Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17791
HistoryAug 15, 2007 - 12:00 a.m.

Microsoft Security Bulletin MS07-048 - Important Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution (938123)

2007-08-1500:00:00
vulners.com
10

Microsoft Security Bulletin MS07-048 - Important
Vulnerabilities in Windows Gadgets Could Allow Remote Code Execution (938123)
Published: August 14, 2007

Version: 1.0
General Information
Executive Summary

This important security update resolves two privately reported vulnerabilities in addition to other vulnerabilities identified during the course of the investigation. These vulnerabilities could allow an anonymous remote attacker to run code with the privileges of the logged on user. If a user subscribed to a malicious RSS feed in the Feed Headlines Gadget or added a malicious contacts file in the Contacts Gadget or a user clicked on a malicious link in the Weather Gadget an attacker could potentially run code on the system. In all attack vectors, users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This is an important security update for all supported editions of Windows Vista. For more information, see the subsection, Affected and Non-Affected Software, in this section.

This security update addresses the vulnerability by improving validation code within the Feed Headlines and Contacts Gadgets. The Inspect Your Gadget document outlines secure programming best practices that should be followed when building Gadgets. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation: Microsoft recommends that customers apply the security update.

Known Issues: Microsoft Knowledge Base Article 938123 documents any currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues.
Top of sectionTop of section
Affected and Non-Affected Software

The software listed here has been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.

Affected Software
Operating System Maximum Security Impact Aggregate Severity Rating Bulletins Replaced by This Update

Windows Vista

Remote Code Execution

Important

None

Windows Vista x64 Edition

Remote Code Execution

Important

None
Top of sectionTop of section
Frequently Asked Questions (FAQ) Related to This Security Update

What are the known issues that customers may experience when they install this security update?
Microsoft Knowledge Base Article 938123 documents any currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues.

Why does this update address several reported security vulnerabilities?
This update addresses several vulnerabilities because the modifications for these issues are located in related files. Instead of having to install several updates that are almost the same, customers can install only this update.

Does this update contain any security-related changes to functionality?
Yes. Besides the changes that are listed in the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the bulletin section, Vulnerability Information, this update includes defense-in-depth improvements to the Windows Stocks Gadget.
Top of sectionTop of section
Vulnerability Information

Severity Ratings and Vulnerability Identifiers
Affected Software Windows Vista Feed Headlines Gadget Remote Code Execution Vulnerability – CVE-2007-3033 Windows Vista Contacts Gadget Code Execution Vulnerability – CVE-2007-3032 Windows Vista Weather Gadget Remote Code Execution Vulnerability – CVE-2007-3891 Aggregate Severity Rating

Windows Vista

Important
Remote Code Execution

Moderate
Remote Code Execution

Moderate
Remote Code Execution

Important

Windows Vista x64 Edition

Important
Remote Code Execution

Moderate
Remote Code Execution

Moderate
Remote Code Execution

Important
Top of sectionTop of section

Windows Vista Feed Headlines Gadget Could Allow Remote Code Execution – CVE-2007-3033

A remote code execution vulnerability exists in Windows Vista Feed Headlines Gadgets that could allow a remote anonymous attacker to run code with the privileges of the logged on user.

To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2007-3033.

Mitigating Factors for Windows Vista Feed Headlines Gadget Could Allow Remote Code Execution – CVE-2007-3033

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, which could reduce the severity of exploitation of this vulnerability. The following mitigating factor may be helpful in your situation:

The user needs to subscribe to a untrusted or compromised RSS feed in the Feed Headlines Gadget using Internet Explorer.
Top of sectionTop of section

Workarounds for Windows Vista Feed Headlines Gadget Could Allow Remote Code Execution – CVE-2007-3033

Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:

Disable the Feed Headlines Gadget:

To disable the Feed Headlines Gadget, follow these steps:

Right click in Sidebar.

Select Properties from the menu.

In the Windows Sidebar Properties dialog click the View list of running gadgets button.

