__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
						   Vulnerabilities in Windows Gadgets
						[Microsoft Security Bulletin (MS07-048)]
	
	August 15, 2007 14:00 GMT                                         Number R-322
	______________________________________________________________________________
	PROBLEM:       A remote code execution vulnerability exists in Windows Vista 
				   Feed Headlines, Contacts, and Weather Gadgets that could allow 
				   a remote anonymous attacker to run code with the privileges of 
				   the logged on user. 
	PLATFORM:      Windows Vista (all versions) 
				   Deployment Information 
	DAMAGE:        Could allow remote code execution. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is MEDIUM. Could allow a remote anonymous attacker to 
	ASSESSMENT:    run code with the privileges of the logged in user. 
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-322.shtml 
	 ORIGINAL BULLETIN:  http://www.microsoft.com/technet/security/Bulletin/MS07-
								  048.mspx 
	 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= 
						 CVE-2007-3033 CVE-2007-3032 CVE-2007-3891 
	______________________________________________________________________________
	[***** Start Microsoft Security Bulletin (MS07-048) *****]
	
	Microsoft Security Bulletin MS07-048 - Important
	Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution (938123)
	Published: August 14, 2007
	
	Version: 1.0
	
	General Information
	Executive Summary
	This important security update resolves two privately reported vulnerabilities 
	in addition to other vulnerabilities identified during the course of the 
	investigation. These vulnerabilities could allow an anonymous remote attacker 
	to run code with the privileges of the logged on user. If a user subscribed to 
	a malicious RSS feed in the Feed Headlines Gadget or added a malicious contacts 
	file in the Contacts Gadget or a user clicked on a malicious link in the Weather 
	Gadget an attacker could potentially run code on the system. In all attack 
	vectors, users whose accounts are configured to have fewer user rights on the 
	system could be less impacted than users who operate with administrative user 
	rights.
	
	This is an important security update for all supported editions of Windows Vista. 
	For more information, see the subsection, Affected and Non-Affected Software, in 
	this section.
	
	This security update addresses the vulnerability by improving validation code 
	within the Feed Headlines and Contacts Gadgets. The Inspect Your Gadget document 
	outlines secure programming best practices that should be followed when building 
	Gadgets. For more information about the vulnerability, see the Frequently Asked 
	Questions (FAQ) subsection for the specific vulnerability entry under the next 
	section, Vulnerability Information.
	
	Recommendation: Microsoft recommends that customers apply the security update.
	
	Known Issues: Microsoft Knowledge Base Article 938123 documents any currently 
	known issues that customers may experience when they install this security update. 
	The article also documents recommended solutions for these issues.
	
	Top of section
	Affected and Non-Affected Software
	The software listed here has been tested to determine which versions or editions 
	are affected. Other versions or editions are either past their support life cycle 
	or are not affected. To determine the support life cycle for your software version 
	or edition, visit Microsoft Support Lifecycle.
	
	Affected Software
	
	Operating System Maximum Security Impact Aggregate Severity Rating Bulletins 
	Replaced by This Update  
	Windows Vista
	 Remote Code Execution
	 Important
	 None
	 
	Windows Vista x64 Edition
	 Remote Code Execution
	 Important
	 None
	 
	
	Vulnerability Information
	 Severity Ratings and Vulnerability Identifiers 
	
	Affected Software Windows Vista Feed Headlines Gadget Remote Code Execution 
	Vulnerability – CVE-2007-3033 Windows Vista Contacts Gadget Code Execution 
	Vulnerability – CVE-2007-3032 Windows Vista Weather Gadget Remote Code 
	Execution Vulnerability – CVE-2007-3891 Aggregate Severity Rating 
	Windows Vista
	 Important 
	Remote Code Execution
	 Moderate 
	Remote Code Execution
	 Moderate 
	Remote Code Execution
	 Important
	 
	Windows Vista x64 Edition
	 Important 
	Remote Code Execution
	 Moderate 
	Remote Code Execution
	 Moderate 
	Remote Code Execution
	 Important
	 
	
	 Windows Vista Feed Headlines Gadget Could Allow Remote Code Execution – 
	 CVE-2007-3033 
	
	A remote code execution vulnerability exists in Windows Vista Feed Headlines 
	Gadgets that could allow a remote anonymous attacker to run code with the 
	privileges of the logged on user.
	
