Bugtraq mailing list archives
Microsoft Security Bulletin (MS99-037)
From: aleph1 () UNDERGROUND ORG (Aleph One)
Date: Sat, 25 Sep 1999 13:33:54 -0700
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** Microsoft Security Bulletin (MS99-037) -------------------------------------- Patch Available for "ImportExportFavorites" Vulnerability Originally Posted: September 10, 1999 Re-released: September 24, 1999 Summary ======= On September 10, 1999, Microsoft released the original version of this bulletin, in order to provide a workaround for a security vulnerability in Microsoft(c) Internet Explorer 5 that could allow a malicious web site operator to take inappropriate action on the computer of a person who visited the site. Microsoft has completed a patch that completely eliminates the vulnerability, and has re-released this bulletin in order to advise customers of its availability. In addition to eliminating the "ImportExportFavorites" vulnerability, the patch also eliminates a security vulnerability posed by several ActiveX controls that ship as part of Internet Explorer 4.01 and 5. Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bulletins/MS99-037faq.asp Issue ===== IE 5 includes a feature that allows users to export a list of their favorite web sites to a file, or to import a file containing a list of favorite sites. The method that is used to perform this function, ImportExportFavorites(), should only allow particular types of files to be written, and only to specific locations on the drive. However, it is possible for a web site to invoke this method, bypass this restriction and write files that could be used to execute system commands. The net result is that a malicious web site operator potentially could take any action on the computer that the user would be capable of taking. This vulnerability would chiefly affect workstations that are connected to the Internet. The patch restores correct operation to the ImportExportFavorites() method. In addition, the patch addresses security problems posed by several ActiveX controls. The specific controls and the actions taken are discussed in the FAQ. Affected Software Versions ========================== - Microsoft Internet Explorer 4.01 and 5 Patch Availability ================== - Internet Explorer 4.01 for Intel: ftp://ftp.microsoft.com/peropsys/ie/ie-public/fixes/usa/ IE401/ImportExportFavorites-fix/x86/q241361.exe - Internet Explorer 4.01 for Alpha: ftp://ftp.microsoft.com/peropsys/ie/ie-public/fixes/usa/ IE401/ImportExportFavorites-fix/Alpha/q241361.exe - Internet Explorer 5 for Intel: ftp://ftp.microsoft.com/peropsys/ie/ie-public/fixes/usa/ IE50/ImportExportFavorites-fix/x86/q241361.exe - Internet Explorer 5 for Alpha: ftp://ftp.microsoft.com/peropsys/ie/ie-public/fixes/usa/ IE50/ImportExportFavorites-fix/Alpha/q241361.exe NOTE: Line breaks have been inserted into the above URLs for readability. NOTE: The patch also will be available shortly via WindowsUpdate. When this happens, we will amend this bulletin to provide specific link information. More Information ================ Please see the following references for more information related to this issue. - Microsoft Security Bulletin MS99-037: Frequently Asked Questions, http://www.microsoft.com/security/bulletins/MS99-037faq.asp. - Microsoft Knowledge Base (KB) article Q241361, Update available to disable ActiveX controls and the ImportExport Security Issues, http://support.microsoft.com/support/kb/articles/q241/3/61.asp. (Note: It may take 24 hours from the posting of this bulletin for the KB article to appear) - Microsoft Security Advisor web site, http://www.microsoft.com/security/default.asp. Obtaining Support on this Issue =============================== Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/support/contact/default.asp. Acknowledgments =============== Microsoft acknowledges Georgi Guninski for bringing the ImportExportFavorites issue to our attention. Microsoft acknowledges Shane Hird of Australia and Richard Smith of Phar Lap Software (http://www.pharlap.com/) for reporting the unsafe ActiveX controls to us. Revisions ========= - September 10, 1999: Bulletin Created. - September 24, 1999: Bulletin revised to provide patch information and discuss ActiveX controls. ---------------------------------------------------------------------------- ---- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. (c) 1999 Microsoft Corporation. All rights reserved. Terms of Use. ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST () ANNOUNCE MICROSOFT COM The subject line and message body are not used in processing the request, and can be anything you like. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/security/services/bulletin.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.
Current thread:
- Re: IE5 allows executing programs, (continued)
- Re: IE5 allows executing programs Haxor, Wikit (Sep 16)
- Two SuSE 6.2 local root exploits Brock Tellier (Sep 16)
- SuSE 6.2 /usr/bin/sccw read any file Brock Tellier (Sep 16)
- Fw: CERT Advisory CA-99.12 - Buffer Overflow in amd morex (Sep 16)
- More fun with WWWBoard David Weins (Sep 17)
- Re: More fun with WWWBoard Chris Ridd (Sep 20)
- Re: More fun with WWWBoard Mark Jeftovic (Sep 21)
- Re: More fun with WWWBoard Patrick Oonk (Sep 22)
- Re: More fun with WWWBoard Speed (Sep 24)
- Re: More fun with WWWBoard Mark Jeftovic (Sep 26)
- Microsoft Security Bulletin (MS99-037) Aleph One (Sep 25)
- Internet Explorer 5.0 & AOL Instant Messenger 3.x (latest version) Bug forcing Win98 to crash remotely webmaster (Sep 22)
- Re: Internet Explorer 5.0 & AOL Instant Messenger 3.x (latest version) Bug forcing Win98 to crash remotely Peter Haglund (Sep 24)
- Re: More fun with WWWBoard Vladimir Dubrovin (Sep 21)
- SCO 5.0.x scosession local exploit Brock Tellier (Sep 22)
- Re: More fun with WWWBoard Ben Laurie (Sep 23)
- SuSE 6.2 sccw overflow exploit Brock Tellier (Sep 23)
- Security Bulletins Digest Aleph One (Sep 20)
- Microsoft Security Bulletin (MS99-038) Aleph One (Sep 20)
- FreeBSD Security Advisory: FreeBSD-SA-99:06.amd Aleph One (Sep 20)
- socket buffer DoS/administrative limits (fwd) Brian F. Feldman (Sep 17)