Select the Feed Headlines Gadget and click the Remove button.

Impact of Workaround: The Feed Headlines Gadget is disabled.

Uninstall the Feed Headlines Gadget:

To uninstall the Feed Headlines Gadget, follow these steps:

Right click in Sidebar.

Select Add Gadgets… from the menu.

Right click on the Feed Headlines Gadget.

Select uninstall from the menu.

Impact of Workaround: The Feed Headlines Gadget will be uninstalled.

Modify the Access Control List on gadget.xml to be more restrictive:

Applying this workaround may cause the installation of security updates provided with this security bulletin to fail.

To modify the Access Control List (ACL) on gadget.xml to be more restrictive, follow these steps:

Click Start, click All Programs, click Accessories, right click on Command Prompt, click Run as administrator, and then click Continue.

Type the following command at a command prompt:

cd %ProgramFiles%\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US

Type the following command at a command prompt make a note of the current ACL’s that is on the file (including inheritance settings) for future reference to undo this modification:

takeown /f gadget.xml

Type the following command at a command prompt to ACL the Feed Headlines Gadget. Make a note of the current ACL’s that are on the file (including inheritance settings) for future reference to undo this modification:

icacls gadget.xml /deny Everyone:(R,RX)

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: The Feed Headlines Gadget is disabled.

Disable Sidebar in Group Policy

To disable Sidebar in Group Policy, follow these steps:

Click Start, click Run, type “gpedit.msc”, and then click Continue.

Under Local Computer Policy\Computer Configuration double click Administrative Templates, double click Windows Components, and then double click Windows Sidebar.

Change the value of the Turn off Windows Sidebar setting to Enabled:

Right click on Turn off Windows Sidebar.

Select Properties from the menu.

Select the Enabled radio button.

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: Sidebar is disabled.

Disable the Sidebar in the system registry

Disabling Sidebar by creating a new registry key helps protect the affected system from attempts to exploit this vulnerability. To create a new Sidebar registry key, follow these steps:

Note: Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.

Note: We recommend backing up the registry before you edit it.

Click Start, click Run, type “regedit” (without the quotation marks), and then click Continue.

Expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, expand CurrentVersion, and then expand Policies.

Right click on Policies, select New, select Key, and then type Windowsas the file name.

Right click on Windows, select New, select Key, and then type Sidebaras the file name.

Right click on Sidebar, select New, select DWORD (32-bit) Value, and the type TurnOffSidebaras the Name.

Right click on TurnOffSidebar, and then change Value data: to 1.

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: Sidebar is disabled.
Top of sectionTop of section

FAQ for Windows Vista Feed Headlines Gadget Could Allow Remote Code Execution – CVE-2007-3033

What is the scope of the vulnerability?
This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could run code on the vulnerable system.

What causes the vulnerability
The Feed Headlines Gadget does not perform sufficient validation when parsing HTML attributes.

What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could run code on the affected system.

How could an attacker exploit the vulnerability?
The Feed Headlines Gadget is installed on Windows Vista and is enabled by default. The user needs to subscribed to a RSS feed in the Feed Headlines Gadget using Internet Explorer. Once a feed is subscribed an attacker must send a specially crafted RSS post using the existing subscription to exploit the system. An attacker could then execute code in the context of the logged on user from the subsequent malicious or specially crafted feed over the internet.

What is a Gadget?
Gadgets are mini-applications designed to provide the user with information or utilities. Windows Vista treats gadgets similar to the way Windows Vista treats all executable code. Gadgets are written using HTML and script, but this HTML is not located on an arbitrary remote server as web pages are. HTML content in the Gadget is downloaded first as part of a package of resources and configuration files and then executed from the local computer. This download process is similar to applications (.exe files) downloaded from the Internet.

Could the vulnerability be exploited over the Internet?
Yes, this vulnerability could be exploited over the internet once a user has subscribed to a malicious RSS feed in the Feed Headlines Gadget, or if a trusted feed is compromised by an attacker.

