Microsoft Patches 3 Security Holes
- By Scott Bekker
- July 24, 2003
Microsoft issued three security bulletins this week fixing a critical flaw in DirectX, some important problems with SQL Server and a moderate security bug in Windows NT 4.0 Server.
The critical flaw in DirectX is a widespread problem affecting many versions of Windows. (See related story). The buffer overrun condition is exploited by sending a specially coded HTML e-mail or luring a user to a malicious Web page. Exploiting the problem is somewhat more difficult on systems running Windows Server 2003.
Microsoft rolled fixes for three newly discovered vulnerabilities in SQL Server into a new cumulative patch. The new SQL Server flaws require an authenticated user or a user on a local intranet to do the attacking. The bulletin describing the SQL Server problems is available at http://www.microsoft.com/technet/security/bulletin/MS03-031.asp.
Meanwhile, a flaw in a Windows NT 4.0 Server file management function
permits a denial of service vulnerability. When the function receives a specially crafted request, the function can free memory that it doesn't own, causing the application passing the request to fail. Applications that are available remotely can use of the function, making it a problem that remote attackers can theoretically exploit.
Microsoft rates the problem a moderate risk. The bulletin and patch are available at
Microsoft puts out security bulletins on Wednesday evenings. It is the third consecutive week that Microsoft has released three security bulletins during its weekly update.
Scott Bekker is editor in chief of Redmond Channel Partner magazine.