	To view this vulnerability as a standard entry in the Common Vulnerabilities 
	and Exposures list, see CVE-2007-3033.
	
	
	 Windows Vista Contacts Gadget Could Allow Code Execution – CVE-2007-3032 
	
	A code execution vulnerability exists in Windows Vista Contacts Gadget that 
	could allow an attacker to run code with the privileges of the logged on user.
	
	To view this vulnerability as a standard entry in the Common Vulnerabilities 
	and Exposures list, see CVE-2007-3032.
	
	
	 Windows Vista Weather Gadget Could Allow Remote Code Execution – CVE-2007-3891 
	
	A remote code execution vulnerability exists in Windows Vista Weather Gadgets 
	that could allow an attacker to run code with the privileges of the logged on 
	user.
	
	To view this vulnerability as a standard entry in the Common Vulnerabilities 
	and Exposures list, see CVE-2007-3891.
	
	
	Update Information
	 Detection and Deployment Tools and Guidance 
	
	Manage the software and security updates you need to deploy to the servers, 
	desktop, and mobile computers in your organization. For more information see 
	the TechNet Update Management Center. The Microsoft TechNet Security Web site 
	provides additional information about security in Microsoft products.
	
	Security updates are available from Microsoft Update, Windows Update, and Office 
	Update. Security updates are also available at the Microsoft Download Center. 
	You can find them most easily by doing a keyword search for "security_patch". 
	Finally, security updates can be downloaded from the Windows Update Catalog. 
	For more information about the Windows Update Catalog, see Microsoft Knowledge 
	Base Article 323166.
	
	Detection and Deployment Guidance
	
	Microsoft has provided detection and deployment guidance for this month’s 
	security updates. This guidance will also help IT professionals understand how 
	they can use various tools to help deploy the security update, such as Windows 
	Update, Microsoft Update, Office Update, the Microsoft Baseline Security 
	Analyzer (MBSA), the Office Detection Tool, Microsoft Systems Management Server 
	(SMS), the Extended Security Update Inventory Tool, and the Enterprise Update 
	Scan Tool (EST). For more information, see Microsoft Knowledge Base Article 
	910723.
	
	Microsoft Baseline Security Analyzer
	
	Microsoft Baseline Security Analyzer (MBSA) allows administrators to scan local 
	and remote systems for missing security updates as well as common security 
	misconfigurations. For more information about MBSA visit Microsoft Baseline 
	Security Analyzer Web site. The following table provides the MBSA detection 
	summary for this security update.
	
	Software MBSA 1.2.1 MBSA 2.0.1 
	Windows Vista
	 No
	 See Note for Windows Vista below
	 
	Windows Vista x64 Edition
	 No
	 See Note for Windows Vista below
	 
	
	Note for Windows Vista Microsoft does not support installing MBSA 2.0.1 on 
	computers that run Windows Vista, but you may install MBSA 2.0.1 on a 
	supported operating system and then scan the Windows Vista-based computer 
	remotely. For additional information about MBSA support for Windows Vista, 
	visit the MBSA Web site. See also Microsoft Knowledge Base Article 931943: 
	Microsoft Baseline Security Analyzer (MBSA) support for Windows Vista.
	
	Windows Server Update Services
	
	By using Windows Server Update Services (WSUS), administrators can deploy 
	the latest critical updates and security updates for Windows 2000 operating 
	systems and later, Office XP and later, Exchange Server 2003, and SQL Server 
	2000 to Windows 2000 and later operating systems. For more information about 
	how to deploy this security update using Windows Server Update Services, 
	visit the Windows Server Update Services Web site.
	