What systems are primarily at risk from the vulnerability?
Any Windows Vista system where the Feed Headlines Gadget is enabled and subscribed to RSS feeds.

What does the update do?
The update removes the vulnerability by adding additional checks on HTML attributes within the Feed Headlines Gadgets.

When this security bulletin was issued, had this vulnerability been publicly disclosed?
No. Microsoft received information about this vulnerability through responsible disclosure.

When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.
Top of sectionTop of section
Top of sectionTop of section

Windows Vista Contacts Gadget Could Allow Code Execution – CVE-2007-3032

A code execution vulnerability exists in Windows Vista Contacts Gadget that could allow an attacker to run code with the privileges of the logged on user.

To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2007-3032.

Mitigating Factors for Windows Vista Contacts Gadget Could Allow Code Execution – CVE-2007-3032

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, which could reduce the severity of exploitation of this vulnerability. The following mitigating factor may be helpful in your situation:

The Contacts Gadget is not enabled by default. To be subject to exploitation of this vulnerability, the user must add the Contacts Gadget to Windows Sidebar.

When the Contacts Gadget is enabled, the user must add or import specially crafted malicious contacts from an attacker.
Top of sectionTop of section

Workarounds for Windows Vista Contacts Gadget Could Allow Code Execution – CVE-2007-3032

Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:

Disablethe Contacts Gadget:

To disable the Contacts Gadget, follow these steps:

Right click in Sidebar.

Select Properties from the menu.

In the Windows Sidebar Properties dialog click the View list of running gadgets button.

Select the Contacts Gadget and click the Remove button.

Impact of Workaround: The Contacts Gadget is disabled.

Uninstallthe Contacts Gadget:

To uninstall the Contacts Gadget, follow these steps:

Right click in Sidebar.

Select Add Gadgets… from the menu.

Right click on the Contacts Gadget.

Select uninstall from the menu.

Impact of Workaround: The Contacts Gadget will be uninstalled.

Modify the Access Control List on gadget.xml to be more restrictive:

Applying this workaround may cause the installation of security updates provided with this security bulletin to fail.

To modify the Access Control List (ACL) on gadget.xml to be more restrictive, follow these steps:

Click Start, click All Programs, click Accessories, right click on Command Prompt, click Run as administrator, and then click Continue.

Type the following command at a command prompt:

cd %ProgramFiles%\Windows Sidebar\Gadgets\Contacts.Gadget\en-US

Type the following command at a command prompt make a note of the current ACL’s that are on the file (including inheritance settings) for future reference to undo this modification:

takeown /f gadget.xml

Type the following command at a command prompt to ACL the Contacts Gadget. Make a note of the current ACL’s that are on the file (including inheritance settings) for future reference to undo this modification:

icacls gadget.xml /deny Everyone:(R,RX)

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: The Contacts Gadget is disabled.

Disable Sidebar in Group Policy

To disable Sidebar in Group Policy, follow these steps:

Click Start, click Run, type “gpedit.msc”, and then click Continue.

Under Local Computer Policy\Computer Configuration double click Administrative Templates, double click Windows Components, and then double click Windows Sidebar.

Change the value of the Turn off Windows Sidebar setting to Enabled:

Right click on Turn off Windows Sidebar.

Select Properties from the menu.

Select the Enabled radio button.

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: Sidebar is disabled.

Disable Sidebar in the system registry

Disabling Sidebar by creating a new registry key helps protect the affected system from attempts to exploit this vulnerability. To create a new Sidebar registry key, follow these steps:

Note: Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.

Note: We recommend backing up the registry before you edit it.

Click Start, click Run, type “regedit” (without the quotation marks), and then click Continue.

Expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, expand CurrentVersion, and then expand Policies.

Right click on Policies, select New, select Key, and then type Windows as the file name.

Right click on Windows, select New, select Key, and then type Sidebar as the file name.

Right click on Sidebar, select New, select DWORD (32-bit) Value, and the type TurnOffSidebaras the Name.

