SecurityFocus Microsoft Newsletter #279
----------------------------------------
This Issue is Sponsored By: Cambia
Automate IT Security Compliance Now
Free white paper demonstrates how you can eliminate manual, time-consuming
project-based compliance using continuous security compliance software. Save
time leveraging this FREE white paper.
http://a.gklmedia.com/sfmn/nl/125
------------------------------------------------------------------
I. FRONT AND CENTER
1. Strict liability for data breaches?
2. Privacy and anonymity
II. MICROSOFT VULNERABILITY SUMMARY
1. SquirrelMail Multiple Cross-Site Scripting and IMAP Injection
Vulnerabilities
2. Bugzilla User Credentials Information Disclosure Vulnerability
3. True North Software IA EMailServer Remote Buffer Overflow
Vulnerability
4. Bugzilla Whinedays SQL Injection Vulnerability
5. Mozilla Thunderbird Address Book Import Remote Denial of Service
Vulnerability
6. Snort Frag3 Processor Fragmented Packet Detection Evasion
Vulnerability
7. Macallan Mail Solution IMAP Commands Directory Traversal
Vulnerability
8. Microsoft Internet Explorer Script Engine Buffer Overflow
Vulnerability
9. Rockliffe MailSite Multiple Unspecified Remote LDAP Vulnerabilities
10. PostgreSQL Set Session Authorization Denial of Service Vulnerability
11. PostgreSQL Remote SET ROLE Privilege Escalation Vulnerability
12. Microsoft Windows IGMPv3 Denial of Service Vulnerability
13. Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability
14. Microsoft Windows Korean Input Method Editor Privilege Escalation
Vulnerability
15. SSH Tectia Server Remote Format String Vulnerability
16. Microsoft Windows Web Client Buffer Overflow Vulnerability
17. Isode M-Vault Server LDAP Memory Corruption Vulnerability
18. Microsoft PowerPoint 2000 Remote Information Disclosure
Vulnerability
19. Microsoft Windows Media Player Bitmap Handling Buffer Overflow
Vulnerability
20. eStara Softphone Multiple Denial of Service Vulnerabilities
21. AttachmateWRQ Reflection for Secure IT Remote Format String
Vulnerability
22. Nullsoft Winamp M3U File Denial of Service Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Retriving ACL's on 60 thousand folders
2. SecurityFocus Microsoft Newsletter #278
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Strict liability for data breaches?
By Mark Rasch
A recent case involving a stolen laptop containing 550,000 people's full credit
information sheds new night on what "reasonable" protections a company must
make to secure its customer data - and what customers need to prove in order to
sue for damages.
http://www.securityfocus.com/columnists/387
2. Privacy and anonymity
By Kelly Martin
Privacy and anonymity on the Internet are as important as they are difficult to
achieve. Here are some of the the current issues we face, along with a few
suggestions on how we can become a little more anonymous on the Web.
http://www.securityfocus.com/columnists/386
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. SquirrelMail Multiple Cross-Site Scripting and IMAP Injection
Vulnerabilities
BugTraq ID: 16756
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16756
Summary:
SquirrelMail is susceptible to multiple cross-site scripting and IMAP injection
vulnerabilities. These issues are due to a failure of the application to
properly sanitize user-supplied input.
An attacker may leverage any of the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user in the
context of the affected site. This may facilitate the theft of cookie-based
authentication credentials as well as other attacks.
An attacker may leverage the IMAP injection issue to execute arbitrary IMAP
commands on the configured IMAP server. This may aid the attacker in further
attacks as well as allow them to exploit latent vulnerabilities in the IMAP
server.
2. Bugzilla User Credentials Information Disclosure Vulnerability
BugTraq ID: 16745
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16745
Summary:
Bugzilla is prone to an information disclosure vulnerability. This issue is due
to a design error in the application.
An attacker can exploit this issue by tricking a victim user into following a
malicious URI and retrieve the victim user's login credentials.
Successful exploitation of this issue requires the name of the path where the
login page resides, resolves to a computer on the local network of the victim
user.
3. True North Software IA EMailServer Remote Buffer Overflow Vulnerability
BugTraq ID: 16744
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16744
Summary:
True North Software IA eMailServer is prone to a remote buffer overflow
vulnerability. This issue is due to a failure of the application to properly
bounds check user-supplied data prior to copying it to an insufficiently sized
memory buffer.
This issue allows remote attackers to execute arbitrary machine code in the
context of the affected service. Failed exploitation attempts likely result in
the service crashing.
IA eMailServer version 5.3.4 is prone to this issue; previous versions may also
be affected.
4. Bugzilla Whinedays SQL Injection Vulnerability
BugTraq ID: 16738
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16738
Summary:
Bugzilla is prone to an SQL-injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before
using it in an SQL query.
