SecurityFocus Microsoft Newsletter #280
----------------------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: "How a Hacker Launches a SQL Injection Attack!"- SPI Dynamics White
Paper It's as simple as placing additional SQL commands into a Web Form input
box giving hackers complete access to all your backend systems! Firewalls and
IDS will not stop such attacks because SQL Injections are NOT seen as
intruders. Download this *FREE* white paper from SPI Dynamics for a complete
guide to protection!
https://download.spidynamics.com/1/ad/sql.asp?Campaign_ID=70130000000C543
------------------------------------------------------------------
I. FRONT AND CENTER
1. John the Ripper 1.7, by Solar Designer
II. MICROSOFT VULNERABILITY SUMMARY
1. Alt-N MDaemon IMAP Server Remote Format String Vulnerability
2. MySQL Query Logging Bypass Vulnerability
3. iCal Calendar Text Cross-Site Scripting Vulnerability
4. Simple Machines X-Forwarded-For HTML Injection Vulnerability
5. MTS Professional Open EMail Relay Vulnerability
6. ArGoSoft Mail Server Pro Multiple HTML Injection Vulnerabilities
7. PHPWebSite Topics.PHP SQL Injection Vulnerability
8. ArGoSoft Mail Server Pro IMAP Server Remote Directory Traversal
Vulnerability
9. ArGoSoft Mail Server Pro POP3 Server Remote Information Disclosure
Vulnerability
10. Multiple SpeedProject Applications Remote Directory Traversal
Vulnerability
11. StuffIt and ZipMagic Remote Directory Traversal Vulnerability
12. Winace Remote Directory Traversal Vulnerability
13. The Bat! Remote Buffer Overflow Vulnerability
14. Winace ARJ File Handling Buffer Overflow Vulnerability
15. Nullsoft Winamp M3U File Processing Buffer Overflow Vulnerability
16. Microsoft Word Malformed Document Denial Of Service Vulnerability
17. InfoVista VistaPortal Directory Traversal Vulnerability
18. Ipswitch WhatsUp Professional 2006 Remote Denial Of Service
Vulnerability
19. Mozilla Thunderbird IFRAME JavaScript Execution Vulnerability
20. Safe'n'Sec Path Specification Local Privilege Escalation
Vulnerabilities
21. SquirrelMail Multiple Cross-Site Scripting and IMAP Injection
Vulnerabilities
22. Bugzilla User Credentials Information Disclosure Vulnerability
23. True North Software IA EMailServer Remote Buffer Overflow
Vulnerability
24. Bugzilla Whinedays SQL Injection Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Domain policy getting override on local
2. SecurityFocus Microsoft Newsletter #279
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. John the Ripper 1.7, by Solar Designer
By Federico Biancuzzi
Federico Biancuzzi interviews Solar Designer, creator of the popular John the
Ripper password cracker. Solar Designer discusses what's new in version 1.7,
the advantages of popular cryptographic hashes, the relative speed at which
many passwords can now be cracked, and how one can choose strong passphrases
(forget passwords) that are harder to break.
http://www.securityfocus.com/columnists/388
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Alt-N MDaemon IMAP Server Remote Format String Vulnerability
BugTraq ID: 16854
Remote: Yes
Date Published: 2006-02-27
Relevant URL: http://www.securityfocus.com/bid/16854
Summary:
Alt-N MDaemon IMAP Server is affected by a remote format-string vulnerability.
This issue is due to a failure of the application to properly sanitize
user-supplied input prior to its use in the format-specifier argument to a
formatted printing function.
This vulnerability may be leveraged to consume excessive CPU resources or to
crash the service. Due to the nature of this issue, it is likely that remote
code execution may also be possible, although this has not been confirmed.
Alt-N MDaemon 8.1.1 is reported to be vulnerable. Other versions are likely
affected as well.
2. MySQL Query Logging Bypass Vulnerability
BugTraq ID: 16850
Remote: Yes
Date Published: 2006-02-27
Relevant URL: http://www.securityfocus.com/bid/16850
Summary:
MySQL is susceptible to a query logging bypass vulnerability. This issue is due
to a discrepency between the handling of NULL bytes in input data.
