Public Safety and Emergency Preparedness Canada - Sécurité publique et Protection civile Canada
Skip all menus (access key: 2) Skip first menu (access key: 1)
Français Contact Us Help Search Canada Site
About us Policy Research Programs Newsroom
Public Safety and Emergency Preparedness Canada

INFORMATION FOR...
Citizens
Communities
Governments
Business
First responders
Educators
ALTERNATE PATHS...
A-Z index
Site map
Organization
OF INTEREST...
SafeCanada.ca
Tackling Crime
EP Week
Proactive disclosure


Printable versionPrintable version
Send this pageSend this page

Home Programs Emergency management Response CCIRC Analytical releases2 AV06-002: Microsoft Security Bulletin MS06-002, MS06-003

Microsoft Security Bulletin MS06-002, MS06-003

Number: AV06-002
Date: 10 January 2006

Microsoft Security Bulletin MS06-002, MS06-003

Purpose

The purpose of this advisory is to bring attention to the following vulnerabilities (2 Critical) in some Microsoft products.

MS06-002: Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution

Assessment

A remote code execution vulnerability exists in Windows due to the way it handles malformed embedded Web fonts. An attacker could exploit the vulnerability by constructing a malicious embedded Web font that could potentially allow remote code execution if a user visited a malicious web site or viewed a specially crafted e-mail message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

Impact of Vulnerability: Remote Code Execution

Microsoft's Maximum Severity Rating: Critical

Affected Software:
- Microsoft Windows 2000 Service Pack 4
- Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
- Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
- Microsoft Windows Server 2003 x64 Edition
- Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME)

Suggested action

PSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/Bulletin/MS06-002.mspx

MS06-003: Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution

Assessment

A remote code execution vulnerability exists in Microsoft Outlook and Microsoft Exchange Server due to the way it decodes the Transport Neutral Encapsulation Format (TNEF) MIME attachment.

An attacker could exploit the vulnerability by constructing a specially crafted TNEF message that could potentially allow remote code execution when a user opens or previews a malicious e-mail message or when the Microsoft Exchange Server Information Store processes the specially crafted message. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

Impact of Vulnerability: Remote Code Execution

Microsoft's Maximum Severity Rating: Critical

Affected Software:
Microsoft Office 2000 Service Pack 3
Microsoft Office 2000 Software:
- Microsoft Outlook 2000
- Microsoft Office 2000 MultiLanguage Packs
- Microsoft Outlook 2000 English MultiLanguage Packs

Microsoft Office XP Service Pack 3
Microsoft Office XP Software:
- Microsoft Outlook 2002
- Microsoft Office XP Multilingual User Interface Packs
Note Multilingual User Interface Packs are for non- English packages.

Microsoft Office 2003 Service Pack 1 and Service Pack 2 Microsoft Office 2003 Software:
- Microsoft Outlook 2003
- Microsoft Office 2003 Multilingual User Interface Packs
- Microsoft Office 2003 Language Interface Pack
Note Multilingual User Interface Packs are for non- English packages

Microsoft Exchange Server
- Microsoft Exchange Server 5.0 Service Pack 2
- Microsoft Exchange Server 5.5 Service Pack 4
- Microsoft Exchange 2000 Server Pack 3 with the Exchange 2000 Post-Service Pack 3 Update Rollup of August 2004

Suggested action

PSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/Bulletin/MS06-003.mspx

Note to Readers

Canadian Cyber Incident Response Centre (CCIRC) collects information related to cyber threats to, and incidents involving, Canadian critical infrastructure. This allows us to monitor and analyze threats and to issue alerts, advisories and other information products. To report threats or incidents, please contact the Government Operations Centre (GOC) at (613) 991-7000 or goc-cog@psepc-sppcc.gc.ca by e-mail.

Unauthorized use of computer systems and mischief in relation to data are serious Criminal Code offences in Canada. Any suspected criminal activity should be reported to local law enforcement organizations. The Royal Canadian Mounted Police (RCMP) National Operations Centre (N.O.C.) provides a 24/7 service to receive such reports or to redirect callers to local law enforcement organizations. The N.O.C. can be reached at (613) 993-4460. National security concerns should be reported to the Canadian Security Intelligence Service (CSIS) at (613) 993-9620.

For urgent matters or to report any incidents, please contact the Government Operations Centre at:

Phone: (613) 991-7000
Fax: (613) 996-0995
Secure Fax: (613) 991-7094
Email: goc-cog@psepc-sppcc.gc.ca

For general information on critical infrastructure protection and emergency preparedness, please contact PSEPC's Public Affairs division at:

Telephone: (613) 944-4875 or 1-800-830-3118
Fax: (613) 998-9589
E-mail: communications@psepc-sppcc.gc.ca
Web: www.psepc.gc.ca

Top of Page
Last updated: 2006-01-16 Top of Page Important notices