Home > Microsoft Security > Microsoft Security Bulletin Ms02-048

Microsoft Security Bulletin Ms02-048

The vulnerabilities would allow an attacker who operated a web site and was able to lure another user into clicking a link on it to carry out a cross-site scripting attack One of these keys, known as the private key, must be kept secret. Would the attacker really need execute permissions? This permission operates in addition to the normal read/write permissions for a virtual directory, and regulates whether scripts, .ASP files and executable file types can be uploaded to a write-enabled virtual check over here

It does not ship as part of Windows XP Home Edition. Yes. An attacker who successfully exploited this vulnerability could delete any or all of the certificates on a user's system, as a way of preventing the user from being able to using Why would the attacker need both write and execute permissions? Write permissions would be required in order to provide the attacker with a way to upload the .COM file; execute permissions would https://technet.microsoft.com/en-us/library/security/ms02-048.aspx

The vulnerability could only be exploited if the attacker could plant the Trojan horse and then persuade another user to log onto the same machine. Script source access vulnerability (CAN-2002-1180): What's the scope of this vulnerability? This vulnerability could enable an attacker to load a program onto an IIS 5.0 server, if he or she had already That's not a security vulnerability. This vulnerability could enable an attacker to do either of two things: create a program that would subsequently be executed when another user logged onto the server, or corrupt system files

Script Source Access Vulnerability: The vulnerability could only be exploited if the administrator had granted all users write and execute permissions to one or more virtual directories on the server. Does that mean that the attacker wouldn't need a valid SQL Server userid and password to exploit the vulnerability? Do IIS 4.0, 5.0 and 5.1 run by default? Who could exploit this vulnerability? To exploit the vulnerability, an attacker would need to already have write permission and execute permissions to a virtual directory on the server.

The result would be that the attacker's application would gain full privileges on the server, and be able to take any desired action. A patch simply isn't practical for this case. The single most important step you can take to keep your web server secure is to use the IIS Lockdown Tool. https://technet.microsoft.com/en-us/library/security/ms02-062.aspx Instead, they require administrative action.

Scheduled jobs are frequently used by administrators to perform regularly scheduled maintenance tasks such as backups. The patch does not include any fixes for security vulnerabilities involving the Microsoft Data Access Components (MDAC) or Online Analytic Processing (OLAP) technologies for SQL Server. The former would enable an attacker to place a Trojan horse program on the system; the latter could cause it to be inadvertently executed by a subsequent user on the system. Severity Rating: Out of Process Privilege Elevation: Internet ServersIntranet ServersClient Systems IIS 4.0 ModerateModerateNone IIS 5.0 ModerateModerateNone IIS 5.1 ModerateModerateNone WebDAV Denial of Service: Internet ServersIntranet ServersClient Systems IIS 4.0 NoneNoneNone

The needed changes are discussed in the FAQ. i thought about this System administrators should ensure that they read the Readme.txt file in the patch package to ensure the patch is installed correctly. At this writing, these patches include the ones discussed in: Microsoft Security BulletinMS00-092Microsoft Security BulletinMS01-041Microsoft Security BulletinMS02-030 The process for installing the patch varies somewhat depending on the specific configuration of Because of this, it could be possible for an attacker to initiate a preliminary exchange in a way that would overrun the buffer, thereby overwriting memory within the SQL Server service

What is MSDE? Microsoft Desktop Engine (MSDE) is a database engine that's built and based on SQL Server technology, and which ships as part of several Microsoft products, including Microsoft Visual Studio http://3ecommunications.net/microsoft-security/microsoft-security-bulletin-ms03-018.html Authenticity. What causes the vulnerability? The vulnerability results because, when the SQL Server Agent creates an output file as part of a scheduled job, it does so using its own privileges rather than In addition, it eliminates three new vulnerabilities: A vulnerability that could enable an attacker to gain control over a SQL Server 2000 database.

Other systems would be at significantly less risk: Workstations that are not shared between users would be at no risk, because the attacker would require the ability to log onto the Impact of vulnerability: Four vulnerabilities, the most serious of which could enable applications on a server to gain system-level privileges. Does the vulnerability affect IIS 4.0? No. http://3ecommunications.net/microsoft-security/microsoft-security-bulletin-ms07-058.html How does IIS know which file types require only write permission, and which require both write and script source access permission?

To actually make the program to run, the attacker would also need some means of getting the user to invoke it. The script from Web Site B would be able to access cookies and any other data on the user's system that belonged to Web Site A. The vulnerability could be exploited via either a web site or email.

There is no charge for support calls associated with security patches.Security Resources: The Microsoft TechNet Security Web Site provides additional information about security in Microsoft products.Disclaimer: The information provided in the

Internet Explorer provides a feature called Security Zones, that lets you restrict what web sites can do. Because the SQL Server Agent service account is often configured with Windows administrative privileges, this allows a job to create a file anywhere on the system, regardless of the user's privileges. The vulnerability could only be exploited if the server allowed WebDAV requests to be levied on it. Any set of permissions set by a patch would almost certainly need to be adjusted in many cases, and as a result we believe the most effective way to remediate the

It's important to note, however, that regardless of the security settings, the attacker's script would always be able to access cookies and any other data on the user's system belonging to Superseded patches:This patch supersedes the one provided in Microsoft Security Bulletin MS02-043, which was itself a cumulative patch. The vulnerability does not affect IIS 4.0, as WebDAV is not supported in this version of IIS. http://3ecommunications.net/microsoft-security/microsoft-security-bulletin-ms08-031.html Built at 2014-04-18T13:49:36Z-07:00 Show: Inherited Protected Print Export (0) Print Export (0) Share IN THIS ARTICLE Is this page helpful?

Security Advisories and Bulletins Security Bulletins 2002 2002 MS02-056 MS02-056 MS02-056 MS02-072 MS02-071 MS02-070 MS02-069 MS02-068 MS02-067 MS02-066 MS02-065 MS02-064 MS02-063 MS02-062 MS02-061 MS02-060 MS02-059 MS02-058 MS02-057 MS02-056 MS02-055 MS02-054 MS02-053 If you have applied this security patch to a SQL Server 2000 or MSDE 2000 installation prior to applying the hotfix from Microsoft Knowledge Patch article 317748, you must answer "no" This is a cumulative patch that includes the functionality of all previously released patches for SQL Server 7.0, SQL Server 2000, and Microsoft Data Engine (MSDE) 1.0, Microsoft Desktop Engine (MSDE) Internet Explorer 5 or later is a prerequisite to installing the patch.

Generated Sun, 08 Jan 2017 06:04:13 GMT by s_hp81 (squid/3.5.20) The vulnerability could potentially occur anytime software on the web server blindly uses whatever inputs it's provided. In addition, the vulnerability does not affect all systems equally. With that said, though, customers using older versions of Internet Explorer may still choose to install the patch, if only to render the original version of the control inoperable.

First, it delivers a new version of the controls, that includes code changes that eliminate the vulnerabilities. The default permissions are Everyone Full Access. Q258437 is now available for public download. Run this file to install the patch. 5.

If the data could be decrypted using the public key, it must have been encrypted using the corresponding private key - and the digital certificate says who owns the private key.