From Russ.Cooper@RC.ON.CA Tue Aug  9 14:08:13 2005
From: Russ <Russ.Cooper@RC.ON.CA>
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Date: Tue, 9 Aug 2005 14:00:51 -0400
Reply-To: Windows NTBugtraq Mailing List <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>
Subject: Alert: Microsoft Security Bulletin MS05-039 - Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege (899588)

Microsoft Security Bulletin MS05-039:
Vulnerability in Plug and Play Could Allow Remote Code Execution and Elevation of Privilege (899588)

Bulletin URL:
<http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx>

Version Number: 1.0
Issued Date: Tuesday, August 09, 2005
Impact of Vulnerability: Remote Code Execution and Local Elevation of Privilege
Maximum Severity Rating: Critical
Patch(es) Replaced: None
Caveats: None

Tested Software:
Affected Software:
------------------
* Microsoft Windows 2000 Service Pack 4
<http://tinyurl.com/bgtz8>
* Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
<http://tinyurl.com/d98aa>
* Microsoft Windows XP Professional x64 Edition
<http://tinyurl.com/7hjjk>
* Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1
<http://tinyurl.com/b2a3o>
* Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
<http://tinyurl.com/99vbm>
* Microsoft Windows Server 2003 x64 Edition Windows Server 2003 (all versions)
<http://tinyurl.com/crlsq>

Technical Description:
----------------------
* Plug and Play Vulnerability - CAN-2005-1983: A remote code execution and local elevation of privilege vulnerability exists in Plug and Play that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.

This email is sent to NTBugtraq automagically as a service to my subscribers. (v4.01.2047.14260)

Cheers,
Russ Cooper - Senior Scientist - Cybertrust/NTBugtraq Editor

--
NTBugtraq Editor's Note:

Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.
--
