SecurityFocus Microsoft Newsletter #266
----------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------
I.   FRONT AND CENTER
      1. Sony-baloney
      2. Windows rootkits in 2005, part two
II.  MICROSOFT VULNERABILITY SUMMARY
1. Multiple Vendor Antivirus Products Obscured File Name Scan Evasion Vulnerability 2. Apple iTunes 6 For Windows Arbitrary Local Code Execution Vulnerability 3. Multiple Vendor lpCommandLine Application Path Vulnerability 4. Floosietek FTGate IMAP Server Buffer Overflow Vulnerability 5. Oracle Database Windows XP Simple File Sharing Authentication Bypass Vulnerability 6. IBM Informix Dynamic Server Windows XP Simple File Sharing Authentication Bypass Vulnerability 7. IBM DB2 Windows XP Simple File Sharing Authentication Bypass Vulnerability
      8. Counterpane Password Safe Insecure Encryption Vulnerability
      9. FreeFTPD User Command Buffer Overflow Vulnerability
      10. Microsoft Windows Plug and Play Denial of Service Vulnerability
11. Opera Web Browser HTML Form Status Bar Misrepresentation Vulnerability
      12. FreeFTPD Multiple Buffer Overflow Vulnerabilities
      13. Qualcomm Worldmail Server Directory Traversal Vulnerability
      14. MailEnable IMAP Mailbox Name Buffer Overflow Vulnerability
      15. Magic Winmail Server Multiple Input Validation Vulnerabilities
      16. MailEnable IMAP Command Directory Traversal Vulnerability
      17. Hitachi Products Multiple Cross-Site Scripting Vulnerabilities
18. Hitachi Collaboration Schedule Unspecified Denial Of Service Vulnerability
      19. Opera Web Browser Arbitrary Command Execution Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
      1. ISA Server or Firewall Appliance?
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Sony-baloney
By Scott Granneman
The Sony story brings up dozens of questions about where we are headed with DRM issues and security, and what's really at stake.
http://www.securityfocus.com/columnists/370

2. Windows rootkits in 2005, part two
By James Butler, Sherri Sparks
This three-part article series looks at Windows rootkits indepth. Part two focuses on the latest cutting edge rootkit technologies that are used to hide malicious code from security scanners.
http://www.securityfocus.com/infocus/1851


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Multiple Vendor Antivirus Products Obscured File Name Scan Evasion Vulnerability
BugTraq ID: 15423
Remote: Yes
Date Published: 2005-11-15
Relevant URL: http://www.securityfocus.com/bid/15423
Summary:
Multiple antivirus products from various vendors are reported prone to a vulnerability that may allow malicious files to bypass detection.

This issue arises when an affected application processes a file with an obscured file name.

This issue could result in malicious files bypassing detection and allowing them to be opened by a recipient.

Update: Symantec is currently investigating this issue in regards to Symantec products. It is unclear at this time if malicious files may evade scanning, or if the automatic removal feature fails. This BID will be updated as further information is disclosed.

2. Apple iTunes 6 For Windows Arbitrary Local Code Execution Vulnerability
BugTraq ID: 15446
Remote: No
Date Published: 2005-11-15
Relevant URL: http://www.securityfocus.com/bid/15446
Summary:
Apple iTunes 6 for Windows is prone to an arbitrary local code execution vulnerability.

This is due to a design error in which malicious code may be executed in the context of the user running the affected application.

3. Multiple Vendor lpCommandLine Application Path Vulnerability BugTraq ID: 15448
Remote: No
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15448
Summary:
Multiple vendor applications are prone to an arbitrary local code execution vulnerability.

This is due to a design error in which malicious code may be executed in the context of the user running the affected application.

4. Floosietek FTGate IMAP Server Buffer Overflow Vulnerability
BugTraq ID: 15449
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15449
Summary:
Floosietek FTGate is prone to a remote buffer overflow vulnerability in the IMAP server. Successful exploitation could result in a denial of service or execution of arbitrary code.