	Systems Management Server
	
	The following table provides the SMS detection and deployment summary for 
	this security update.
	
	Software SMS 2.0 SMS 2003 
	Windows Vista
	 No
	 See Note for Windows Vista below
	 
	Windows Vista x64 Edition
	 No
	 See Note for Windows Vista below
	 
	
	For SMS 2.0, the SMS SUS Feature Pack, which includes the Security Update 
	Inventory Tool (SUIT), can be used by SMS to detect security updates. SMS 
	SUIT uses the MBSA 1.2.1 engine for detection. For more information about 
	SUIT, visit the following Microsoft Web site. For more information about 
	the limitations of SUIT, see Microsoft Knowledge Base Article 306460. The 
	SMS SUS Feature Pack also includes the Microsoft Office Inventory Tool to 
	detect required updates for Microsoft Office applications.
	
	For SMS 2003, the SMS 2003 Inventory Tool for Microsoft Updates (ITMU) can 
	be used by SMS to detect security updates that are offered by Microsoft 
	Update and that are supported by Windows Server Update Services. For more 
	information about the SMS 2003 ITMU, visit the following Microsoft Web site. 
	SMS 2003 can also use the Microsoft Office Inventory Tool to detect required 
	updates for Microsoft Office applications.
	
	Note for Windows Vista Microsoft Systems Management Server 2003 with Service 
	Pack 3 includes support for Windows Vista manageability.
	
	For more information about SMS, visit the SMS Web site.
	
	
	 Security Update Deployment 
	
	Affected Software
	
	For information about the specific security update for your affected software, 
	click the appropriate link:
	
	* Windows Vista (all versions)
	* Deployment Information
	
	
	Other Information
	Acknowledgments
	Microsoft thanks the following for working with us to help protect customers:
	
	• Aviv Raff of Finjan for reporting the Windows Vista Contacts Gadget Remote 
	Code Execution Vulnerability (CVE-2007-3032)
	 
	• Aviv Raff, working with iDefense Labs, for reporting the Windows Vista Feed 
	Headlines Gadget Remote Code Execution Vulnerability (CVE-2007-3033)
	 
	
	Top of section
	Support
	• Customers in the U.S. and Canada can receive technical support from Microsoft 
	Product Support Services at 1-866-PCSAFETY. There is no charge for support calls 
	that are associated with security updates.
	 
	• International customers can receive support from their local Microsoft 
	subsidiaries. There is no charge for support that is associated with security 
	updates. For more information about how to contact Microsoft for support issues, 
	visit the International Support Web site.
	 
	
	Top of section
	Disclaimer
	The information provided in the Microsoft Knowledge Base is provided "as is" 
	without warranty of any kind. Microsoft disclaims all warranties, either express 
	or implied, including the warranties of merchantability and fitness for a 
	particular purpose. In no event shall Microsoft Corporation or its suppliers be 
	liable for any damages whatsoever including direct, indirect, incidental, 
	consequential, loss of business profits or special damages, even if Microsoft 
	Corporation or its suppliers have been advised of the possibility of such damages. 
	Some states do not allow the exclusion or limitation of liability for consequential 
	or incidental damages so the foregoing limitation may not apply.
	
	Top of section
	Revisions
	• V1.0 (August 14, 2007): Bulletin published.
	 
	
	
	
	
	[***** End Microsoft Security Bulletin (MS07-048) *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Microsoft for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-312: Apache Tomcat Vulnerability
	R-313: Bind Security Update
	R-314: gpdf Security Update
	R-315: Voice Vulnerabilities in Cisco IOS and Cisco Unified Communications Manager
	R-316: Vulnerability in Microsoft XML Core Services
	R-317: Vulnerability in OLE Automation
	R-318: Vulnerability in Microsoft Excel
	R-319: Cumulative Security Update for Internet Explorer
	R-320: Vulnerability in GDI
	R-321: Vulnerabilities in Windows Media Player