Microsoft Security Bulletin MS05-014
Cumulative Security Update for Internet Explorer (867282)

Issued: February 8, 2005
Version: 1.0
Summary

Who should read this document: Customers who use Microsoft Windows

Impact of Vulnerability: Remote Code Execution

Maximum Severity Rating: Critical

Recommendation: Customers should apply the update immediately.

Security Update Replacement This update replaces the update that is included with Microsoft Security Bulletin MS04-038. That update is also a cumulative update. This update also replaces the update that is included with Microsoft Security Bulletin MS04-040. That update is also a cumulative update for Internet Explorer 6 Service Pack 1.

Caveats: Microsoft Knowledge Base Article 867282 documents the currently known issues that customers may experience when they install this security update. The article also documents recommended solutions for these issues. For more information, see Microsoft Knowledge Base Article 867282.

This update does include hotfixes that have been released since the release of MS04-004 or MS04-025 but they will only be installed on systems that need them. Customers who have received hotfixes from Microsoft or from their support providers since the release of MS04-004 or MS04-025 should review the FAQ ?I have received a hotfix from Microsoft or my support provider since the release of MS04-004. Is that hotfix included in this security update?? in the FAQ section for this update to determine how to ensure that the necessary hotfixes are installed. Microsoft Knowledge Base Article 867282 also documents this in more detail.

Important: The update for the ?Drag-and-Drop Vulnerability? (CAN-2005-0053) comes in two parts. It is addressed in part in this security bulletin. This security bulletin, together with security bulletin MS05-008, makes up the update for CAN-2005-0053. These updates do not have to be installed in any particular order. However, we recommend that you install both updates.

Tested Software and Security Update Download Locations:

Affected Software:
?Microsoft Windows 2000 Service Pack 3 and Microsoft Windows 2000 Service Pack 4
?Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2
?Microsoft Windows XP 64-Bit Edition Service Pack 1 (Itanium)
?Microsoft Windows XP 64-Bit Edition Version 2003 (Itanium)
?Microsoft Windows Server 2003
?Microsoft Windows Server 2003 for Itanium-based Systems
?Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (ME) ? Review the FAQ section of this bulletin for details about these operating systems.

Tested Microsoft Windows Components:

Affected Components:
?Internet Explorer 5.01 Service Pack 3 (SP3) on Windows 2000 Service Pack 3: Download the update
?Internet Explorer 5.01 Service Pack 4 on Windows 2000 Service Pack 4: Download the update
?Internet Explorer 5.5 Service Pack 2 on Microsoft Windows Millennium Edition: ? Review the FAQ section of this bulletin for details about this version.
?Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 3, on Microsoft Windows 2000 Service Pack 4, or on Microsoft Windows XP Service Pack 1: Download the update
?Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, on Microsoft Windows 98 SE, or on Microsoft Windows Millennium Edition: ? Review the FAQ section of this bulletin for details about this version.
?Internet Explorer 6 for Windows XP Service Pack 1 (64-Bit Edition): Download the update
?Internet Explorer 6 for Windows Server 2003: Download the update
?Internet Explorer 6 for Windows Server 2003 64-Bit Edition and Windows XP 64-Bit Edition Version 2003: Download the update
?Internet Explorer 6 for Windows XP Service Pack 2: Download the update

The software in this list has been tested to determine whether the versions are affected. Other versions either no longer include security update support or may not be affected. To determine the support life cycle for your product and version, visit the Microsoft Support Lifecycle Web site.

Executive Summary:

This update resolves several newly-discovered, publicly and privately reported vulnerabilities. Each vulnerability is documented in this bulletin in its own ?Vulnerability Details? section.

If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

We recommend that customers apply the update immediately.