Microsoft Security Bulletin Summary for October 2003
Published: October 14, 2003
Version: 1.0
This bulletin summary lists security bulletins released for October 2003.
For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications.
Bulletin Information
Summaries
Included in this summary are updates for five discovered vulnerabilities in Microsoft Windows and two discovered vulnerabilities in Microsoft Exchange Server. These vulnerabilities, broken down by severity are:
Critical
Affected Software | Microsoft Windows NT Workstation 4.0, Service Pack 6aMicrosoft Windows NT Server 4.0, Service Pack 6a Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 Microsoft Windows 2000, Service Pack 2 Microsoft Windows 2000, Service Pack 3, Service Pack 4 Microsoft Windows XP Gold, Service Pack 1 Microsoft Windows XP 64-bit Edition Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows Server 2003 Microsoft Windows Server 2003 64-bit Edition |
---|---|
Impact | Remote Code Execution |
Last Revised | November 14, 2003 |
Version Number | 1.2 |
Affected Software | Microsoft Windows 2000, Service Pack 2Microsoft Windows 2000, Service Pack 3, Service Pack 4 |
---|---|
Impact | Remote Code Execution |
Last Revised | October 29, 2003 |
Version Number | 2.0 |
Affected Software | Microsoft Windows NT Workstation 4.0, Service Pack 6aMicrosoft Windows NT Server 4.0, Service Pack 6a Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 Microsoft Windows 2000, Service Pack 2 Microsoft Windows 2000, Service Pack 3, Service Pack 4 Microsoft Windows XP Gold, Service Pack 1 Microsoft Windows XP 64-bit Edition Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows Server 2003 Microsoft Windows Server 2003 64-bit Edition |
---|---|
Impact | Remote Code Execution |
Last Revised | December 2, 2003 |
Version Number | 2.3 |
Affected Software | Microsoft Windows Millennium EditionMicrosoft Windows NT Workstation 4.0, Service Pack 6a Microsoft Windows NT Server 4.0, Service Pack 6a Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 Microsoft Windows 2000, Service Pack 2 Microsoft Windows 2000, Service Pack 3, Service Pack 4 Microsoft Windows XP Gold, Service Pack 1 Microsoft Windows XP 64-bit Edition Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows Server 2003 Microsoft Windows Server 2003 64-bit Edition |
---|---|
Impact | Remote Code Execution |
Last Revised | October 22, 2003 |
Version Number | 1.1 |
Affected Software | Microsoft Exchange Server 5.0Microsoft Exchange Server 5.5 Microsoft Exchange 2000 Server |
---|---|
Impact | Remote Code Execution |
Last Revised | April 13, 2004 |
Version Number | 2.0 |
Important
Affected Software | Microsoft Windows NT Workstation 4.0, Service Pack 6aMicrosoft Windows NT Server 4.0, Service Pack 6a Microsoft Windows NT Server 4.0, Terminal Server Edition, Service Pack 6 Microsoft Windows 2000, Service Pack 2 Microsoft Windows 2000 Service Pack 3, Service Pack 4 Microsoft Windows XP Gold, Service Pack 1 Microsoft Windows XP 64 bit Edition Microsoft Windows XP 64 bit Edition Version 2003 Microsoft Windows Server 2003 Microsoft Windows Server 2003 64 bit Edition |
---|---|
Impact | Local Elevation of Privilege |
Last Revised | March 9, 2004 |
Version Number | 4.1 |
Moderate
Affected Software | Microsoft Exchange Server 5.5 |
Impact | Remote Code Execution |
Last Revised | October 22, 2003 |
Version Number | 2.0 |
Detection and Deployment Tools and Guidance
Security Central
Manage the software and security updates you need to deploy to the servers, desktop, and mobile computers in your organization. For more information see the TechNet Update Management Center. The TechNet Security TechCenter provides additional information about security in Microsoft products. Consumers can visit Microsoft Safety & Security Center, where this information is also available by clicking "Security Updates."