Right click on TurnOffSidebar, and then change Value data: to 1.

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: Sidebar is disabled.
Top of sectionTop of section

FAQ for Windows Vista Contacts Gadget Could Allow Code Execution – CVE-2007-3032

What is the scope of the vulnerability?
This is a code execution vulnerability. An attacker who successfully exploited this vulnerability could run code on the vulnerable system in the context of the logged on user.

What causes the vulnerability
The Contacts Gadget does not perform sufficient validation on contacts when imported.

What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could run code on the affected system in the context of the user.

How could an attacker exploit the vulnerability?
While the Contacts Gadget is installed on Windows Vista it is not enabled by default. A user would be required to enable the Contacts Gadget. An attacker would then have to send a specially crafted contact to an affected system, or persuade a user to visit a webpage that allowed the specially crafted contact to be downloaded. The user would have to add the malicious contact. Once the contact was added or imported the attacker could then execute code in the context of the logged on user when the contact was selected or if the contact were the first contact in the list.

What is a Gadget?
Gadgets are mini-applications designed to provide the user with information or utilities. Windows Vista treats gadgets similar to the way Windows Vista treats other executable code. Gadgets are written using HTML and script, but this HTML is not located on an arbitrary remote server as web pages are. HTML content in the Gadget is downloaded first as part of a package of resources and configuration files and then executed from the local computer. This download process is similar to applications (.exe files) downloaded from the Internet.

Could the vulnerability be exploited over the Internet?
Yes, this vulnerability could be exploited over the internet if a user added or imported the malicious contact file from the Internet into the Contacts Gadget. The contact would have to be selected or the first contact in the list.

What systems are primarily at risk from the vulnerability?
Any Windows Vista system where the Contacts Gadget is enabled would be at risk form the vulnerability.

What does the update do?
The update removes the vulnerability by adding additional checks on imported contacts within Contacts Gadget.

When this security bulletin was issued, had this vulnerability been publicly disclosed?
No. Microsoft received information about this vulnerability through responsible disclosure.

When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.
Top of sectionTop of section
Top of sectionTop of section

Windows Vista Weather Gadget Could Allow Remote Code Execution – CVE-2007-3891

A remote code execution vulnerability exists in Windows Vista Weather Gadgets that could allow an attacker to run code with the privileges of the logged on user.

To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2007-3891.

Mitigating Factors for Windows Vista Weather Gadget Could Allow Remote Code Execution – CVE-2007-3891

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, which could reduce the severity of exploitation of this vulnerability. The following mitigating factor may be helpful in your situation:

Links are not visible in the default view of the Weather Gadget. To view links in the Weather Gadget the user must drag and drop the Weather Gadget onto the desktop.

Weather services provided in the Weather Gadget are not available in all geographical regions.
Top of sectionTop of section

Workarounds for Windows Vista Weather Gadget Could Allow Remote Code Execution – CVE-2007-3891

Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:

Disable the Weather Gadget:

To disable the Weather Gadget, follow these steps:

Right click in Sidebar.

Select Properties from the menu.

In the Windows Sidebar Properties dialog click the View list of running gadgets button.

Select the Weather Gadget and click the Remove button.

Impact of Workaround: The Weather Gadget is disabled.

Uninstall the Weather Gadget:

To uninstall the Weather Gadget, follow these steps:

Right click in Sidebar.

Select Add Gadgets… from the menu.

Right click on the Weather Gadget.

Select uninstall from the menu.

Impact of Workaround: The Weather Gadget will be uninstalled.

Modify the Access Control List on gadget.xml to be more restrictive:

Applying this workaround may cause the installation of security updates provided with this security bulletin to fail.

To modify the Access Control List (ACL) on gadget.xml to be more restrictive, follow these steps:

Click Start, click All Programs, click Accessories, right click on Command Prompt, click Run as administrator, and then click Continue.

