-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2009.1176
        Vulnerabilities in Microsoft Active Template Library (ATL)
                Could Allow Remote Code Execution (973908)
                              12 August 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Outlook Express 5.5 and 6
                   Windows Media Player 9, 10 and 11
                   DHTML Editing Component ActiveX Control
                   Microsoft MSWebDVD ActiveX Control
                   Windows ATL Component
Publisher:         Microsoft
Operating System:  Windows 2000
                   Windows XP
                   Windows Server 2003
                   Windows Vista
                   Windows Server 2008
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Mitigation
CVE Names:         CVE-2009-2494 CVE-2009-2493 CVE-2009-0901
                   CVE-2008-0020 CVE-2008-0015 

Original Bulletin: 
   http://www.microsoft.com/technet/security/bulletin/ms09-037.mspx

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS09-037 - Critical

Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow
Remote Code Execution (973908)

   Published: August 11, 2009

   Version: 1.0

General Information

Executive Summary

   This security update resolves several privately reported
   vulnerabilities in Microsoft Active Template Library (ATL). The
   vulnerabilities could allow remote code execution if a user loaded a
   specially crafted component or control hosted on a malicious website.
   Users whose accounts are configured to have fewer user rights on the
   system could be less impacted than users who operate with
   administrative user rights.

   This security update is rated Critical for all supported editions of
   Microsoft Windows 2000 Service Pack 4, Windows XP, Windows Server
   2003, Windows Vista, and Windows Server 2008. For more information on
   the software affected by this update, see the subsection, Affected and
   Non-Affected Software, in this section. For more information on the
   impact of, and workarounds and mitigations for controls and components
   that may be vulnerable to these issues, please see [22]Microsoft
   Security Advisory (973882).

   The security update addresses the vulnerabilities by modifying the ATL
   headers so that components and controls built using the headers can
   safely initialize from a data stream, and by providing updated
   versions of Windows components and controls built using corrected ATL
   headers. For more information about the vulnerabilities, see the
   Frequently Asked Questions (FAQ) subsection for the specific
   vulnerability entry under the next section, Vulnerability Information.

   Recommendation.  The majority of customers have automatic updating
   enabled and will not need to take any action because this security
   update will be downloaded and installed automatically. Customers who
   have not enabled automatic updating need to check for updates and
   install this update manually. For information about specific
   configuration options in automatic updating, see Microsoft
   Knowledge Base Article 294871.

   For administrators and enterprise installations, or end users who want
   to install this security update manually, Microsoft recommends that
   customers apply the update immediately using update management
   software, or by checking for updates using the Microsoft Update
   service.

   Known Issues. None

Affected Software

   Microsoft Windows 2000:
   Microsoft Outlook Express 5.5 Service Pack 2 (KB973354)
   Microsoft Outlook Express 6 Service Pack 1 (KB973354)
   Windows Media Player 9 (KB973540)
   DHTML Editing Component ActiveX Control (KB973869)

   Windows XP:
   Microsoft Outlook Express 6 (KB973354)
   Windows Media Player 9, Windows Media Player 10, and Windows Media
     Player 11 (KB973540)
   Windows ATL Component (KB973507)
   DHTML Editing Component ActiveX Control (KB973869)
   Microsoft MSWebDVD ActiveX Control (KB973815)

   Windows Server 2003:
   Microsoft Outlook Express 6 (KB973354)
   Windows Media Player 10 (KB973540)
   Windows ATL Component (KB973507)
   DHTML Editing Component ActiveX Control (KB973869)
   Microsoft MSWebDVD ActiveX Control (KB973815)

   Windows Vista:
   Windows Media Player 11 (KB973540)
   Windows ATL Component (KB973507)

   Windows Server 2008:
   Windows Media Player 11 (KB973540)
   Windows ATL Component (KB973507)

Vulnerability Information

Microsoft Video ActiveX Control Vulnerability - CVE-2008-0015

   A remote code execution vulnerability exists in the Microsoft Active
   Template Library (ATL) due to the function CComVariant::ReadFromStream
   used in the ATL header. This function does not properly restrict
   untrusted data read from a stream. This issue leads to reading data
   directly onto the stack instead of reading it into the area of memory
   allocated for an array, which could allow a remote, unauthenticated
   user to perform remote code execution on an affected system. An
   attacker could exploit the vulnerability by constructing a specially
   crafted Web page. When a user views the Web page, the vulnerability
   could allow remote code execution.

ATL Header Memcopy Vulnerability - CVE-2008-0020

   A remote code execution vulnerability exists in the Microsoft Active
   Template Library (ATL) due to an error in the Load method of the
   IPersistStreamInit interface. The Load method could allow calls to
   memcopy with untrusted data, which could allow a remote,
   unauthenticated user to perform remote code execution on an affected
   system. An attacker could exploit the vulnerability by constructing a
   specially crafted Web page. When a user views the Web page, the
   vulnerability could allow remote code execution.

ATL Uninitialized Object Vulnerability - CVE-2009-0901

   A remote code execution vulnerability exists in the Microsoft Active
   Template Library (ATL) due to a bug in the ATL headers that could
   allow an attacker to force VariantClear to be called on a VARIANT that
   has not been correctly initialized. Because of this bug, the attacker
   can control what happens when VariantClear is called during handling
   of an error by supplying a corrupt stream. This vulnerability only
   directly affects systems with components and controls installed that
   were built using Visual Studio ATL. This vulnerability could allow a
   remote, unauthenticated user to perform remote code execution on an
   affected system. An attacker could exploit the vulnerability by
   constructing a specially crafted Web page. When a user views the Web
   page, the vulnerability could allow remote code execution.

ATL COM Initialization Vulnerability - CVE-2009-2493

   A remote code execution vulnerability exists in the Microsoft Active
   Template Library (ATL) due to bugs in the ATL headers that handle
   instantiation of an object from data streams. This vulnerability only
   directly affects systems with components and controls installed that
   were built using Visual Studio ATL. For components and controls built
   using ATL, unsafe usage of OleLoadFromStream could allow the
   instantiation of arbitrary objects which can bypass related security
   policy, such as kill bits within Internet Explorer. This vulnerability
   could allow a remote, unauthenticated user to perform remote code
   execution on an affected system. An attacker could exploit the
   vulnerability by constructing a specially crafted Web page. When a
   user views the Web page, the vulnerability could allow remote code
   execution.

ATL Object Type Mismatch Vulnerability - CVE-2009-2494

   A remote code execution vulnerability exists in the Microsoft Active
   Template Library (ATL) due to a bug in the ATL header that could allow
   reading a variant from a stream and leaving the variant type read with
   an invalid variant. When deleting the variant, it is possible to free
   unintended areas in memory that could be controlled by an attacker.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKghsTNVH5XJJInbgRAvINAJ49BD2C+sEb6yWVMgrVJXFX05fybQCeIjRn
5m+KtERx8xG9XF6OgSzv55s=
=Y/rA
-----END PGP SIGNATURE-----