[SECURITY-L] CAIS-Alerta: Vulnerabilidade na Automacao OLE (MS08-008)

CSIRT - UNICAMP security em unicamp.br
Qua Fev 13 10:23:14 -02 2008


----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br> -----

From: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Subject:  CAIS-Alerta: Vulnerabilidade na Automacao OLE (MS08-008)
To: pop-seg em cais.rnp.br, rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br
Date: Tue, 12 Feb 2008 18:03:41 -0200 (BRST)

-----BEGIN PGP SIGNED MESSAGE-----


Prezados,

O CAIS esta' repassando o alerta da Microsoft, intitulado "MS08-008 - 
Vulnerability in OLE Automation Could Allow Remote Code Execution 
(947890)", que trata de uma vulnerabilidade encontrada no protocolo de 
automacao OLE.

O protocolo de automacao OLE e' uma biblioteca de funcoes que permite a 
comunicacao entre programas. Existe uma vulnerabilidade no gerenciamento 
de memoria de scripts executados, que permite a um atacante remoto a 
execucao de codigo malicioso.

Caso o atacante consiga executar o codigo, podera' obter acesso ao sistema 
com as permissoes do usuario conectado. Se o usuario conectado no sistema 
vulneravel tiver permissoes de administrador, o atacante podera' obter o 
controle total sobre o sistema.

Para explorar essa vulnerabilidade, o atacante precisa induzir a vitima a 
acessar uma pagina web especialmente construida.


Sistemas afetados:

. Microsoft Windows 2000 Service Pack 4
. Windows XP Service Pack 2
. Windows XP Professional x64 Edition
. Windows XP Professional x64 Edition Service Pack 2
. Windows Server 2003 Service Pack 1
. Windows Server 2003 Service Pack 2
. Windows Server 2003 x64 Edition
. Windows Server 2003 x64 Edition Service Pack 2
. Windows Server 2003 com SP1 para sistemas baseados em Itanium
. Windows Server 2003 com SP2 para sistemas baseados em Itanium
. Windows Vista
. Windows Vista x64 Edition
. Microsoft Office 2004 para Mac
. Microsoft Visual Basic 6.0 Service Pack 6


Correcoes disponiveis:

Recomenda-se fazer a atualizacao para as versoes disponiveis em:

. Microsoft Windows 2000 Service Pack 4
  http://www.microsoft.com/downloads/details.aspx?FamilyId=93b3d0a3-2091-405e-8dd4-10f20dc2be7f

. Windows XP Service Pack 2
  http://www.microsoft.com/downloads/details.aspx?FamilyId=5c331a3a-93e0-42e4-9cd1-4e32ebdda38d

. Windows XP Professional x64 Edition
  http://www.microsoft.com/downloads/details.aspx?FamilyId=e0a15967-7184-4194-8edb-81760e440604

. Windows XP Professional x64 Edition Service Pack 2
  http://www.microsoft.com/downloads/details.aspx?FamilyId=e0a15967-7184-4194-8edb-81760e440604

. Windows Server 2003 Service Pack 1
  http://www.microsoft.com/downloads/details.aspx?FamilyId=cfa0d5c6-a9b0-4c5c-a651-898e9f900799

. Windows Server 2003 Service Pack 2
  http://www.microsoft.com/downloads/details.aspx?FamilyId=cfa0d5c6-a9b0-4c5c-a651-898e9f900799

. Windows Server 2003 x64 Edition
  http://www.microsoft.com/downloads/details.aspx?FamilyId=a08e87dc-993b-493b-8af3-be6e98643aeb

. Windows Server 2003 x64 Edition Service Pack 2
  http://www.microsoft.com/downloads/details.aspx?FamilyId=a08e87dc-993b-493b-8af3-be6e98643aeb

. Windows Server 2003 com SP1 para sistemas baseados em Itanium
  http://www.microsoft.com/downloads/details.aspx?FamilyId=5a88522b-ee30-4deb-878b-598e852fd60e

. Windows Server 2003 com SP2 para sistemas baseados em Itanium
  http://www.microsoft.com/downloads/details.aspx?FamilyId=5a88522b-ee30-4deb-878b-598e852fd60e

. Windows Vista
  http://www.microsoft.com/downloads/details.aspx?FamilyID=c67ec357-0f86-4f7d-9af0-d63d8b765f44

. Windows Vista x64 Edition
  http://www.microsoft.com/downloads/details.aspx?FamilyId=9137108f-e80b-46f1-b547-82da8fb058bf

. Microsoft Office 2004 para Mac
  http://www.microsoft.com/downloads/details.aspx?FamilyId=36B00C58-192D-488C-A069-730C69F0B6B0

. Microsoft Visual Basic 6.0 Service Pack 6
  http://www.microsoft.com/downloads/details.aspx?FamilyID=C96420A9-7436-4625-9649-75F1514B0FE3


Mais informacoes:

. MS08-008 - Vulnerability in OLE Automation Could Allow Remote Code Execution (947890)
  http://www.microsoft.com/technet/security/bulletin/ms08-008.mspx

. SANS ISC Handler's Diary 2008-02-12: February Black Tuesday overview
  http://isc.incidents.org/diary.html?storyid=3973

. Microsoft Brasil Security
  http://www.microsoft.com/brasil/security

. Technet Brasil - Central de Seguranca
  http://www.technetbrasil.com.br/seguranca

. Windows Live OneCare
  http://safety.live.com/site/pt-BR/default.htm


Identificador CVE (http://cve.mitre.org): CVE-2007-0065


O CAIS recomenda que os administradores mantenham seus sistemas e 
aplicativos sempre atualizados, de acordo com as ultimas versoes e 
correcoes oferecidas pelos fabricantes.


Os Alertas do CAIS tambem sao oferecidos no formato RSS/RDF:
http://www.rnp.br/cais/alertas/rss.xml


Atenciosamente,

################################################################
#   CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS)     #
#       Rede Nacional de Ensino e Pesquisa (RNP)               #
#                                                              #
# cais em cais.rnp.br       http://www.cais.rnp.br                #
# Tel. 019-37873300      Fax. 019-37873301                     #
# Chave PGP disponivel   http://www.rnp.br/cais/cais-pgp.key   #
################################################################
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iQCVAwUBR7H7oukli63F4U8VAQE5AgP8DLL0UPm2mi7ocDkabsP2OeDqnitgCRuD
Zq8npNShUwYimo8zcgC3c7foXuMyExTu6k1f4i2US54YjWHKqcCN455cfNvBQYg5
6BLuNK6l3okg5kkf4yd8ejrjJkXQN3oolCNWIQZIzK0HBgTNRVMVDUT1qRLlC1ju
dF3DnIkHifQ=
=UXEs
-----END PGP SIGNATURE-----


----- End forwarded message -----



Mais detalhes sobre a lista de discussão SECURITY-L