Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Development

    Microsoft Squashes 7 Critical Bugs in Excel, .Net, Active Directory

    Written by

    Lisa Vaas
    Published July 10, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsoft has issued patches for seven critical flaws in Excel, Windows Active Directory and the .Net Framework.

      Those seven vulnerabilities cover the worst-hit applications. The July 10 Patch Tuesday saw a total of 11 vulnerabilities fixed in six security bulletins.

      Analysts were warning about the critical .Net flaw ahead of the bulletin release, given the frameworks core role in supplying code to a vast array of Windows applications, such as in pre-coded user interfaces, data access components, database connectivity, cryptography, Web application development, algorithms and network communications modules.

      Indeed, Web application security experts said, a critical .Net bug has the potential to affect pretty much all applications on all of Microsofts actively supported platforms.

      As it turns out, the security patch for the critical .Net vulnerability resolves three privately reported vulnerabilities. Two of those flaws could allow remote code execution on client systems with .Net Framework installed, and one could allow information disclosure on Web servers running ASP.NET.

      Dave Marcus, security research and communications manager at McAfee Avert Labs, said that the .Net bugs are easily exploitable, making them high-priority patches. “The vulnerabilities in the .Net Framework could be exploited through malicious Web sites,” he said in a statement. “Simply visiting such a Web site would result in malicious code being installed on the victims computer.”

      /zimages/1/28571.gifClick here to read why the need to fix CPU bugs and vulnerabilities is becoming an important issue.

      The .Net vulnerabilities include a PE (Portable Executable) Loader flaw (CVE-2007-0041). The PE format is a format for executables, object code and DLLS thats used in 32-bit and 64-bit Windows operating systems. Its called “portable” because the format can be ported across all 32-bit and 64-bit Windows operating systems.

      The format is a data structure that serves to encapsulate information needed by a Windows operating system loader to managed wrapped executable code, including dynamic library references for linking, API export and import tables, and more. PE is also the standard executable format in EFI (Extensible Firmware Interface) environments.

      A remote attacker who manages to exploit the vulnerability in .Nets PE Loader could change the system with the permissions of a logged-on user. If a user is logged in with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

      One mitigating factor for the .Net PE Loader flaw is that user interaction is required; a Web-based attacker has to host a site with a malicious page and lure a victim onto it in order to exploit the vulnerability.

      Another mitigating factor can be limited user rights. Users running with restricted rights give attackers less ability to tamper with a system. Also, by default, supported versions of Outlook and Outlook Express open HTML e-mail in a restricted sites zone. That zone prevents Active Scripting and ActiveX controls from being used when reading HTML e-mail. But if a user clicks on a link within the e-mail, all bets are off; theyre still potentially vulnerable to a Web-based attack. Internet Explorer on Windows Server 2003 also runs in a restricted mode known as Enhanced Security Configuration. That mode sets the security level for the Internet zone to High.

      The second .Net flaw is a null byte termination vulnerability (CVE-2007-0042) that can lead to information disclosure. A successful attacker could use the flaw to bypass the security features of an ASP.NET Web site, after which he or she could download the contents of any Web page. A mitigating factor in this case is that Web applications developed with ASP.NET that restrict all untrusted input variables, including null bytes, to a range of expected values or characters would not be affected.

      Microsoft says that a workaround for this bug would be for developers to compare Internet accessible values such as query strings, cookies, or form variables against a list of allowed values and reject any other values that fall outside of this range.

      Next Page: Patching Excel.

      Excel Flaws

      The third critical vulnerability in .Net lies within the frameworks JIT (Just In Time) Compiler (CVE-2007-0043). This too is a remote code execution flaw wherein a successful attacker can take over a target system and then install programs; view, change or delete data; or create new accounts with full user rights. Again, users running with reduced rights could be less impacted than those running as administrators.

      The mitigating factors for the JIT bug are the same as those for the PE Loader flaw. Microsoft has extensive workaround instructions—check the MS07-040 bulletin site to get them.

      For its part, Excels suffering from three critical vulnerabilities addressed in a second security bulletin. All three are remotely exploitable and can set vulnerable systems up for getting walloped by a Trojan horse, said McAfees Marcus.

      “Vulnerabilities in Office applications have been a favorite attack method among cybercrooks,” he said in a statement. “Trojan horse attacks often use rigged Office files that exploit vulnerabilities in the productivity applications.”

      One of Excels flaws is a remotely exploitable calculation error vulnerability (CVE-2007-1756) that could let attackers send a malformed Excel file as an e-mail attachment or host a maliciously crafted Excel file on a compromised or malicious site.

      The second and third Excel vulnerabilities, also remotely exploitable, are both Worksheet Memory Corruption flaws (CVE-2007-3029 and CVE-2007-3030). These flaws also entail malicious files being hosted on Web sites or sent via e-mail attachments. For mitigating factors and workarounds, see Microsofts Security Bulletin MS07-036.

      /zimages/1/28571.gifTo read to read why Microsoft chose not to issue a patch to fix an Internet Information Server 5.0 vulnerability, click here.

      Microsofts final critical security bulletin, MS07-039, covers a vulnerability in Windows Active Directory that could lead to system hijacking.

      Active Directory, a Microsoft implementation of LDAP directory services, is used primarily in Windows environments. Its main purpose is central authentication and authorization services for Windows-based computers. Administrators also use it to assign policies, deploy software, and apply critical updates to entire organizations. Active Directory stores information and settings relating to an organization in a central, organized, accessible database. Active Directory networks can range in size from a few hundred objects on up to millions of objects.

      “Active Directory is widely used as a directory service by businesses,” McAfees Marcus said. “One of the vulnerabilities addressed today could expose Windows 2000 users to worm-type attacks since it could be exploited over the Internet by an anonymous attacker.”

      Microsoft says that DoS (denial of service) is the likeliest outcome of this vulnerability, but remote code execution is still possible. The possibility of system takeover is threatened by a flaw in the way that Active Directory validates an LDAP request. An attacker who successfully exploited the bug could take complete control of an affected system.

      The DoS vulnerability in Active Directory is caused by the way AD validates a client-sent LDAP request. An attacker could exploit the vulnerability by sending a specially crafted LDAP request to a server running Active Directory. For mitigating factors and workarounds, check MS07-039.

      In addition to its three critical security bulletins, Microsoft also put out two important security bulletins.

      One of those important bulletins, MS07-037, concerns a vulnerability in Microsoft Office Publisher that could allow for system takeover. A successful exploit would involve a user viewing a specially crafted Office Publisher file.

      The second important security bulletin, MS07-041, involves a vulnerability in IIS (Internet Information Services) 5.1 on Windows XP Professional SP2 that could allow for system takeover. An attacker would need to send maliciously crafted URL requests to a Web page hosted by IIS.

      Finally, Microsoft put out a patch for a flaw it labeled moderate in Windows Vista Firewall. The flaw, which could allow incoming unsolicited network traffic to access a network interface, could give an attacker information about the affected host.

      For instructions on getting the updates and versions affected, check the July 2007 bulletin summary page.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×