5. Oracle Database Windows XP Simple File Sharing Authentication Bypass Vulnerability
BugTraq ID: 15450
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15450
Summary:
Oracle Database is affected by an authentication bypass vulnerability when run on Microsoft Windows XP computers that have Simple File Sharing enabled.

This vulnerability may let attackers compromise the database using the Windows XP Guest account.

The researcher who discovered this issue has not provided a conclusive list of affected Oracle database products. For the time being, all versions that run on Windows XP are assumed to be affected. If contrary information is made available, this BID will be updated accordingly.

6. IBM Informix Dynamic Server Windows XP Simple File Sharing Authentication Bypass Vulnerability
BugTraq ID: 15451
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15451
Summary:
IBM Informix Dynamic Server (IBM Informix IDS) is affected by an authentication bypass vulnerability when run on Microsoft Windows XP computers that have Simple File Sharing enabled.

This vulnerability may let attackers gain unauthorized access to the database using the Windows XP Guest account.

The researcher who discovered this issue has not provided a conclusive list of affected IBM Informix Dynamic Server products. For the time being, all versions that run on Windows XP are assumed to be affected. If contrary information is made available, this BID will be updated accordingly.

7. IBM DB2 Windows XP Simple File Sharing Authentication Bypass Vulnerability
BugTraq ID: 15452
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15452
Summary:
IBM DB2 is affected by an authentication bypass vulnerability when run on Microsoft Windows XP computers that have Simple File Sharing enabled.

This vulnerability may let attackers gain unauthorized access to the database using the Windows XP Guest account. This could be exploited with a custom client that will authenticate the attacker as the Guest account.

The researcher who discovered this issue has not provided a conclusive list of affected IBM DB2 products. For the time being, all versions that run on Windows XP are assumed to be affected. If contrary information is made available, this BID will be updated accordingly.

8. Counterpane Password Safe Insecure Encryption Vulnerability
BugTraq ID: 15455
Remote: No
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15455
Summary:
Counterpane Password Safe is susceptible to an insecure encryption vulnerability that allows easier brute force decryption attacks.

Password Safe uses a key-stretching algorithm designed to dramatically slow down brute force password guessing attacks. A random value is encrypted with the Blowfish algorithm one thousand times with a value derived from the password used as the encryption key. In order to brute force attack the Password Safe database, an attacker must follow the same one thousand encryption steps on every password guess. This is done to make brute force attacks much more time and resource intensive, lowering the likelihood of a successful attack.

This vulnerability allows attackers with access to the Password Safe database to employ a brute force password guessing attack against the database much more efficiently that the Password Safe design intended. The data contained in the Password Safe database aids malicious users in further attacks.

9. FreeFTPD User Command Buffer Overflow Vulnerability
BugTraq ID: 15457
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15457
Summary:
freeFTPd is prone to a buffer overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before storing it in a finite sized buffer.

An attacker can exploit this issue to crash the server, denying service to legitimate users. Arbitrary code execution with SYSTEM privileges may also be possible.

10. Microsoft Windows Plug and Play Denial of Service Vulnerability
BugTraq ID: 15460
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15460
Summary:
Microsoft Windows Plug and Play service is prone to a denial of service condition. This issue is caused by a malformed request to the service that causes virtual memory consumption.

On Windows XP, a remote attacker must authenticate over RPC to exploit this issue using the originally described attack vector.

Update: A reliable source has indicated that this issue is anonymously exploitable via named pipes or other MSRPC calls on Microsoft Windows XP SP2. This issue may be exploited by differing attack vectors than originally described by Microsoft.

11. Opera Web Browser HTML Form Status Bar Misrepresentation Vulnerability
BugTraq ID: 15472
Remote: Yes
Date Published: 2005-11-16
Relevant URL: http://www.securityfocus.com/bid/15472
Summary:
A vulnerability has been identified in Opera Web browser that allows an attacker to misrepresent the status bar in the browser, allowing vulnerable users to be mislead into following a link to a malicious site.

This vulnerability would most likely be exploited through HTML e-mail, though other attack vectors exist such as HTML injection attacks in third-party Web applications.

