[SECURITY-L] CAIS-Alerta: Vulnerabilidade no Microsoft Windows TCP/IP (MS08-001)
CSIRT - UNICAMP
security em unicamp.br
Sex Jan 25 09:24:40 -02 2008
----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br> -----
From: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Subject: CAIS-Alerta: Vulnerabilidade no Microsoft Windows TCP/IP (MS08-001)
To: pop-seg em cais.rnp.br, rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br
Date: Wed, 9 Jan 2008 16:46:25 -0200 (BRST)
-----BEGIN PGP SIGNED MESSAGE-----
Prezados,
O CAIS esta' repassando o alerta da Microsoft, intitulado "MS08-001 -
Critical Vulnerabilities in Windows TCP/IP Could Allow Remote Code
Execution (941644)", que trata de duas vulnerabilidades encontradas no
processamento do protocolo TCP/IP (Transmission Control Protocol/Internet
Protocol).
Estas vulnerabilidades existem devido 'a maneira como o kernel do Windows
processa estruturas TCP/IP que contem solicitacoes multicast ou ICMP.
A exploracao destas vulnerabilidades pode levar o sistema a uma condicao
de negacao de servico (DoS) ou pode ainda permitir a execucao remota de
codigo.
Sistemas afetados:
. Microsoft Windows 2000 Service Pack 4
. Windows XP Service Pack 2
. Windows XP Professional x64 Edition
. Windows XP Professional x64 Edition Service Pack 2
. Windows Server 2003 Service Pack 1
. Windows Server 2003 Service Pack 2
. Windows Server 2003 x64 Edition
. Windows Server 2003 x64 Edition Service Pack 2
. Windows Server 2003 com SP1 para sistemas baseados em Itanium
. Windows Server 2003 com SP2 para sistemas baseados em Itanium
. Windows Vista
. Windows Vista x64 Edition
Correcoes disponiveis:
Recomenda-se fazer a atualizacao para as versoes disponiveis em:
. Microsoft Windows 2000 Service Pack 4
http://www.microsoft.com/downloads/details.aspx?FamilyID=980f5457-c7b5-421c-8643-0e57429ec156
. Windows XP Service Pack 2
http://www.microsoft.com/downloads/details.aspx?FamilyID=0a766242-2342-4fa0-9b66-8953c54a2211
. Windows XP Professional x64 Edition
http://www.microsoft.com/downloads/details.aspx?FamilyID=2e8bc7d5-fe81-4ed5-9efa-360738d160ee
. Windows XP Professional x64 Edition Service Pack 2
http://www.microsoft.com/downloads/details.aspx?FamilyID=2e8bc7d5-fe81-4ed5-9efa-360738d160ee
. Windows Server 2003 Service Pack 1
http://www.microsoft.com/downloads/details.aspx?FamilyID=fda060a5-9a1e-4036-9899-13eb61fdd8be
. Windows Server 2003 Service Pack 2
http://www.microsoft.com/downloads/details.aspx?FamilyID=fda060a5-9a1e-4036-9899-13eb61fdd8be
. Windows Server 2003 x64 Edition
http://www.microsoft.com/downloads/details.aspx?FamilyID=19d993f9-06dd-4dc4-b0cc-c59e822eb8fa
. Windows Server 2003 x64 Edition Service Pack 2
http://www.microsoft.com/downloads/details.aspx?FamilyID=19d993f9-06dd-4dc4-b0cc-c59e822eb8fa
. Windows Server 2003 com SP1 para sistemas baseados em Itanium
http://www.microsoft.com/downloads/details.aspx?FamilyID=2c2264f7-ebbb-40ab-9dbf-9b4e313665a7
. Windows Server 2003 com SP2 para sistemas baseados em Itanium
http://www.microsoft.com/downloads/details.aspx?FamilyID=2c2264f7-ebbb-40ab-9dbf-9b4e313665a7
. Windows Vista
http://www.microsoft.com/downloads/details.aspx?FamilyID=23c0e03a-db66-4618-bce0-af55e5c1b067
. Windows Vista x64 Edition
http://www.microsoft.com/downloads/details.aspx?FamilyID=5f6a37b1-c604-47c9-932f-485db2eda133
Mais informacoes:
. MS08-001 - Critical Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)
http://www.microsoft.com/technet/security/bulletin/ms08-001.mspx
. SANS ISC Handler's Diary 2008-01-08: January Black Tuesday overview
http://isc.incidents.org/diary.html?storyid=3819
. Microsoft Brasil Security
http://www.microsoft.com/brasil/security
. Technet Brasil - Central de Seguranca
http://www.technetbrasil.com.br/seguranca
. Windows Live OneCare
http://safety.live.com/site/pt-BR/default.htm
Identificador CVE (http://cve.mitre.org): CVE-2007-0069, CVE-2007-0066
O CAIS recomenda que os administradores mantenham seus sistemas e
aplicativos sempre atualizados, de acordo com as ultimas versoes e
correcoes oferecidas pelos fabricantes.
Os Alertas do CAIS tambem sao oferecidos no formato RSS/RDF:
http://www.rnp.br/cais/alertas/rss.xml
Atenciosamente,
################################################################
# CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS) #
# Rede Nacional de Ensino e Pesquisa (RNP) #
# #
# cais em cais.rnp.br http://www.cais.rnp.br #
# Tel. 019-37873300 Fax. 019-37873301 #
# Chave PGP disponivel http://www.rnp.br/cais/cais-pgp.key #
################################################################
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Made with pgp4pine 1.76
iQCVAwUBR4UWi+kli63F4U8VAQFMBQQAln8oVKYsNPemrnNcQERmtNdIvev+SQNc
9HFaAC9lYWQjz7jjKq7I/J5ttoM53bUQXS+7abaxECQh00/DNNWVkj8AOC53u9CZ
FEhDOgZsZwxR0pR5Dd66ElXarAue2dSdYl35eFv+XDGvief7Vzn4Gs4fEJ+TprlN
AR/YOaCppCI=
=VJWS
-----END PGP SIGNATURE-----
----- End forwarded message -----
Mais detalhes sobre a lista de discussão SECURITY-L