TechNet
Export (0) Print
Expand All
Collapse the table of content
Expand the table of content
Expand Minimize

Microsoft Security Bulletin Summary for October 2003

Published: October 14, 2003

Version: 1.0

This bulletin summary lists security bulletins released for October 2003.

For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications.

Bulletin Information

Summaries

Included in this summary are updates for five discovered vulnerabilities in Microsoft Windows and two discovered vulnerabilities in Microsoft Exchange Server. These vulnerabilities, broken down by severity are:

Critical

Microsoft Security Bulletin MS03-041 - Vulnerability in Authenticode Verification Could Allow Remote Code Execution (823182)

Affected SoftwareMicrosoft Windows NT Workstation 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6
Microsoft Windows 2000, Service Pack 2
Microsoft Windows 2000, Service Pack 3, Service Pack 4
Microsoft Windows XP Gold, Service Pack 1
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64-bit Edition
ImpactRemote Code Execution
Last RevisedNovember 14, 2003
Version Number1.2

Microsoft Security Bulletin MS03-042 - Buffer Overflow in the Windows Troubleshooter ActiveX Control Could Allow Code Execution (826232)

Affected SoftwareMicrosoft Windows 2000, Service Pack 2
Microsoft Windows 2000, Service Pack 3, Service Pack 4
ImpactRemote Code Execution
Last RevisedOctober 29, 2003
Version Number2.0

Microsoft Security Bulletin MS03-043 - Buffer Overrun in Messenger Service Could Allow Code Execution (828035)

Affected SoftwareMicrosoft Windows NT Workstation 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6
Microsoft Windows 2000, Service Pack 2
Microsoft Windows 2000, Service Pack 3, Service Pack 4
Microsoft Windows XP Gold, Service Pack 1
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64-bit Edition
ImpactRemote Code Execution
Last RevisedDecember 2, 2003
Version Number2.3

Microsoft Security Bulletin MS03-044: Buffer Overrun in Windows Help and Support Center Could Lead to System Compromise (825119) 

Affected SoftwareMicrosoft Windows Millennium Edition
Microsoft Windows NT Workstation 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6
Microsoft Windows 2000, Service Pack 2
Microsoft Windows 2000, Service Pack 3, Service Pack 4
Microsoft Windows XP Gold, Service Pack 1
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64-bit Edition
ImpactRemote Code Execution
Last RevisedOctober 22, 2003
Version Number1.1

Microsoft Security Bulletin MS03-046 - Vulnerability in Exchange Server Could Allow Arbitrary Code Execution (829436)

Affected SoftwareMicrosoft Exchange Server 5.0
Microsoft Exchange Server 5.5
Microsoft Exchange 2000 Server
ImpactRemote Code Execution
Last RevisedApril 13, 2004
Version Number2.0

Important

Microsoft Security Bulletin MS03-045: Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code Execution (824141)

Affected SoftwareMicrosoft Windows NT Workstation 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Service Pack 6a
Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6
Microsoft Windows 2000, Service Pack 2
Microsoft Windows 2000 Service Pack 3, Service Pack 4
Microsoft Windows XP Gold, Service Pack 1
Microsoft Windows XP 64 bit Edition
Microsoft Windows XP 64 bit Edition Version 2003
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64 bit Edition
ImpactLocal Elevation of Privilege
Last RevisedMarch 9, 2004
Version Number4.1

Moderate

Microsoft Security Bulletin MS03-047 - Vulnerability in Exchange Server 5.5 Outlook Web Access Could Allow Cross-Site Scripting Attack (828489)

Affected SoftwareMicrosoft Exchange Server 5.5
ImpactRemote Code Execution
Last RevisedOctober 22, 2003
Version Number2.0

 

Security Central

Manage the software and security updates you need to deploy to the servers, desktop, and mobile computers in your organization. For more information see the TechNet Update Management Center. The TechNet Security TechCenter provides additional information about security in Microsoft products. Consumers can visit Microsoft Safety & Security Center, where this information is also available by clicking "Security Updates."

Security updates are available from Microsoft Update and Windows Update. Security updates are also available at the Microsoft Download Center. You can find them most easily by doing a keyword search for "security update."

For customers of Microsoft Office for Mac, Microsoft AutoUpdate for Mac can help keep your Microsoft software up to date. For more information about using Microsoft AutoUpdate for Mac, see Check for software updates automatically.

Finally, security updates can be downloaded from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content made available through Windows Update and Microsoft Update, including security updates, drivers and service packs. By searching using the security bulletin number (such as, "MS12-001"), you can add all of the applicable updates to your basket (including different languages for an update), and download to the folder of your choosing. For more information about the Microsoft Update Catalog, see the Microsoft Update Catalog FAQ.

Detection and Deployment Guidance

Microsoft provides detection and deployment guidance for security updates. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article 961747.

Microsoft Baseline Security Analyzer

The Microsoft Baseline Security Analyzer (MBSA) allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations. For more information about MBSA, see Microsoft Baseline Security Analyzer.

Windows Server Update Services

By using Windows Server Update Services (WSUS), administrators can quickly and reliably deploy the latest critical updates and security updates for Microsoft Windows 2000 operating systems and later, Office XP and later, Exchange Server 2003, and SQL Server 2000 to Microsoft Windows 2000 and later operating systems.

