Objavljena je revizija sigurnosne preporuke oznake MS09-035, vezane uz propuste paketa Visual Studio. Napadač ih može iskoristiti za udaljeno pokretanje proizvoljnog programskog koda.
Paket:
Microsoft Visual Studio 2005, Microsoft Visual Studio 2008, Microsoft Visual Studio .NET 2003
Operacijski sustavi:
Microsoft Windows XP, Microsoft Windows Server 2003, Microsoft Windows Vista, Microsoft Windows Server 2008, Microsoft Windows 7
Kritičnost:
6.9
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
proizvoljno izvršavanje programskog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2009-0901, CVE-2009-2493, CVE-2009-2495
Izvorni ID preporuke:
MS09-035
Izvor:
Microsoft
Problem:
Propusti su posljedica pogrešaka u komponenti ATL (eng. Active Template Library). Razlog objave revizije su izmjene u informativnom dijelu preporuke.
Microsoft Security Bulletin MS09-035 - Moderate
Vulnerabilities in Visual Studio Active Template Library Could Allow Remote Code Execution (969706)
Published: July 28, 2009 | Updated: July 27, 2011
Version: 3.1
General Information
Executive Summary
This security update addresses several privately reported vulnerabilities in the public versions of the Microsoft Active Template Library (ATL) included with Visual Studio. This security update is specifically intended for developers of components and controls. Developers who build and redistribute components and controls using ATL should install the update provided in this bulletin and follow the guidance provided to create, and distribute to their customers, components and controls that are not vulnerable to the vulnerabilities described in this security bulletin.
This security bulletin discusses vulnerabilities that could allow remote code execution if a user loaded a component or control built with the vulnerable versions of ATL.
While most Microsoft Security Bulletins discuss the risk of a vulnerability for a specific product, this security bulletin discusses the vulnerabilities that may be present in products built using the ATL. Therefore, this security update is rated Moderate for all supported editions of Microsoft Visual Studio .NET 2003, Microsoft Visual Studio 2005, Microsoft Visual Studio 2008, Microsoft Visual C++ 2005 Redistributable Package, and Microsoft Visual C++ 2008 Redistributable Package.
For more information on the impact of, and workarounds and mitigations for controls and components that may be vulnerable to these issues, please see Microsoft Security Advisory (973882).
For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerabilities by modifying the ATL headers so that components and controls built using the headers can safely initialize from a data stream. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Recommendation. Developers who have built components and controls using ATL should download this update and recompile their components and controls following the guidance provided in the following MSDN article.
The majority of Visual Studio customers who have automatic updating enabled will receive this update automatically and receive the updated ATL. However, as noted earlier, additional steps will be needed to update potentially vulnerable controls and components. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.
For administrators and enterprise installations or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.
See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.
Known Issues. Microsoft Knowledge Base Article 969706 documents the currently known issues that customers may experience when installing this security update. The article also documents recommended solutions for these issues.
Top of sectionTop of section
Affected and Non-Affected Software
The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.
Affected Software
Software Maximum Security Impact Aggregate Severity Rating Bulletins Replaced by this Update
Microsoft Visual Studio .NET 2003 Service Pack 1
(KB971089)
Remote Code Execution
Moderate
MS07-012
Microsoft Visual Studio 2005 Service Pack 1
(KB971090)
Remote Code Execution
Moderate
None
Microsoft Visual Studio 2005 Service Pack 1*
(KB973673)
Remote Code Execution
Moderate
None
Microsoft Visual Studio 2005 Service Pack 1 64-bit Hosted Visual C++ Tools
(KB973830)
Remote Code Execution
Moderate
None
Windows Embedded CE 6.0**
(KB974616)
Remote Code Execution
Moderate
None
Microsoft Visual Studio 2008
(KB971091)
Remote Code Execution
Moderate
None
Microsoft Visual Studio 2008*
(KB973674)
Remote Code Execution
Moderate
None
Microsoft Visual Studio 2008 Service Pack 1
(KB971092)
Remote Code Execution
Moderate
None
Microsoft Visual Studio 2008 Service Pack 1*
(KB973675)
Remote Code Execution
Moderate
None
Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package
(KB973544)
Remote Code Execution
Moderate
None
Microsoft Visual C++ 2008 Redistributable Package
(KB973551)
Remote Code Execution
Moderate
None
Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package
(KB973552)
Remote Code Execution
Moderate
None
*For mobile applications using ATL for Smart Devices
**Installs the Windows Embedded CE 6.0 Monthly Update (December 2009). This update package is available from the Microsoft Download Center only.
Top of sectionTop of section
Frequently Asked Questions (FAQ) Related to This Security Update
Why was this bulletin rereleased on January 12, 2010?
Microsoft rereleased this bulletin to add Windows Embedded CE 6.0 to affected software. The update for Windows Embedded CE 6.0 (KB974616) is a cumulative update that is available from the Microsoft Download Center only. Customers using the Windows Embedded CE 6.0 platform should consider applying the cumulative update. No other update packages are affected by this rerelease.
Why was this bulletin revised on September 8, 2009?
This bulletin was revised to communicate that the Known issues with this security update section in the associated Microsoft Knowledge Base Article 969706 been revised to change the number for known issue KB974223 to KB974479, in order to offer a non-security update to fix the issue. Microsoft Visual Studio 2008 Service Pack 1 users who have not installed the security update described in this bulletin will automatically receive both the security update and the non-security update through Microsoft Update. Microsoft Visual Studio 2008 Service Pack 1 users who have already installed the security update will automatically be offered the non-security update through Windows Update. Microsoft Visual Studio 2008 Service Pack 1 users who have already installed the security update do not need to reinstall the security update, and need only install the non-security update if they are experiencing the issues described in KB974479.
Why was this bulletin rereleased on August 11, 2009?
Microsoft rereleased this bulletin to offer new updates for the following platforms:
â
Posljednje sigurnosne preporuke