12. FreeFTPD Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 15486
Remote: Yes
Date Published: 2005-11-17
Relevant URL: http://www.securityfocus.com/bid/15486
Summary:
freeFTPd is prone to multiple buffer overflow vulnerabilities. These issues are due to a failure in the application to do proper bounds checking on user-supplied data before storing it in finite sized buffers.

An attacker can exploit these issues to crash the server, denying service to legitimate users. Arbitrary code execution with SYSTEM privileges may also be possible.

13. Qualcomm Worldmail Server Directory Traversal Vulnerability
BugTraq ID: 15488
Remote: Yes
Date Published: 2005-11-17
Relevant URL: http://www.securityfocus.com/bid/15488
Summary:
Qualcomm Worldmail server is prone to a directory traversal vulnerability. Successful exploitation could allow an attacker to gain access to files owned by other users of the application. Sensitive information may be obtained and modified in this manner.

Worldmail server version 3.0 is vulnerable; other versions may also be affected.


14. MailEnable IMAP Mailbox Name Buffer Overflow Vulnerability
BugTraq ID: 15492
Remote: Yes
Date Published: 2005-11-18
Relevant URL: http://www.securityfocus.com/bid/15492
Summary:
MailEnable is prone to a buffer overflow vulnerability in multiple IMAP commands. The issue is due to improper bounds checking on the mailbox name argument supplied to various commands.

This issue is reported to affect MailEnable Professional 1.6 with Hotfix MEIMAPS-UPD0511010000.zip and MailEnable Enterprise 1.1 with Hotfix MEIMAPS-UPD0511010000.zip. Other versions may also be vulnerable.


15. Magic Winmail Server Multiple Input Validation Vulnerabilities
BugTraq ID: 15493
Remote: Yes
Date Published: 2005-11-18
Relevant URL: http://www.securityfocus.com/bid/15493
Summary:
Magic Winmail Server is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Magic Winmail Server is prone to cross-site scripting, HTML injection and directory traversal vulnerabilities.

16. MailEnable IMAP Command Directory Traversal Vulnerability
BugTraq ID: 15494
Remote: Yes
Date Published: 2005-11-18
Relevant URL: http://www.securityfocus.com/bid/15494
Summary:
MailEnable is prone to a directory traversal vulnerability when processing certain IMAP commands. Successful exploitation could allow data corruption.

This issue is reported to affect MailEnable Professional 1.6 with Hotfix MEIMAPS-UPD0511010000.zip and MailEnable Enterprise 1.1 with Hotfix MEIMAPS-UPD0511010000.zip. Other versions may also be vulnerable.

17. Hitachi Products Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 15498
Remote: Yes
Date Published: 2005-11-18
Relevant URL: http://www.securityfocus.com/bid/15498
Summary:
Hitachi Collaboration Schedule and Collaboration Calendar are prone to multiple unspecified cross-site scripting vulnerabilities. These are due to a lack of proper sanitization of user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials as well as other attacks.


18. Hitachi Collaboration Schedule Unspecified Denial Of Service Vulnerability
BugTraq ID: 15500
Remote: Yes
Date Published: 2005-11-18
Relevant URL: http://www.securityfocus.com/bid/15500
Summary:
Hitachi Collaboration Schedule is prone to a denial of service vulnerability.

This vulnerability may be triggered by multiple invalid requests sent to the schedule.

No further details have been provided.


19. Opera Web Browser Arbitrary Command Execution Vulnerability
BugTraq ID: 15521
Remote: Yes
Date Published: 2005-11-22
Relevant URL: http://www.securityfocus.com/bid/15521
Summary:
Opera Web Browser is affected by an arbitrary command execution vulnerability.

User-supplied data passed through a URI is not properly sanitized, allowing an attacker to use a specially crafted URI and enticing a user to follow it to execute arbitrary commands through the shell. This attack may facilitate unauthorized remote access.

Opera 8.50 and prior versions running on Unix and Linux platforms are vulnerable to this issue. This vulnerability is identical to BID 14888 (Mozilla Browser/Firefox Arbitrary Command Execution Vulnerability).

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. ISA Server or Firewall Appliance?
http://www.securityfocus.com/archive/88/416700

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130





---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to