This issue allows attackers to bypass the query logging functionality of the
database, so they can cause malicious SQL queries to be improperly logged. This
may aid them in hiding the traces of malicious activity from administrators.
This issue affects MySQL version 5.0.18; other versions may also be affected.
3. iCal Calendar Text Cross-Site Scripting Vulnerability
BugTraq ID: 16845
Remote: Yes
Date Published: 2006-02-27
Relevant URL: http://www.securityfocus.com/bid/16845
Summary:
iCal is prone to a cross-site scripting vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site. This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.
4. Simple Machines X-Forwarded-For HTML Injection Vulnerability
BugTraq ID: 16841
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16841
Summary:
Simple Machines is prone to an HTML injection vulnerability. This issue is due
to a failure in the application to properly sanitize user-supplied input.
Attacker-supplied HTML and script code would be executed in the context of the
affected website, potentially allowing for theft of cookie-based authentication
credentials. An attacker could also exploit this issue to control how the site
is rendered to the user; other attacks are also possible.
This issue is reported to affect Simple Machines version 1.0.6 and earlier.
5. MTS Professional Open EMail Relay Vulnerability
BugTraq ID: 16840
Remote: Yes
Date Published: 2006-02-27
Relevant URL: http://www.securityfocus.com/bid/16840
Summary:
MTS Professional is susceptible to a remote open-email-relay vulnerability.
This issue is due to the application failing to properly verify the source of
emails when configured to forward emails.
This issue allows remote attackers to use vulnerable servers to send arbitrary
unsolicited bulk email. Attackers may also forge email messages that originate
from a trusted mail server.
6. ArGoSoft Mail Server Pro Multiple HTML Injection Vulnerabilities
BugTraq ID: 16834
Remote: Yes
Date Published: 2006-02-27
Relevant URL: http://www.securityfocus.com/bid/16834
Summary:
ArGoSoft Mail Server Pro is prone to multiple HTML-injection vulnerabilities.
The application fails to properly sanitize user-supplied input before using it
in dynamically generated content.
Attacker-supplied HTML and script code would be executed in the context of the
affected website, potentially allowing an attacker to steal cookie-based
authentication credentials or to control how the site is rendered to the user;
other attacks are also possible.
ArGoSoft Mail Server Pro 1.8.8.5 and prior versions are vulnerable.
7. PHPWebSite Topics.PHP SQL Injection Vulnerability
BugTraq ID: 16825
Remote: Yes
Date Published: 2006-02-25
Relevant URL: http://www.securityfocus.com/bid/16825
Summary:
phpWebSite is prone to an SQL injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before
using it in an SQL query.
Successful exploitation could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.
8. ArGoSoft Mail Server Pro IMAP Server Remote Directory Traversal
Vulnerability
BugTraq ID: 16809
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16809
Summary:
The ArGoSoft Mail Server Pro IMAP service is susceptible to a remote
directory-traversal vulnerability. This issue is due to the application's
failure to properly sanitize user-supplied input.
This issue allows remote, authenticated attackers to create and possibly modify
arbitrary files with the privileges of the server process. Since the server
process requires elevated privileges to listen on the IMAP TCP port, attackers
may likely be able to overwrite or modify any file with SYSTEM-level
privileges.
Version 1.8.8.1 is vulnerable to this issue; other versions may also be
affected.
9. ArGoSoft Mail Server Pro POP3 Server Remote Information Disclosure
Vulnerability
BugTraq ID: 16808
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16808
Summary:
The ArGoSoft Mail Server Pro POP3 service is susceptible to a remote
information-disclosure vulnerability. This issue is due to the application's
failure to require authentication before allowing a command that discloses
potentially sensitive information.
This issue allows remote, unauthenticated attackers to gain access to
potentially sensitive configuration information. Information that the attacker
harvests in this manner may then aid in further attacks.
Version 1.8.8.1 is vulnerable to this issue; other versions may also be
affected.
