-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0671
   MS17-020 - Important: Security Update for Windows DVD Maker (3208223)
                               15 March 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows DVD Maker
Publisher:         Microsoft
Operating System:  Windows Vista
                   Windows 7
Impact/Access:     Cross-site Request Forgery -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-045  

Original Bulletin: 
   https://technet.microsoft.com/en-us/library/security/MS17-020

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS17-020: Security Update for Windows DVD Maker 
(3208223)

Bulletin Number: MS17-020

Bulletin Title:	Security Update for Windows DVD Maker

Severity: 	Important

KB Article: 	3208223

Version: 	1.0

Published Date:	14/03/2017

Executive Summary

This security update resolves an information disclosure vulnerability in 
Windows DVD Maker. The vulnerability could allow an attacker to obtain 
information to further compromise a target system.

This security update is rated Important for Windows Vista and Windows 7. For 
more information, see the Affected Software section.

The security update addresses the vulnerability by correcting how Windows DVD
Maker parses files.

For more information about the vulnerabilities, see the Vulnerability 
Information section.

For more information about this update, see Microsoft Knowledge Base Article 
3208223.

Affected Software 

Windows Vista
Windows 7

Vulnerability Information

Windows DVD Maker Cross-Site Request Forgery Vulnerability CVE-2017-045

An information disclosure vulnerability exists in Windows when Windows DVD 
Maker fails to properly parse a specially crafted .msdvd file. An attacker who
successfully exploited the vulnerability could obtain information to further 
compromise a target system.

To exploit the vulnerability, an attacker would have to either log on locally
to an affected system, or convince a locally authenticated user to execute a 
specially crafted application.

The security update addresses the vulnerability by correcting how Windows DVD
Maker parses files.

Mitigating Factors

Microsoft has not identified any mitigating factor for this vulnerability.

Workarounds

Microsoft has not identified any workarounds for this vulnerability.

Security Update Deployment

For Security Update Deployment information, see the Microsoft Knowledge Base 
article referenced here in the Executive Summary.

Acknowledgments

Microsoft recognizes the efforts of those in the security community who help 
us protect customers through coordinated vulnerability disclosure. See 
Acknowledgments for more information.

Disclaimer

The information provided in the Microsoft Knowledge Base is provided "as is" 
without warranty of any kind. Microsoft disclaims all warranties, either 
express or implied, including the warranties of merchantability and fitness 
for a particular purpose. In no event shall Microsoft Corporation or its 
suppliers be liable for any damages whatsoever including direct, indirect, 
incidental, consequential, loss of business profits or special damages, even 
if Microsoft Corporation or its suppliers have been advised of the possibility
of such damages. Some states do not allow the exclusion or limitation of 
liability for consequential or incidental damages so the foregoing limitation
may not apply.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=JNND
-----END PGP SIGNATURE-----