Alert GCSA-10078 - MS10-042 Vulnerabilita' in Windows Help e Support
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-10078
Data : 14 luglio 2010
Titolo : MS10-042 Vulnerabilita' in Windows Help e Support Center (2229593)
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato un aggiornamento per risolvere
una vulnerabilita' presente nelle funzionalita'
Windows Help e Support Center.
La vulnerabilita' potrebbe consentire l'esecuzione di codice
arbitrario da remoto, se l'utente visualizza una pagina web
artefatta o clicca un link malevolo in una email.
In base ad alcuni report questa vulnerabilita'
e' attualmente in corso di sfruttamento.
Questo security update risolve anche la vulnerabilita'
precedentemente descritta nel Microsoft Security Advisory 2219475.
:: Software interessato
Windows XP SP2
Windows XP SP3
Windows XP Pro x64 Edition SP2
Windows Server 2003 SP2
Windows Server 2003 x64 Edition SP2
Windows Server 2003 con SP2 per sistemi Itanium
:: Impatto
Esecuzione remota di codice arbitrario
Conquista del controllo sul sistema
Denial of service
:: Soluzioni
Installare manualmente la patch elencata nel bollettino Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Microsoft Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms10-042.mspx
Microsoft Knowledge Base
http://support.microsoft.com/kb/2229593
Microsoft Security Research & Defense
http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx
http://blogs.technet.com/b/srd/archive/2010/07/13/ms10-042-vulnerability-in-help-and-support-center.aspx
Microsoft Malware Protection Center
http://blogs.technet.com/b/mmpc/archive/2010/07/13/update-on-the-windows-help-and-support-center-vulnerability-cve-2010-1885.aspx
Microsoft Security Advisory 2219475
http://www.microsoft.com/technet/security/advisory/2219475.mspx
Microsoft Update e Aggiornamenti Automatici
http://go.microsoft.com/fwlink/?LinkID=40747
https://www.update.microsoft.com/microsoftupdate/v6/
http://support.microsoft.com/kb/306525/
Mitre's CVE ID
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1885
ISC SANS
http://isc.sans.edu/diary.html?storyid=9166
Securityfocus Bugtraq ID
http://www.securityfocus.com/bid/40725
Neohapsis
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html
-----BEGIN PGP SIGNATURE-----
iQCVAwUBTD20a/OB+SpikaiRAQIQmAQAleRDzB8Apat0OwivfgYUS+7+gUNw2kC2
99po5M7Q1n/4jEBs/YnCG6zZMDBPzohIM4tnFh1MVebhYAW2GTdWKEPkBZWjy0s1
11WmlOXdxr/Zr2Qly6mzW0Wzn3+WO/KiNEUn0c8fj1HGsUzInTafe/qfH6WMF98N
tlRiUiQKvs0=
=x5By
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID : GCSA-10078
Data : 14 luglio 2010
Titolo : MS10-042 Vulnerabilita' in Windows Help e Support Center (2229593)
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato un aggiornamento per risolvere
una vulnerabilita' presente nelle funzionalita'
Windows Help e Support Center.
La vulnerabilita' potrebbe consentire l'esecuzione di codice
arbitrario da remoto, se l'utente visualizza una pagina web
artefatta o clicca un link malevolo in una email.
In base ad alcuni report questa vulnerabilita'
e' attualmente in corso di sfruttamento.
Questo security update risolve anche la vulnerabilita'
precedentemente descritta nel Microsoft Security Advisory 2219475.
:: Software interessato
Windows XP SP2
Windows XP SP3
Windows XP Pro x64 Edition SP2
Windows Server 2003 SP2
Windows Server 2003 x64 Edition SP2
Windows Server 2003 con SP2 per sistemi Itanium
:: Impatto
Esecuzione remota di codice arbitrario
Conquista del controllo sul sistema
Denial of service
:: Soluzioni
Installare manualmente la patch elencata nel bollettino Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Microsoft Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms10-042.mspx
Microsoft Knowledge Base
http://support.microsoft.com/kb/2229593
Microsoft Security Research & Defense
http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx
http://blogs.technet.com/b/srd/archive/2010/07/13/ms10-042-vulnerability-in-help-and-support-center.aspx
Microsoft Malware Protection Center
http://blogs.technet.com/b/mmpc/archive/2010/07/13/update-on-the-windows-help-and-support-center-vulnerability-cve-2010-1885.aspx
Microsoft Security Advisory 2219475
http://www.microsoft.com/technet/security/advisory/2219475.mspx
Microsoft Update e Aggiornamenti Automatici
http://go.microsoft.com/fwlink/?LinkID=40747
https://www.update.microsoft.com/microsoftupdate/v6/
http://support.microsoft.com/kb/306525/
Mitre's CVE ID
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1885
ISC SANS
http://isc.sans.edu/diary.html?storyid=9166
Securityfocus Bugtraq ID
http://www.securityfocus.com/bid/40725
Neohapsis
http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0197.html
-----BEGIN PGP SIGNATURE-----
iQCVAwUBTD20a/OB+SpikaiRAQIQmAQAleRDzB8Apat0OwivfgYUS+7+gUNw2kC2
99po5M7Q1n/4jEBs/YnCG6zZMDBPzohIM4tnFh1MVebhYAW2GTdWKEPkBZWjy0s1
11WmlOXdxr/Zr2Qly6mzW0Wzn3+WO/KiNEUn0c8fj1HGsUzInTafe/qfH6WMF98N
tlRiUiQKvs0=
=x5By
-----END PGP SIGNATURE-----