Security updates are available from Microsoft Update and Windows Update. Security updates are also available at the Microsoft Download Center. You can find them most easily by doing a keyword search for "security update."
For customers of Microsoft Office for Mac, Microsoft AutoUpdate for Mac can help keep your Microsoft software up to date. For more information about using Microsoft AutoUpdate for Mac, see Check for software updates automatically.
Finally, security updates can be downloaded from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content made available through Windows Update and Microsoft Update, including security updates, drivers and service packs. By searching using the security bulletin number (such as, "MS12-001"), you can add all of the applicable updates to your basket (including different languages for an update), and download to the folder of your choosing. For more information about the Microsoft Update Catalog, see the Microsoft Update Catalog FAQ.
Detection and Deployment Guidance
Microsoft provides detection and deployment guidance for security updates. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article 961747.
Microsoft Baseline Security Analyzer
The Microsoft Baseline Security Analyzer (MBSA) allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations. For more information about MBSA, see Microsoft Baseline Security Analyzer.
Windows Server Update Services
By using Windows Server Update Services (WSUS), administrators can quickly and reliably deploy the latest critical updates and security updates for Microsoft Windows 2000 operating systems and later, Office XP and later, Exchange Server 2003, and SQL Server 2000 to Microsoft Windows 2000 and later operating systems.
For more information about how to deploy this security update using Windows Server Update Services, visit Windows Server Update Services.
System Center Configuration Manager
System Center Configuration Manager Software Update Management simplifies the complex task of delivering and managing updates to IT systems across the enterprise. With System Center Configuration Manager, IT administrators can deliver updates of Microsoft products to a variety of devices including desktops, laptops, servers, and mobile devices.
The automated vulnerability assessment in System Center Configuration Manager discovers needs for updates and reports on recommended actions. The Software Update Management in System Center Configuration Manager is built on Microsoft Windows Software Update Services (WSUS), a time-tested update infrastructure that is familiar to IT administrators worldwide. For more information about System Center Configuration Manager, see System Center Technical Resources.
Systems Management Server 2003
Microsoft Systems Management Server (SMS) delivers a highly-configurable enterprise solution for managing updates. By using SMS, administrators can identify Windows-based systems that require security updates and to perform controlled deployment of these updates throughout the enterprise with minimal disruption to end users.
Note System Management Server 2003 is out of mainstream support as of January 12, 2010. For more information on product lifecycles, visit Microsoft Support Lifecycle. The next release of SMS, System Center Configuration Manager, is now available; see the earlier section, System Center Configuration Manager.
For more information about how administrators can use SMS 2003 to deploy security updates, see Scenarios and Procedures for Microsoft Systems Management Server 2003: Software Distribution and Patch Management. For information about SMS, visit the Microsoft Systems Management Server TechCenter.
Note SMS uses the Microsoft Baseline Security Analyzer to provide broad support for security bulletin update detection and deployment. Some software updates may not be detected by these tools. Administrators can use the inventory capabilities of SMS in these cases to target updates to specific systems. For more information about this procedure, see Deploying Software Updates Using the SMS Software Distribution Feature. Some security updates require administrative rights following a restart of the system. Administrators can use the Elevated Rights Deployment Tool (available in the SMS 2003 Administration Feature Pack) to install these updates.
Update Compatibility Evaluator and Application Compatibility Toolkit
Updates often write to the same files and registry settings required for your applications to run. This can trigger incompatibilities and increase the time it takes to deploy security updates. You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit.
The Application Compatibility Toolkit (ACT) contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment.
QChain.exe and Update.exe
Microsoft has released a command-line tool named QChain.exe that gives system administrators the ability to safely chain security updates together. Chaining is when you install multiple updates without rebooting between each install. Update.exe, used in the patches described in this advisory, has chaining functionality built in. For customers using Windows 2000 service pack 3 or higher, Windows XP, or Windows Server 2003, Qchain.exe is not required to chain these updates. However, Qchain.exe also supports Windows Updates so that an administrator can create a consistent deployment script across all platforms.