Successful exploitation could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
Exploitation of this issue requires the attacker to have administrative access
to the affected application.
5. Mozilla Thunderbird Address Book Import Remote Denial of Service
Vulnerability
BugTraq ID: 16716
Remote: Yes
Date Published: 2006-02-17
Relevant URL: http://www.securityfocus.com/bid/16716
Summary:
Mozilla Thunderbird is prone to a remote denial-of-service vulnerability.
The issue presents itself when the application handles a specially crafted
address book file.
Mozilla Thunderbird 1.5 is reportedly affected by this issue. Other versions
may be vulnerable as well.
6. Snort Frag3 Processor Fragmented Packet Detection Evasion Vulnerability
BugTraq ID: 16705
Remote: Yes
Date Published: 2006-02-17
Relevant URL: http://www.securityfocus.com/bid/16705
Summary:
Snort is reportedly prone to a vulnerability that may allow malicious packets
to bypass detection.
Reports indicate that the Frag3 preprocessor fails to properly analyze certain
packets.
A successful attack can allow attackers to bypass intrusion detection and to
carry out attacks against computers protected by Snort.
This vulnerability affects Snort 2.4.3. Other versions may be vulnerable as
well.
7. Macallan Mail Solution IMAP Commands Directory Traversal Vulnerability
BugTraq ID: 16704
Remote: Yes
Date Published: 2006-02-17
Relevant URL: http://www.securityfocus.com/bid/16704
Summary:
Macallan Mail Solution is prone to a directory-traversal vulnerability exposed
through IMAP commands. Successful exploitation could allow a remote attacker to
view files, rename directories, and delete empty directories.
Macallan Mail Solution 4.8.03.025 is vulnerable; earlier versions may also be
affected.
8. Microsoft Internet Explorer Script Engine Buffer Overflow Vulnerability
BugTraq ID: 16687
Remote: Yes
Date Published: 2006-02-16
Relevant URL: http://www.securityfocus.com/bid/16687
Summary:
The Internet Explorer VBScript and JScript engines are prone to a remote
buffer-overflow vulnerability. Successful exploitation causes the browser to
fail. The possibility of arbitrary code execution has not been confirmed.
This vulnerability affects Internet Explorer 6 running on Windows 2000 SP4,
Windows XP Professional, and Windows 98SE. Other versions of Internet Explorer
and Windows may also be affected.
9. Rockliffe MailSite Multiple Unspecified Remote LDAP Vulnerabilities
BugTraq ID: 16675
Remote: Yes
Date Published: 2006-02-15
Relevant URL: http://www.securityfocus.com/bid/16675
Summary:
Rockliffe MailSite is prone to multiple unspecified vulnerabilities. These
issues may be triggered by malformed LDAP data.
The exact impact of these vulnerabilities is not known at this time. Although
the issues are known to crash the server, the possibility of remote code
execution is unconfirmed.
This BID will be updated as further information is made available.
10. PostgreSQL Set Session Authorization Denial of Service Vulnerability
BugTraq ID: 16650
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16650
Summary:
PostgreSQL is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause a loss of service to other database
users. Repeated attacks will result in a prolonged denial-of-service condition.
Successful exploitation of this issue requires that the application be compiled
with 'Asserts' enabled; this is not the default setting.
11. PostgreSQL Remote SET ROLE Privilege Escalation Vulnerability
BugTraq ID: 16649
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16649
Summary:
PostgreSQL is susceptible to a remote privilege-escalation vulnerability. This
issue is due to a flaw in the error path of the 'SET ROLE' function.
This issue allows remote attackers with database access to gain administrative
access to affected database servers. Since such access also allows filesystem
access, other attacks against the underlying operating system may also be
possible.
12. Microsoft Windows IGMPv3 Denial of Service Vulnerability
BugTraq ID: 16645
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16645
Summary:
A vulnerability in the handling of IGMPv3 (Internet Group Management Protocol)
packets could result in a denial of service.
An attacker can exploit this issue through a broadcast attack to cause
vulnerable computers on the subnet to become unresponsive, effectively denying
service to legitimate users.
13. Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability
BugTraq ID: 16644
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16644
Summary:
The Microsoft Windows Media Player plugin for non-Microsoft browsers is prone
to a buffer-overflow vulnerability. This issue is due to a failure in the
application to do proper boundary checks on user-supplied data before using it
in a finite-sized buffer.
An attacker can exploit this issue to execute arbitrary code on the victim
userĂ¢??s computer in the context of the victim user. This may facilitate a
compromise of the affected computer.
