Graphical Version |
Home Programs Emergency management Response CCIRC Analytical releases2 AV06-043: Microsoft Security Bulletin MS06-056 to MS06-065 Microsoft Security Bulletin MS06-056 to MS06-065Update to Advisory AV06-043 This update is being distributed to provide notification that on 19 October 2006 Microsoft updated Security Bulletin MS06-061: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (924191). Microsoft issued a targeted re-release of the MS06-061 update for Windows 2000. While the original version of this security update for Windows 2000 did protect against all vulnerabilities discussed in the bulletin, it did not correctly set the kill bit for Microsoft XML Parser 2.6. The new version of MS06-061 for Windows 2000 protects against all vulnerabilities discussed in the bulletin and correctly sets the kill bit for Microsoft XML Parser 2.6. For more information, please refer to: http://support.microsoft.com/kb/924191 http://www.microsoft.com/technet/security/bulletin/ms06-061.mspx Number: AV06-043 PurposeThe purpose of this advisory is to bring attention to the following vulnerabilities (6 Critical, 1 Important, 2 Moderate and 1 Low) in some Microsoft products. MS06-056: Vulnerability in ASP.NET 2.0 Could Allow Information Disclosure (922770) Assessment.NET Framework 2.0 Cross-Site Scripting Vulnerability - CVE-2006-3436: A cross-site scripting vulnerability exists in a server running a vulnerable version of the .Net Framework 2.0 that could inject a client side script in the user's browser. The script could spoof content, disclose information, or take any action that the user could take on the affected web site. Attempts to exploit this vulnerability require user interaction. Impact of Vulnerability: Information Disclosure Maximum Severity Rating: Moderate Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-056.mspx
MS06-057: Vulnerability in Windows Explorer Could Allow Remote Execution (923191) AssessmentWindows Shell Remote Code Execution Vulnerability - CVE-2006-3730: A remote code execution vulnerability exists in Windows Shell due to improper validation of input parameters when invoked by the WebViewFolderIcon ActiveX control (Web View). This vulnerability could potentially allow remote code execution if a user visited a specially crafted Web site or viewed a specially crafted e-mail message. An attacker could exploit the vulnerability by hosting a web site that contained a web page that was used to exploit this vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-057.mspx MS06-058: Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (924163) AssessmentVarious remote code execution vulnerabilities exist in PowerPoint
Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-058.mspx MS06-059: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (924164) AssessmentVarious remote code execution vulnerabilities exist in PowerPoint
Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-059.mspx MS06-060: Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (924554) AssessmentVarious remote code execution vulnerabilities exist in Microsoft Word:
Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-060.mspx MS06-061: Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (924191) AssessmentSuccessful exploitation of these vulnerabilities could lead to information disclose (such as credentials) remote code execution. User interaction is required.
Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-061.mspx MS06-062: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (922581) AssessmentVarious remote code execution vulnerabilities exist in Microsoft Office
Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Critical Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-062.mspx
MS06-063: Vulnerability in Server Service Could Allow Denial of Service (923414) AssessmentThe server service is vulnerable to a denial of service and remote code execution requiring credentials
Impact of Vulnerability: Denial of service Maximum Severity Rating: Important Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-063.mspx MS06-064: Vulnerabilities in TCP/IP IPv6 Could Allow Denial of Service (922819) AssessmentVarious IPv6 protocol implementations in the Windows operating system are vulnerable to denial of service
Impact of Vulnerability: Denial of service Maximum Severity Rating: Low Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-064.mspx MS06-065: Vulnerability in Windows Object Packager Could Allow Remote Execution (924496) AssessmentObject Packager Dialogue Spoofing Vulnerability - CVE-2006-4692: A remote code execution vulnerability exists in Windows Object Packager because of the way that file extensions are handled. User interaction is required. Impact of Vulnerability: Remote Code Execution Maximum Severity Rating: Moderate Affected Software and components:
Suggested actionPSEPC recommends that administrators test and install the update at the earliest opportunity. http://www.microsoft.com/technet/security/bulletin/ms06-065.mspx Note to readersCanadian Cyber Incident Response Centre (CCIRC) collects information related to cyber threats to, and incidents involving, Canadian critical infrastructure. This allows us to monitor and analyze threats and to issue alerts, advisories and other information products. To report threats or incidents, please contact the Government Operations Centre (GOC) at (613) 991-7000 or goc-cog@psepc.gc.ca by e-mail. Unauthorized use of computer systems and mischief in relation to data are serious Criminal Code offences in Canada . Any suspected criminal activity should be reported to local law enforcement organizations. The Royal Canadian Mounted Police (RCMP) National Operations Centre (N.O.C.) provides a 24/7 service to receive such reports or to redirect callers to local law enforcement organizations. The N.O.C. can be reached at (613) 993-4460. National security concerns should be reported to the Canadian Security Intelligence Service (CSIS) at (613) 993-9620. For urgent matters or to report any incidents, please contact the Government Operations Centre at: Phone: (613) 991-7000 For general information on critical infrastructure protection and emergency preparedness, please contact PSEPC's Public Affairs division at: Telephone: (613) 944-4875 or 1-800-830-3118 |