Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Microsoft - September 2004 Bulletins


  • Please log in to reply
3 replies to this topic

#1 harrywaldron

harrywaldron

    Security Reporter


  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:11:34 PM

Posted 14 September 2004 - 01:26 PM

Microsoft - September 2004 Bulletins
http://www.microsoft.com/technet/security/...n/ms04-sep.mspx


Microsoft Security Bulletin MS04-027

Vulnerability in WordPerfect Converter Could Allow Code Execution (884933)

Executive Summary: A remote code execution vulnerability exists in the WordPerfect 5.x converter that is provided as part of the affected software that could allow remote code execution on an affected system.

Maximum Severity Rating: Important

Impact of Vulnerability: Remote Code Execution

Affected Software: Office, FrontPage, Works, and Publisher. For more information, see the Affected Software and Download Locations section.




Microsoft Security Bulletin MS04-028

Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution (833987)

Executive Summary: A remote code execution vulnerability exists in the processing of JPEG image formats that could allow remote code execution on an affected system.

Maximum Severity Rating: Critical

Impact of Vulnerability: Remote Code Execution

Affected Software: Windows, Office, Developer, Internet Explorer, and others. For more information, see the Affected Software and Download Locations section for details.

Note This vulnerability might require the installation of several security updates. Review the entire column in the Affected Software and Download Locations summary table for the MS04-028 bulletin identifier to verify the updates that you have to install, based on the programs or components that you have installed on your system.

BC AdBot (Login to Remove)

 


#2 phawgg

phawgg

    Learning Daily


  • Members
  • 4,543 posts
  • OFFLINE
  •  
  • Location:Washington State, USA
  • Local time:07:34 PM

Posted 14 September 2004 - 01:29 PM

Would this by any chance mean a new Hotfixis available for Office users since the release of SP2? :thumbsup:
patiently patrolling, plenty of persisant pests n' problems ...

#3 jgweed

jgweed

  • Staff Emeritus
  • 28,473 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Chicago, Il.
  • Local time:10:34 PM

Posted 14 September 2004 - 08:05 PM

US-Cert discusses the JPEG vulnerability in the just-issued alert below:

http://www.kb.cert.org/vuls/id/297462

Regards,
John
Whereof one cannot speak, thereof one should be silent.

#4 harrywaldron

harrywaldron

    Security Reporter

  • Topic Starter

  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:11:34 PM

Posted 16 September 2004 - 08:33 AM

MS04-028 - may require more than a Windows Update

You may see a message, that more products were detected that need updating besides Windows, esp. if you have MS Offfice installed.

One complicating factor on this security update is that many folks don't update Office or other products as closely as we're used to doing with Windows. Microsoft Office, IE, Visual Studio, and other products can process JPEG files. So it's important to update these products in case a malicious JPEG in an email or a website exploits this vulnerability. This is an issue of a vulnerable DLL being used multiple times on the same PC (so Windows, Office, IE, and other products could need patching).

RECOMMENDATIONS:

1. Windows Update - It's recommend you install the latest SP for your OS

http://www.microsoft.com/windowsupdate/

2. Office Security Update - It's recommend you install the latest SP for your version of Office. Also, the Office update could require the original CD, hard drive, or network location to be authenticated.

http://www.microsoft.com/officeupdate

3. Manually patch Individual products as needed (e.g., Visual Studio Net) - You can search your C: drive for any occurrences of GDIplus.DLL (which is the vulnerable DLL)

You can eventually work these in over time, as there is no current threat I'm aware of. Still, JPEGs or graphics might be a better method of tricking folks than email?

Most of us will only need a Windows and Office update. But you might need SP updates on Office if you've not done this in the past. This one will take more work for home and corporate users to achieve complete safety. It wasn't bad for me, as I keep everything as up-to-date as possible, but the Office Update might be new to some folks.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users