Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.1176 Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution (973908) 12 August 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Outlook Express 5.5 and 6 Windows Media Player 9, 10 and 11 DHTML Editing Component ActiveX Control Microsoft MSWebDVD ActiveX Control Windows ATL Component Publisher: Microsoft Operating System: Windows 2000 Windows XP Windows Server 2003 Windows Vista Windows Server 2008 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Mitigation CVE Names: CVE-2009-2494 CVE-2009-2493 CVE-2009-0901 CVE-2008-0020 CVE-2008-0015 Original Bulletin: http://www.microsoft.com/technet/security/bulletin/ms09-037.mspx - --------------------------BEGIN INCLUDED TEXT-------------------- Microsoft Security Bulletin MS09-037 - Critical Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code Execution (973908) Published: August 11, 2009 Version: 1.0 General Information Executive Summary This security update resolves several privately reported vulnerabilities in Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control hosted on a malicious website. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for all supported editions of Microsoft Windows 2000 Service Pack 4, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. For more information on the software affected by this update, see the subsection, Affected and Non-Affected Software, in this section. For more information on the impact of, and workarounds and mitigations for controls and components that may be vulnerable to these issues, please see [22]Microsoft Security Advisory (973882). The security update addresses the vulnerabilities by modifying the ATL headers so that components and controls built using the headers can safely initialize from a data stream, and by providing updated versions of Windows components and controls built using corrected ATL headers. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871. For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service. Known Issues. None Affected Software Microsoft Windows 2000: Microsoft Outlook Express 5.5 Service Pack 2 (KB973354) Microsoft Outlook Express 6 Service Pack 1 (KB973354) Windows Media Player 9 (KB973540) DHTML Editing Component ActiveX Control (KB973869) Windows XP: Microsoft Outlook Express 6 (KB973354) Windows Media Player 9, Windows Media Player 10, and Windows Media Player 11 (KB973540) Windows ATL Component (KB973507) DHTML Editing Component ActiveX Control (KB973869) Microsoft MSWebDVD ActiveX Control (KB973815) Windows Server 2003: Microsoft Outlook Express 6 (KB973354) Windows Media Player 10 (KB973540) Windows ATL Component (KB973507) DHTML Editing Component ActiveX Control (KB973869) Microsoft MSWebDVD ActiveX Control (KB973815) Windows Vista: Windows Media Player 11 (KB973540) Windows ATL Component (KB973507) Windows Server 2008: Windows Media Player 11 (KB973540) Windows ATL Component (KB973507) Vulnerability Information Microsoft Video ActiveX Control Vulnerability - CVE-2008-0015 A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to the function CComVariant::ReadFromStream used in the ATL header. This function does not properly restrict untrusted data read from a stream. This issue leads to reading data directly onto the stack instead of reading it into the area of memory allocated for an array, which could allow a remote, unauthenticated user to perform remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. ATL Header Memcopy Vulnerability - CVE-2008-0020 A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to an error in the Load method of the IPersistStreamInit interface. The Load method could allow calls to memcopy with untrusted data, which could allow a remote, unauthenticated user to perform remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. ATL Uninitialized Object Vulnerability - CVE-2009-0901 A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to a bug in the ATL headers that could allow an attacker to force VariantClear to be called on a VARIANT that has not been correctly initialized. Because of this bug, the attacker can control what happens when VariantClear is called during handling of an error by supplying a corrupt stream. This vulnerability only directly affects systems with components and controls installed that were built using Visual Studio ATL. This vulnerability could allow a remote, unauthenticated user to perform remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. ATL COM Initialization Vulnerability - CVE-2009-2493 A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to bugs in the ATL headers that handle instantiation of an object from data streams. This vulnerability only directly affects systems with components and controls installed that were built using Visual Studio ATL. For components and controls built using ATL, unsafe usage of OleLoadFromStream could allow the instantiation of arbitrary objects which can bypass related security policy, such as kill bits within Internet Explorer. This vulnerability could allow a remote, unauthenticated user to perform remote code execution on an affected system. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. ATL Object Type Mismatch Vulnerability - CVE-2009-2494 A remote code execution vulnerability exists in the Microsoft Active Template Library (ATL) due to a bug in the ATL header that could allow reading a variant from a stream and leaving the variant type read with an invalid variant. When deleting the variant, it is possible to free unintended areas in memory that could be controlled by an attacker. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKghsTNVH5XJJInbgRAvINAJ49BD2C+sEb6yWVMgrVJXFX05fybQCeIjRn 5m+KtERx8xG9XF6OgSzv55s= =Y/rA -----END PGP SIGNATURE-----