10. Multiple SpeedProject Applications Remote Directory Traversal Vulnerability
BugTraq ID: 16807
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16807
Summary:
Reportedly, an attacker can carry out directory traversal type attacks. These
issues present themselves when the applications process malicious archives.
A successful attack can allow the attacker to place potentially malicious files
and overwrite files on a computer in the context of the user running the
affected application. Successful exploitation may aid in further attacks.
11. StuffIt and ZipMagic Remote Directory Traversal Vulnerability
BugTraq ID: 16806
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16806
Summary:
Reportedly, an attacker can carry out attacks similar to directory traversals.
These issues present themselves when the application processes malicious
archives.
A successful attack can allow the attacker to place potentially malicious files
and overwrite files on a computer in the context of the user running the
affected application. Successful exploitation may aid in further attacks.
12. Winace Remote Directory Traversal Vulnerability
BugTraq ID: 16800
Remote: Yes
Date Published: 2006-02-24
Relevant URL: http://www.securityfocus.com/bid/16800
Summary:
Reportedly, an attacker can carry out directory-traversal attacks. These issues
present themselves when the application processes malformed archives.
A successful attack can allow the attacker to place potentially malicious files
and overwrite files on a computer in the context of the user running the
affected application. Successful exploitation may aid in further attacks.
13. The Bat! Remote Buffer Overflow Vulnerability
BugTraq ID: 16797
Remote: Yes
Date Published: 2006-02-23
Relevant URL: http://www.securityfocus.com/bid/16797
Summary:
The Bat! is prone to a remote buffer-overflow vulnerability. This issue is due
to a failure in the application to perform proper bounds checking on
user-supplied data before storing it in a finite-sized buffer.
An attacker can exploit this issue to control program flow and execute
arbitrary attacker-supplied code in the context of the victim user running the
affected application.
14. Winace ARJ File Handling Buffer Overflow Vulnerability
BugTraq ID: 16786
Remote: Yes
Date Published: 2006-02-23
Relevant URL: http://www.securityfocus.com/bid/16786
Summary:
Winace is prone to a buffer-overflow vulnerability when handling malformed ARJ
archives. Successful exploitation could result in an application crash or
potential arbitrary code execution.
Winace 2.60 is affected by this issue. Earlier versions may also be vulnerable.
15. Nullsoft Winamp M3U File Processing Buffer Overflow Vulnerability
BugTraq ID: 16785
Remote: Yes
Date Published: 2006-02-23
Relevant URL: http://www.securityfocus.com/bid/16785
Summary:
Nullsoft Winamp is prone to a buffer-overflow vulnerability when processing
malformed M3U files. The overrun occurs when the M3U playlist is paused or
stopped.
This issue is reported to affect Winamp versions 5.12 and 5.13. Earlier
versions may also be vulnerable.
16. Microsoft Word Malformed Document Denial Of Service Vulnerability
BugTraq ID: 16782
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16782
Summary:
Microsoft Word is susceptible to a denial-of-service vulnerability. The
specific cause of this issue is currently unknown.
This issue allows attackers to crash affected applications. Due to the
unspecified cause of this issue, attackers may be able to execute arbitrary
code in the context of the affected application, but this has not been
confirmed.
Microsoft Word 2003 is reportedly vulnerable; other versions may also be
affected.
This BID will be updated as further information is disclosed.
17. InfoVista VistaPortal Directory Traversal Vulnerability
BugTraq ID: 16776
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16776
Summary:
VistaPortal is prone to a directory-traversal vulnerability. This issue is due
to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the
vulnerable system in the context of the affected application. Information
obtained may aid in further attacks. Reports indicate VistaPortal is run with
superuser privileges, increasing the impact of successful exploitation.
18. Ipswitch WhatsUp Professional 2006 Remote Denial Of Service Vulnerability
BugTraq ID: 16771
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16771
Summary:
Ipswitch WhatsUp Professional 2006 is susceptible to a remote denial-of-service
vulnerability. This issue is due to the application's failure to properly
handle certain HTTP GET requests.
