__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
				   Vulnerability in Crystal Reports for Visual Studio
						[Microsoft Security Bulletin (MS07-052)]
	
	September 11, 2007 19:00 GMT                                      Number R-341
	[REVISED 21 Sept 2007]
	______________________________________________________________________________
	PROBLEM:       A remote code execution vulnerability exists in the way Crystal 
				   Reports for Visual Studio handles malformed RPT files. 
	PLATFORM:      Visual Studio .NET 2002 Service Pack 1 
				   Visual Studio .NET 2003 
				   Visual Studio 2005 
	DAMAGE:        An attacker could exploit the vulnerability by sending an 
				   affected user a malformed RPT file as an e-mail attachment, or 
				   hosting the file on a malicious or compromised Web site; and 
				   the attacker could gain the same user rights as the local user. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is MEDIUM. This exploit only targets the copy of 
	ASSESSMENT:    Crystal Reports that comes with Visual Studio. 
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-341.shtml 
	 ORIGINAL BULLETIN:  http://www.microsoft.com/technet/security/Bulletin/MS07-052.mspx 
	 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= 
						 CVE-2006-6133 
	______________________________________________________________________________
	REVISION HISTORY:
	09/21/2007 - revised R-341 to reflect changes Microsoft has made in MS07-052 where
                 the executable filename for Visual Studio 2003 Service Pack 1 has 
				 been correctly updated to VS7.1sp1-KB937059-x86-INTL in the 
				 corresponding Reference Table under "Security Update Deployment".



	[***** Start Microsoft Security Bulletin (MS07-052) *****]
	
	Microsoft Security Bulletin MS07-052 - Important
	Vulnerability in Crystal Reports for Visual Studio Could Allow Remote Code 
	  Execution (941522)
	Published: September 11, 2007 | Updated: September 19, 2007
	
	Version: 1.1
	
	General Information
	Executive Summary
	This important security update resolves a publicly disclosed vulnerability. 
	This vulnerability could allow remote code execution if a user opens a 
	specially crafted RPT file. Users whose accounts are configured to have fewer 
	user rights on the system could be less impacted than users who operate with 
	administrative user rights.
	
	This is an important security update for supported editions of Visual Studio 
	that include a custom version of Crystal Reports. Only the specific editions 
	of Visual Studio listed in the Affected Software section are affected because 
	they contain Crystal Reports. For more information, see the subsection, 
	Affected and Non-Affected Software, in this section.
	
	This security update addresses the vulnerability by modifying the way that 
	Crystal Reports for Visual Studio handles RPT files. For more information 
	about the vulnerability, see the Frequently Asked Questions (FAQ) subsection 
	for the specific vulnerability entry under the next section, Vulnerability 
	Information.
	
	Recommendation: Microsoft recommends that customers apply the security update 
	at the earliest opportunity.
	
	Known Issues: None.
	
	Top of section
	Affected and Non-Affected Software
	The software listed here have been tested to determine which versions or 
	editions are affected. Other versions or editions are either past their 
	support life cycle or are not affected. To determine the support life cycle 
	for your software version or edition, visit Microsoft Support Lifecycle. Only 
	the listed editions of Visual Studio are affected. Other editions do not need 
	to be updated because they do not contain Crystal Reports and are not 
	vulnerable.
	
	Affected Software
	
	Software Edition Maximum Security Impact Aggregate Severity Rating Bulletins 
	Replaced by This Update  
	Visual Studio .NET 2002 Service Pack 1
	(KB937057)
	 Microsoft Visual Studio .NET Enterprise Architect
	
	Microsoft Visual Studio .NET Enterprise Developer
	
	Microsoft Visual Studio .NET Professional
	 Remote Code Execution
	 Important
	 None
	 
	Visual Studio .NET 2003
	(KB937058)
	 Microsoft Visual Studio .NET Enterprise Architect 2003
	
	Microsoft Visual Studio .NET Enterprise Developer 2003
	
	Microsoft Visual Studio .NET Professional 2003
	 Remote Code Execution
	 Important
	 None
	 
	Visual Studio .NET 2003 Service Pack 1
	(KB937059)
	 Microsoft Visual Studio .NET Enterprise Architect 2003
	
	Microsoft Visual Studio .NET Enterprise Developer 2003
	
	Microsoft Visual Studio .NET Professional 2003
	 Remote Code Execution
	 Important
	 None
	 
	Visual Studio 2005
	(KB937060)
	 Microsoft Visual Studio 2005 Professional Edition
	
	Microsoft Visual Studio 2005 Team Edition for Software Architects
	
	Microsoft Visual Studio 2005 Team Edition for Software Developers
	
	Microsoft Visual Studio 2005 Team Suite
	
	Microsoft Visual Studio 2005 Team Edition for Software Testers
	 Remote Code Execution
	 Important
	 None
	 
	Visual Studio 2005 Service Pack 1
	(KB937061)
	 Microsoft Visual Studio 2005 Professional Edition
	