More information on the Qchain utility can be found at:
Microsoft has tested the following deployment patterns for several of the patches contained within this advisory. Other patches may also be chained; these lists are provided as an example to assist administrators with the creation of their own scripts. Please review the provided documentation before executing or customizing these scripts.
Windows NT Workstation 4.0 Service Pack 6a
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsNT4Workstation-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Workstation-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Workstation-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Windows NT Server 4.0 Service Pack 6a
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsNT4Server-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Server-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4Server-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Windows NT Server 4.0, Terminal Server Edition Service Pack 6
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsNT4TerminalServer-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4TerminalServer-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsNT4TerminalServer-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Windows 2000 Service Pack 2
@echo off
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\Windows2000-KB826232-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\Windows2000-KB828035-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\Windows2000-KB824141-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\Windows2000-KB823182-x86-ENU-CustomServicePackSupport.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Windows 2000 Service Pack 3 or Windows 2000 Service Pack 4
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\Windows2000-KB826232-x86-ENU.exe -z
%PATHTOFIXES%\Windows2000-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\Windows2000-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\Windows2000-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Windows XP Gold, and Service Pack 1
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsXP-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsXP-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsXP-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Windows Server 2003
@echo off
@echo off
setlocal
set PATHTOFIXES=some path
%PATHTOFIXES%\WindowsServer2003-KB828035-x86-ENU.exe -z
%PATHTOFIXES%\WindowsServer2003-KB824141-x86-ENU.exe -z
%PATHTOFIXES%\WindowsServer2003-KB823182-x86-ENU.exe -z
%PATHTOFIXES%\WindowsServer2003-KB828025-x86-ENU.exe -z
%PATHTOFIXES%\qchain.exe qchainlog.txt
Other Information
Non-Security Updates on MU, WU, and WSUS
For information about non-security releases on Windows Update and Microsoft Update, please see:
- Microsoft Knowledge Base Article 894199: Description of Software Update Services and Windows Server Update Services changes in content. Includes all Windows content.
- Updates from Past Months for Windows Server Update Services. Displays all new, revised, and rereleased updates for Microsoft products other than Microsoft Windows.
Security Strategies and Community
Update Management Strategies
Security Guidance for Update Management provides additional information about Microsoft’s best-practice recommendations for applying security updates.
Obtaining Other Security Updates
Updates for other security issues are available from the following locations:
- Security updates are available from Microsoft Download Center. You can find them most easily by doing a keyword search for "security update".
- Updates for consumer platforms are available from Microsoft Update.
- You can obtain the security updates offered this month on Windows Update, from Download Center on Security and Critical Releases ISO CD Image files. For more information, see Microsoft Knowledge Base Article 913086.
IT Pro Security Community
Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics in IT Pro Security Community.
Acknowledgments
Microsoft thanks the following for working with us to help protect customers:
- Greg Jones of KPMG UK and Cesar Cerrudo for reporting the issue described in MS03-042.
- The Last Stage of Delirium Research Group for reporting the issue in MS03-043.
- David Litchfield of Next Generation Security Software Ltd. for reporting the issue in MS03-044.
- Brett Moore of Security-Assessment.com for reporting the issue in MS03-045.
- João Gouveia for reporting the issue described in MS03-046.
Support
- The affected software listed have been tested to determine which versions are affected. Other versions are past their support life cycle. To determine the support life cycle for your software version, visit Microsoft Support Lifecycle.
- Security solutions for IT professionals: TechNet Security Troubleshooting and Support
- Help protect your computer that is running Windows from viruses and malware: Virus Solution and Security Center
- Local support according to your country: International Support
Disclaimer
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Revisions
- V1.0 (October 14, 2003): Bulletin Summary published.
Built at 2014-04-18T13:49:36Z-07:00