Security Alert: Microsoft Windows XP and Windows Server 2003 Un-Patched Vulnerabilities

Microsoft Windows is prone to multiple security issues that affect Microsoft Help and Support Centre. Successful exploitation may allow remote attackers to execute arbitrary code and take control of the system in the context of the currently Logged In User.

Attackers can exploit these issues by enticing a user to visit a malicious Web Site.

The flaws are trivial to exploit in a reliable and stealthy way and fully functional Exploit Code is Publicly Available. Patches are currently not available. The symantec DeepSight Team expects this issue to be incorporated by attackers to carry out attacks in-the-Wild.

The vulnerabilities affect Microsoft Windows XP and Windows Server 2003.

Other recommended mitigation strategies include:

  • Run all software as a Non-Privileged User with Minimal Access Rights.
  • Not following Links provided by Un-Known or Un-Trusted Sources.
  • Not Opening Files from Un-Trusted Sources.
  • Deploying N.I.D.S. to Monitor Network Traffic.
  • Disabling the H.C.P. Protocol Handler.

More information is available at the following locations:

Microsoft Windows Help And Support Center Trusted Document Whitelist By-Pass Vulnerability:
http://www.securityfocus.com/bid/40725.

Microsoft Help and Support Center "sysinfo/sysinfomain.htm" Cross-Site-Scripting Weakness:
http://www.securityfocus.com/bid/40721.