS07-069)
Vulnerability Reported
The vulnerability lies in the JavaScript setExpression method, which is implemented in mshtml.dll. When malformed parameters are supplied, memory can be corrupted in a way that results in Internet Explorer accessing a previously deleted object. By creating a specially crafted web page, it is possible for an attacker to control the contents of the memory pointed to by the released object.
iDefensehttp://www.us-cert.gov/cas/techalerts/TA07-345A.htmlhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3902http://www.microsoft.com/technet/security/bulletin/ms07-069.mspx2007-05-082007-05-082007-05-08Microsoft Windows Message Queuing Service Stack Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-076.html
Message Queuing Service Remote Code Execution Vulnerability (CVE-2007-3039,MS07-065)
Vulnerability Reported
Zero Day Initiative (ZDI)ZDI-07-076http://www.microsoft.com/technet/security/bulletin/MS07-065.mspxhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-30392007-04-022007-04-022007-04-02