For more information about how to deploy this security update using Windows Server Update Services, visit Windows Server Update Services.

System Center Configuration Manager

System Center Configuration Manager Software Update Management simplifies the complex task of delivering and managing updates to IT systems across the enterprise. With System Center Configuration Manager, IT administrators can deliver updates of Microsoft products to a variety of devices including desktops, laptops, servers, and mobile devices.

The automated vulnerability assessment in System Center Configuration Manager discovers needs for updates and reports on recommended actions. The Software Update Management in System Center Configuration Manager is built on Microsoft Windows Software Update Services (WSUS), a time-tested update infrastructure that is familiar to IT administrators worldwide. For more information about System Center Configuration Manager, see System Center Technical Resources.

Systems Management Server 2003

Microsoft Systems Management Server (SMS) delivers a highly-configurable enterprise solution for managing updates. By using SMS, administrators can identify Windows-based systems that require security updates and to perform controlled deployment of these updates throughout the enterprise with minimal disruption to end users.

Note System Management Server 2003 is out of mainstream support as of January 12, 2010. For more information on product lifecycles, visit Microsoft Support Lifecycle. The next release of SMS, System Center Configuration Manager, is now available; see the earlier section, System Center Configuration Manager.

For more information about how administrators can use SMS 2003 to deploy security updates, see Scenarios and Procedures for Microsoft Systems Management Server 2003: Software Distribution and Patch Management. For information about SMS, visit the Microsoft Systems Management Server TechCenter.

Note SMS uses the Microsoft Baseline Security Analyzer to provide broad support for security bulletin update detection and deployment. Some software updates may not be detected by these tools. Administrators can use the inventory capabilities of SMS in these cases to target updates to specific systems. For more information about this procedure, see Deploying Software Updates Using the SMS Software Distribution Feature. Some security updates require administrative rights following a restart of the system. Administrators can use the Elevated Rights Deployment Tool (available in the SMS 2003 Administration Feature Pack) to install these updates.

Update Compatibility Evaluator and Application Compatibility Toolkit

Updates often write to the same files and registry settings required for your applications to run. This can trigger incompatibilities and increase the time it takes to deploy security updates. You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit.

The Application Compatibility Toolkit (ACT) contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment.

QChain.exe and Update.exe

Microsoft has released a command-line tool named QChain.exe that gives system administrators the ability to safely chain security updates together. Chaining is when you install multiple updates without rebooting between each install. Update.exe, used in the patches described in this advisory, has chaining functionality built in. For customers using Windows 2000 service pack 3 or higher, Windows XP, or Windows Server 2003, Qchain.exe is not required to chain these updates. However, Qchain.exe also supports Windows Updates so that an administrator can create a consistent deployment script across all platforms.

More information on the Qchain utility can be found at:

http://www.microsoft.com/downloads/details.aspx?FamilyId=3C64D889-74F1-490B- A2FB-F15671A3B60C&displaylang=en

Microsoft has tested the following deployment patterns for several of the patches contained within this advisory. Other patches may also be chained; these lists are provided as an example to assist administrators with the creation of their own scripts. Please review the provided documentation before executing or customizing these scripts.

Windows NT Workstation 4.0 Service Pack 6a

@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsNT4Workstation-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Workstation-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Workstation-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Windows NT Server 4.0 Service Pack 6a

@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsNT4Server-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Server-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Server-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Windows NT Server 4.0, Terminal Server Edition Service Pack 6

@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsNT4TerminalServer-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4TerminalServer-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4TerminalServer-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Windows 2000 Service Pack 2

@echo off
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\Windows2000-KB826232-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\Windows2000-KB828035-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\Windows2000-KB824141-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\Windows2000-KB823182-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Windows 2000 Service Pack 3 or Windows 2000 Service Pack 4

@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\Windows2000-KB826232-x86-ENU.exe -z
%PATHTOFIXES%\Windows2000-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\Windows2000-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\Windows2000-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Windows XP Gold, and Service Pack 1

@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsXP-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsXP-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsXP-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Windows Server 2003

@echo off
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsServer2003-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsServer2003-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsServer2003-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\WindowsServer2003-KB828025-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt

Other Information

Non-Security Updates on MU, WU, and WSUS

For information about non-security releases on Windows Update and Microsoft Update, please see:

Security Strategies and Community

Update Management Strategies

Security Guidance for Update Management provides additional information about Microsoft’s best-practice recommendations for applying security updates.

Obtaining Other Security Updates

Updates for other security issues are available from the following locations:

  • Security updates are available from Microsoft Download Center. You can find them most easily by doing a keyword search for "security update".
  • Updates for consumer platforms are available from Microsoft Update.
  • You can obtain the security updates offered this month on Windows Update, from Download Center on Security and Critical Releases ISO CD Image files. For more information, see Microsoft Knowledge Base Article 913086.

IT Pro Security Community

Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics in IT Pro Security Community.

Acknowledgments

Microsoft thanks the following for working with us to help protect customers:

Support

Disclaimer

The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

  • V1.0 (October 14, 2003): Bulletin Summary published.

Built at 2014-04-18T13:49:36Z-07:00

Show:
© 2016 Microsoft