CERT-In Vulnerability Note
CIVN-2005-0048
Internet Explorer Vulnerabilities
Original Issue Date:June 15, 2005
Severity Rating: HIGH
Systems Affected
Internet Explorer 5.01, 5.5, 6 on: - Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
- Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
- Microsoft Windows XP 64-Bit Edition Service Pack 1 Itanium
- Microsoft Windows XP 64-Bit Edition Version 2003 Itanium
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003
- Microsoft Windows Server 2003 Service Pack 1
- Microsoft Windows Server 2003 for Itanium-based Systems
- Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
- Microsoft Windows Server 2003 x64 Edition
- Microsoft Windows 98, Microsoft Windows 98 Second Edition SE , and Microsoft Windows Millennium Edition ME
Overview
Two vulnerabilities were identified in Microsoft Internet Explorer, which could cause execute arbitrary commands or disclose sensitive information on affected system
Description
1. PNG Image Rendering Memory Corruption Vulnerability -
(
CAN-2005-1211
)
PNG is known as Portable Network Graphics and is used as GIF. A remote code execution vulnerability exists in Internet Explorer PNG image rendering library pngfilt.dll in the way it handles uncheck buffer. An attacker could exploit this vulnerability via a malicious website or through an HTML email message having specially crafted PNG image Workarounds - Disable PNG image rendering in Internet Explorer.
- Click Start, click Run, type regsvr32 /u pngfilt.dll, and then click OK.
- Block PNG image rendering in Internet Explorer by using a Software Restriction Policy
- Read and send email in plain text format
2. XML Redirect Information Disclosure Vulnerability
(
CAN-2002-0648
)
XML Extensible Markup Language is a data format that provides a way for different applications to share data. An information disclosure vulnerability exists in Internet Explorer because of the way it handles certain requests to display XML content An attacker could exploit this vulnerability via convincing the user to visit the malicious website or through an HTML email message. After successful exploitation of this vulnerability enables an attacker to access local files or other websites information and impersonate the target user. Workarounds - Set Internet and Local intranet security zone settings to High.
- Read and send email in plain text format
- Do not visit untrusted Web sites.
After successfully exploitation of both vulnerabilities an attacker could take complete control of the affected system.
Solution
Apply the appropriate patches as mentioned in Microsoft Security Bulletin
MS05-025
Vendor Information
Microsoft Corporation
http://www.microsoft.com/technet/security/Bulletin/MS05-025.mspx
References
Vulnerability Note VU#189754
http://www.kb.cert.org/vuls/id/189754
Secunia Advisory SA15606
http://secunia.com/advisories/15606/
Security Tracker
http://securitytracker.com/alerts/2005/Jun/1014201.html
CVE Name
CAN-2005-1211
CAN-2002-0648
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|