	Microsoft Visual Studio 2005 Team Edition for Software Architects
	
	Microsoft Visual Studio 2005 Team Edition for Software Developers
	
	Microsoft Visual Studio 2005 Team Suite
	
	Microsoft Visual Studio 2005 Team Edition for Software Testers
	 Remote Code Execution
	 Important
	 None
	 
	
	Non-Affected Software
	
	Operating System 
	Microsoft Office Outlook 2003 with Business Contact Manager
	 
	Microsoft Office Outlook 2007 with Business Contact Manager
	 
	
	Top of section
	
	Vulnerability Information
	 Severity Ratings and Vulnerability Identifiers 
	
	Vulnerability Severity Rating and Maximum Security Impact by Affected Software 
	Affected Software Crystal Reports RPT Processing Vulnerability – CVE-2006-6133 
	Aggregate Severity Rating 
	Visual Studio .NET 2002 Service Pack 1
	 Important
	Remote Code Execution
	 Important
	 
	Visual Studio .NET 2003
	 Important
	Remote Code Execution
	 Important
	 
	Visual Studio .NET 2003 Service Pack 1 
	 Important
	Remote Code Execution
	 Important
	 
	Visual Studio 2005
	 Important
	Remote Code Execution
	 Important
	 
	Visual Studio 2005 Service Pack 1
	 Important
	Remote Code Execution
	 Important
	 
	
	Top of section
	 Crystal Reports RPT Processing Vulnerability – CVE-2006-6133 
	
	A remote code execution vulnerability exists in the way Crystal Reports for Visual 
	Studio handles malformed RPT files. An attacker could exploit the vulnerability by 
	sending an affected user a malformed RPT file as an e-mail attachment, or hosting 
	the file on a malicious or compromised Web site.
	
	An attacker who successfully exploited this vulnerability could gain the same user 
	rights as the local user. Users whose accounts are configured to have fewer user 
	rights on the system could be less impacted than users who operate with 
	administrative user rights.
	
	To view this vulnerability as a standard entry in the Common Vulnerabilities and 
	Exposures list, see CVE-2006-6133.
	
	
	Update Information
	 Detection and Deployment Tools and Guidance 
	
	Manage the software and security updates you need to deploy to the servers, 
	desktop, and mobile computers in your organization. For more information see the 
	TechNet Update Management Center. The Microsoft TechNet Security Web site provides 
	additional information about security in Microsoft products.
	
	Security updates are available from Microsoft Update, Windows Update, and Office 
	Update. Security updates are also available at the Microsoft Download Center. You 
	can find them most easily by doing a keyword search for "security_patch". Finally, 
	security updates can be downloaded from the Windows Update Catalog. For more 
	information about the Windows Update Catalog, see Microsoft Knowledge Base Article 
	323166.
	
	Detection and Deployment Guidance
	
	Microsoft has provided detection and deployment guidance for this month’s 
	security updates. This guidance will also help IT professionals understand how 
	they can use various tools to help deploy the security update, such as Windows 
	Update, Microsoft Update, Office Update, the Microsoft Baseline Security Analyzer 
	(MBSA), the Office Detection Tool, Microsoft Systems Management Server (SMS), the 
	Extended Security Update Inventory Tool, and the Enterprise Update Scan Tool (EST). 
	For more information, see Microsoft Knowledge Base Article 910723.
	
	Microsoft Baseline Security Analyzer and Enterprise Update Scan Tool (EST)
	
	Microsoft Baseline Security Analyzer (MBSA) allows administrators to scan local 
	and remote systems for missing security updates as well as common security 
	misconfigurations. For more information about MBSA, visit Microsoft Baseline 
	Security Analyzer.
	
	MBSA 1.2.1 does not support detection for this security update. The Enterprise 
	Update Scan Tool does, and is what customers can use instead of MBSA 1.2.1. For 
	download links and more information about the version of EST that is being 
	released this month, see Microsoft Knowledge Base Article 894193. SMS customers 
	should also see the heading, Systems Management Server, for more information 
	about SMS and EST.
	
	The following table provides the MBSA and EST detection summary for this 
	security update.
	
	Software MBSA 1.2.1 EST MBSA 2.0.1 
	Visual Studio .NET 2002 Service Pack 1
	 No
	 Yes
	 No
	 
	Visual Studio .NET 2003
	 No
	 Yes
	 No
	 
	Visual Studio .NET 2003 Service Pack 1 
	 No
	 Yes
	 No
	 
	Visual Studio 2005
	 No
	 Yes
	 Yes
	 
	Visual Studio 2005 Service Pack 1
	 No
	 Yes
	 Yes
	 
	
	For more information about MBSA, visit the Microsoft Baseline Security Analyzer. 
	For more information about the software that Microsoft Update and MBSA 2.0 
	currently do not detect, see Microsoft Knowledge Base Article 895660.
	