Type the following command at a command prompt:

cd %ProgramFiles%\Windows Sidebar\Gadgets\Weather.Gadget\en-US

Type the following command at a command prompt make a note of the current ACL’s that is on the file (including inheritance settings) for future reference to undo this modification:

takeown /f gadget.xml

Type the following command at a command prompt to ACL the Weather Gadget. Make a note of the current ACL’s that are on the file (including inheritance settings) for future reference to undo this modification:

icacls gadget.xml /deny Everyone:(R,RX)

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: The Weather Gadget is disabled.

Disable Sidebar in Group Policy

To disable Sidebar in Group Policy, follow these steps:

Click Start, click Run, type “gpedit.msc”, and then click Continue.

Under Local Computer Policy\Computer Configuration double click Administrative Templates, double click Windows Components, and then double click Windows Sidebar.

Change the value of the Turn off Windows Sidebar setting to Enabled:

Right click on Turn off Windows Sidebar.

Select Properties from the menu.

Select the Enabled radio button.

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: Sidebar is disabled.

Disable the Sidebar in the system registry

Disabling Sidebar by creating a new registry key helps protect the affected system from attempts to exploit this vulnerability. To create a new Sidebar registry key, follow these steps:

Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe.

Note: We recommend backing up the registry before you edit it.

Click Start, click Run, type “regedit” (without the quotation marks), and then click Continue.

Expand HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand Windows, expand CurrentVersion, and then expand Policies.

Right click on Policies, select New, select Key, and then type Windows as the file name.

Right click on Windows, select New, select Key, and then type Sidebar as the file name.

Right click on Sidebar, select New, select DWORD (32-bit) Value, and the type TurnOffSidebaras the Name.

Right click on TurnOffSidebar, and then change Value data: to 1.

You must Log Off your system or close the sidebar.exe process after you apply this workaround.

Impact of Workaround: Sidebar is disabled.
Top of sectionTop of section

FAQ for Windows Vista Weather Gadget Could Allow Remote Code Execution – CVE-2007-3891

What is the scope of the vulnerability?
This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could run code on the vulnerable system.

What causes the vulnerability
Weather Gadget does not perform sufficient validation when parsing HTML attributes.

What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could run code on the affected system.

How could an attacker exploit the vulnerability?
In order to exploit this vulnerability, an attacker would have to compromise the user’s connection and convince the user to click a malicious link in the Weather Gadget. To view links in the Weather Gadget the user must first drag and drop the Weather Gadget onto the desktop. Links are not visible in the default view of the Weather Gadget.

What is a Gadget?
Gadgets are mini-applications designed to provide the user with information or utilities. Windows Vista treats gadgets similar to the way Windows Vista treats other executable code. Gadgets are written using HTML and script, but this HTML is not located on an arbitrary remote server as web pages are. HTML content in the Gadget is downloaded first as part of a package of resources and configuration files and then executed from the local computer. This download process is similar to applications (.exe files) downloaded from the Internet.

Could the vulnerability be exploited over the Internet?
No, this vulnerability can not be exploited over the internet by an anonymous attacker.

What systems are primarily at risk from the vulnerability?
Any Windows Vista system where the Weather Gadget is running on the desktop and links are visible.

What does the update do?
The update removes the vulnerability by adding additional checks on HTML attributes within the Weather Gadgets.

When this security bulletin was issued, had this vulnerability been publicly disclosed?
No.

When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.

Other Information
Acknowledgments

Microsoft thanks the following for working with us to help protect customers:

Aviv Raff of Finjan for reporting the Windows Vista Contacts Gadget Remote Code Execution Vulnerability (CVE-2007-3032)

Aviv Raff, working with iDefense Labs, for reporting the Windows Vista Feed Headlines Gadget Remote Code Execution Vulnerability (CVE-2007-3033)
Top of sectionTop of section
Support

Customers in the U.S. and Canada can receive technical support from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates.

International customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.

Disclaimer

The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

V1.0 (August 14, 2007): Bulletin published.

Related for SECURITYVULNS:DOC:17791