This issue allows remote attackers to consume excessive CPU resources on
targeted computers, denying service to legitimate users.
19. Mozilla Thunderbird IFRAME JavaScript Execution Vulnerability
BugTraq ID: 16770
Remote: Yes
Date Published: 2006-02-22
Relevant URL: http://www.securityfocus.com/bid/16770
Summary:
Mozilla Thunderbird is prone to a script-execution vulnerability.
The vulnerability presents itself when an attacker supplies a specially crafted
email to a user containing malicious script code in an IFRAME and the user
tries to reply to the mail. Arbitrary JavaScript can be executed even if the
user has disabled JavaScript execution in the client.
Mozilla Thunderbird 1.0.7 and prior versions are reportedly affected.
20. Safe'n'Sec Path Specification Local Privilege Escalation Vulnerabilities
BugTraq ID: 16762
Remote: No
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16762
Summary:
Safe'n'Sec is prone to vulnerabilities that could allow arbitrary files to be
executed.
The application tries to execute applications without using properly quoted
paths. Successful exploitation may allow local attackers to gain elevated
privileges.
Safe'n'Sec Personal 2.0 is vulnerable; other versions may also be affected.
21. SquirrelMail Multiple Cross-Site Scripting and IMAP Injection
Vulnerabilities
BugTraq ID: 16756
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16756
Summary:
SquirrelMail is susceptible to multiple cross-site scripting and IMAP-injection
vulnerabilities. These issues are due to the application's failure to properly
sanitize user-supplied input.
An attacker may leverage any of the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user in the
context of the affected site. This may facilitate the theft of cookie-based
authentication credentials as well as other attacks.
An attacker may leverage the IMAP-injection issue to execute arbitrary IMAP
commands on the configured IMAP server. This may aid attackers in further
attacks as well as allow them to exploit latent vulnerabilities in the IMAP
server.
22. Bugzilla User Credentials Information Disclosure Vulnerability
BugTraq ID: 16745
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16745
Summary:
Bugzilla is prone to an information-disclosure vulnerability. This issue is due
to a design error in the application.
An attacker can exploit this issue by tricking a victim user into following a
malicious URI and then retrieving the victim user's login credentials.
To successfully exploit this issue, the attacker requires the name of the path
where the login page resides and resolves to a computer on the local network of
the victim user.
23. True North Software IA EMailServer Remote Buffer Overflow Vulnerability
BugTraq ID: 16744
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16744
Summary:
True North Software IA eMailServer is prone to a remote buffer-overflow
vulnerability. This issue is due to the application's failure to perform proper
boundary checks on user-supplied data before copying it to an insufficiently
sized memory buffer.
This issue allows remote attackers to execute arbitrary machine code in the
context of the affected service. Failed exploitation attempts will likely crash
the service.
IA eMailServer version 5.3.4 is prone to this issue; previous versions may also
be affected.
24. Bugzilla Whinedays SQL Injection Vulnerability
BugTraq ID: 16738
Remote: Yes
Date Published: 2006-02-21
Relevant URL: http://www.securityfocus.com/bid/16738
Summary:
Bugzilla is prone to an SQL-injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before
using it in an SQL query.
Successful exploitation could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
Exploitation of this issue requires the attacker to have administrative access
to the affected application.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Domain policy getting override on local
http://www.securityfocus.com/archive/88/425884
2. SecurityFocus Microsoft Newsletter #279
http://www.securityfocus.com/archive/88/425748
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: "How a Hacker Launches a SQL Injection Attack!"- SPI Dynamics White
Paper It's as simple as placing additional SQL commands into a Web Form input
box giving hackers complete access to all your backend systems! Firewalls and
IDS will not stop such attacks because SQL Injections are NOT seen as
intruders. Download this *FREE* white paper from SPI Dynamics for a complete
guide to protection!
https://download.spidynamics.com/1/ad/sql.asp?Campaign_ID=70130000000C543
---------------------------------------------------------------------------
---------------------------------------------------------------------------