	Windows Server Update Services
	
	By using Windows Server Update Services (WSUS), administrators can deploy the 
	latest important updates and security updates for Windows 2000 operating systems 
	and later, Office XP and later, Exchange Server 2003, and SQL Server 2000 to 
	Windows 2000 and later operating systems. For more information about how to 
	deploy this security update using Windows Server Update Services, visit the 
	Windows Server Update Services Web site.
	
	Systems Management Server
	
	The following table provides the SMS detection and deployment summary for this 
	security update.
	
	Software SMS 2.0 SMS 2003 
	Visual Studio .NET 2002 Service Pack 1
	 Yes (with EST)
	 Yes
	 
	Visual Studio .NET 2003
	 Yes (with EST)
	 Yes
	 
	Visual Studio .NET 2003 Service Pack 1
	 Yes (with EST)
	 Yes
	 
	Visual Studio 2005
	 Yes (with EST)
	 Yes
	 
	Visual Studio 2005 Service Pack 1
	 Yes (with EST)
	 Yes
	 
	
	SMS 2.0 and SMS 2003 Software Update Services (SUS) Feature Pack can use MBSA 
	1.2.1 for detection and therefore have the same limitation listed earlier 
	relating to programs that MBSA 1.2.1 does not detect.
	
	For SMS 2.0, the SMS SUS Feature Pack, which includes the Security Update 
	Inventory Tool (SUIT), can be used by SMS to detect security updates. SMS SUIT 
	uses the MBSA 1.2.1 engine for detection. For more information about SUIT, 
	visit the following Microsoft Knowledge Base Article 894154. For more 
	information about the limitations of SUIT, see Microsoft Knowledge Base Article 
	306460. The SMS SUS Feature Pack also includes the Microsoft Office Inventory 
	Tool to detect required updates for Microsoft Office applications.
	
	For SMS 2003, the SMS 2003 Inventory Tool for Microsoft Updates (ITMU) can be 
	used by SMS to detect security updates that are offered by Microsoft Update 
	and that are supported by Windows Server Update Services. For more information 
	about the SMS 2003 ITMU, visit the following Microsoft Web site. SMS 2003 can 
	also use the Microsoft Office Inventory Tool to detect required updates for 
	Microsoft Office applications.
	
	For more information about SMS, visit the Systems Management Server.
	
	For more detailed information, see Microsoft Knowledge Base Article 910723: 
	Summary list of monthly detection and deployment guidance articles.
	
	Top of section
	 Security Update Deployment 
	
	Affected Software
	
	For information about the specific security update for your affected software, 
	click the appropriate link:
	
	* Visual Studio .NET 2002 Service Pack 1 
	* Visual Studio .NET 2003 
	* Visual Studio 2005
	   
	   
	   Other Information
	Support
	• Customers in the U.S. and Canada can receive technical support from Microsoft 
	  Product Support Services at 1-866-PCSAFETY. There is no charge for support calls 
	  that are associated with security updates.
	 
	• International customers can receive support from their local Microsoft 
	  subsidiaries. There is no charge for support that is associated with security 
	  updates. For more information about how to contact Microsoft for support issues, 
	  visit the International Support Web site.
	 
	
	Top of section
	Disclaimer
	The information provided in the Microsoft Knowledge Base is provided "as is" 
	without warranty of any kind. Microsoft disclaims all warranties, either express 
	or implied, including the warranties of merchantability and fitness for a 
	particular purpose. In no event shall Microsoft Corporation or its suppliers be 
	liable for any damages whatsoever including direct, indirect, incidental, 
	consequential, loss of business profits or special damages, even if Microsoft 
	Corporation or its suppliers have been advised of the possibility of such damages. 
	Some states do not allow the exclusion or limitation of liability for consequential 
	or incidental damages so the foregoing limitation may not apply.
	
	Top of section
	Revisions
	• V1.0 (September 11, 2007): Bulletin published.
	• V1.1 (September 19, 2007): Bulletin updated: The executable filename for Visual 
	  Studio 2003 Service Pack 1 has been correctly updated to VS7.1sp1-KB937059-x86-INTL 
	  in the corresponding Reference Table under “Security Update Deployment”.
 
	 
	
	
	
	
	[***** End Microsoft Security Bulletin (MS07-052) *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Microsoft for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-331: HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command
	R-332: MSN Messenger and Windows Live Messenger Webcam Vulnerability
	R-333: BIND Version 8 Vulnerable
	R-334: Oracle JInitiator Vulnerabilities
	R-335: rsync Vulnerability
	R-336: XSS and SQL Injection in Cisco CallManager/Unified Communications Manager Logon Page Vulnerabilities
	R-337: HP OpenView Performance Manager (OVPM) Vulnerability
	R-338: postfix-policy Vulnerability
	R-339: Quiksoft EasyMauil SMTP ActiveX Vulnerabilities
	R-340: Vulnerability in Microsoft Agent