This issue is exploitable only through non-Microsoft browsers that have the
Media Player plugin installed. Possible browsers include Firefox .9 and later
and Netscape 8; other browsers with the plugin installed may also be affected.
14. Microsoft Windows Korean Input Method Editor Privilege Escalation
Vulnerability
BugTraq ID: 16643
Remote: No
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16643
Summary:
Microsoft Windows Korean Input Method Editor is prone to a local
privilege-escalation vulnerability.
Successful exploitation can allow local attackers to completely compromise a
vulnerable computer.
15. SSH Tectia Server Remote Format String Vulnerability
BugTraq ID: 16640
Remote: Yes
Date Published: 2006-02-13
Relevant URL: http://www.securityfocus.com/bid/16640
Summary:
A remote format-string vulnerability affects SSH Tectia Server. The application
fails to properly sanitize user-supplied input data before using it in a
formatted-printing function.
A remote attacker may leverage this issue to execute arbitrary machine code,
possibly allowing for privilege escalation and for the bypassing of SFTP-only
access controls on affected SSH servers.
16. Microsoft Windows Web Client Buffer Overflow Vulnerability
BugTraq ID: 16636
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16636
Summary:
Microsoft Windows Web Client is prone to a buffer overflow. Successful
exploitation could allow arbitrary code execution with System privileges.
17. Isode M-Vault Server LDAP Memory Corruption Vulnerability
BugTraq ID: 16635
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16635
Summary:
Isode M-Vault Server is prone to a memory corruption. This issue may be
triggered by malformed LDAP data.
The exact impact of this vulnerability is not known at this time. Although the
issue is known to crash the server, the possibility of remote code execution is
unconfirmed.
The vulnerability was reported for version 11.3 on the Linux platform; other
versions and platforms may also be affected.
This vulnerability will be updated as further information is made available.
18. Microsoft PowerPoint 2000 Remote Information Disclosure Vulnerability
BugTraq ID: 16634
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16634
Summary:
Microsoft PowerPoint 2000 is prone to a remote information-disclosure
vulnerability. Information gathered may be used to launch further attacks
against a vulnerable computer.
19. Microsoft Windows Media Player Bitmap Handling Buffer Overflow
Vulnerability
BugTraq ID: 16633
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16633
Summary:
Microsoft Windows Media Player is prone to a remote buffer-overflow
vulnerability.
The vulnerability arises when the application handles a skin file containing a
specially crafted bitmap image. This issue can also be triggered by just
supplying a malicious bitmap to the application. Note, however, that Windows
Media Player is not the default handler for bitmap files.
A successful attack can corrupt process memory and result in arbitrary code
execution. This may facilitate a remote compromise in the context of the
vulnerable user.
20. eStara Softphone Multiple Denial of Service Vulnerabilities
BugTraq ID: 16629
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16629
Summary:
eStara Smartphone is prone to multiple denial-of-service vulnerabilities when
processing malformed VOIP headers. Successful exploitation will cause the
device to crash.
21. AttachmateWRQ Reflection for Secure IT Remote Format String Vulnerability
BugTraq ID: 16625
Remote: Yes
Date Published: 2006-02-13
Relevant URL: http://www.securityfocus.com/bid/16625
Summary:
A remote format-string vulnerability affects AttachmateWRQ Reflection for
Secure IT. The application fails to properly sanitize user-supplied input data
before using it in a formatted-printing function.
A remote attacker may leverage this issue to execute arbitrary machine code,
possibly allowing for privilege escalation and for the bypassing of SFTP-only
access controls on affected SSH servers. Attackers may also cause a
denial-of-service condition against the affected SSH server.
22. Nullsoft Winamp M3U File Denial of Service Vulnerability
BugTraq ID: 16623
Remote: Yes
Date Published: 2006-02-13
Relevant URL: http://www.securityfocus.com/bid/16623
Summary:
Winamp is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to crash the application, effectively
denying service to legitimate users. An attacker may be able to exploit this
issue to execute arbitrary code on the victim user's computer; this has not
been confirmed.
This issue is reported to affect version 5.13; other versions may also be
vulnerable.
This issue may be related to BID 9923 (NullSoft Winamp Malformed File Name
Denial of Service Vulnerability).
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Retriving ACL's on 60 thousand folders
http://www.securityfocus.com/archive/88/425192
2. SecurityFocus Microsoft Newsletter #278
http://www.securityfocus.com/archive/88/425033
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: Cambia
Automate IT Security Compliance Now
Free white paper demonstrates how you can eliminate manual, time-consuming
project-based compliance using continuous security compliance software. Save
time leveraging this FREE white paper.
http://a.gklmedia.com/sfmn/nl/125
---------------------------------------------------------------------------
---------------------------------------------------------------------------