SecurityFocus Microsoft Newsletter #283
----------------------------------------

This Issue is Sponsored By: RedCannon

Extend Citrix Access and enforce enterprise policy using ultra-thin clients - read Steve Kaplan's latest white paper and learn how ultra-thin USB clients from RedCannon extend and enforce security policies to any untrusted Windows PCs INSTANTLY. Secure any point, anywhere prior to permitting remote access.

http://www.RedCannon.com/Kaplan321/

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Encryption for the masses
       2. Social engineering reloaded
II.  MICROSOFT VULNERABILITY SUMMARY
       1. MailEnable Unspecified POP Authentication Bypass Vulnerability
2. MailEnable Enterprise/Professional Editions Webmail Denial of Service Vulnerability
       3. PHPWebSite Multiple SQL Injection Vulnerabilities
       4. PHPMyAdmin Set_Theme Cross-Site Scripting Vulnerability
       5. Monotone MT File Arbitrary Code Execution Vulnerability
       6. Microsoft Commerce Server 2002 Authentication Bypass Vulnerability
7. Microsoft Internet Explorer Script Action Handler Buffer Overflow Vulnerability
       8. Dwarf HTTP Server Multiple Input Validation Vulnerabilities
9. Microsoft Excel Malformed Formula Size Remote Code Execution Vulnerability
       10. Macromedia Flash Multiple Unspecified Security Vulnerabilities
       11. Unalz Hostile Destination Path Vulnerability
       12. Drupal Multiple Input Validation Vulnerabilities
       13. Microsoft Excel Malformed Record Remote Code Execution Vulnerability
       14. Firebird Local Inet_Server Buffer Overflow Vulnerability
       15. Apple QuickTime/iTunes Integer And Heap Overflow Vulnerabilities
16. Free-AV AntiVir Personal Edition Classic Local Privilege Escalation Vulnerability
       17. SafeDisc Secdrv.SYS Local Privilege Escalation Vulnerability
18. Microsoft Office Routing Slip Processing Remote Buffer Overflow Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. virtual memory protection using AWE
       2. SecurityFocus Microsoft Newsletter #282
       3. Moderation in moderation
       4. EFS disaster!
       5. trouble using SSL on WSUS
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Encryption for the masses
By Kelly Martin
File and disk encryption needs to be simple and easy if it's going to be used. This article looks at Apple's FileVault and takes a sneak peak at what's coming in Windows Vista.
http://www.securityfocus.com/columnists/393

2. Social engineering reloaded
By Sarah Granger
The purpose of this article is to go beyond the basics and explore how social engineering, employed as technology, has evolved over the past few years. A case study of a typical Fortune 1000 company will be discussed, putting emphasis on the importance of education about social engineering for every corporate security program.
http://www.securityfocus.com/infocus/1860


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. MailEnable Unspecified POP Authentication Bypass Vulnerability
BugTraq ID: 17162
Remote: Yes
Date Published: 2006-03-20
Relevant URL: http://www.securityfocus.com/bid/17162
Summary:
MailEnable is prone to an unspecified authentication-bypass vulnerability.

This vulnerability affects the POP service of various MailEnable versions. Very little information beyond that is available at this time. This BID will be updated as further information becomes available.

2. MailEnable Enterprise/Professional Editions Webmail Denial of Service Vulnerability
BugTraq ID: 17161
Remote: Yes
Date Published: 2006-03-20
Relevant URL: http://www.securityfocus.com/bid/17161
Summary:
MailEnable Enterprise/Professional Editions are prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to cause the application to consume all available resources, effectively denying service to legitimate users.

This issue is reported to be a seperate issue from that discussed in BID 16525 (MailEnable Enterprise Edition Webmail Denial of Service Vulnerability).

3. PHPWebSite Multiple SQL Injection Vulnerabilities
BugTraq ID: 17150
Remote: Yes
Date Published: 2006-03-20
Relevant URL: http://www.securityfocus.com/bid/17150
Summary:
phpWebSite is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

4. PHPMyAdmin Set_Theme Cross-Site Scripting Vulnerability
BugTraq ID: 17142
Remote: Yes
Date Published: 2006-03-17
Relevant URL: http://www.securityfocus.com/bid/17142
Summary:
phpMyAdmin is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

5. Monotone MT File Arbitrary Code Execution Vulnerability
BugTraq ID: 17139
Remote: Yes
Date Published: 2006-03-17
Relevant URL: http://www.securityfocus.com/bid/17139
Summary:
Monotone is prone to an arbitrary code-execution vulnerability. This issue is due to a design error in the application.

An attacker can exploit this issue to have arbitrary Lua code executed in the context of the victim user running the affected application.

This issue affects Monotone only on case-insensitive filesystems such as Microsoft Windows and Apple Mac OS X.

6. Microsoft Commerce Server 2002 Authentication Bypass Vulnerability
BugTraq ID: 17134
Remote: Yes
Date Published: 2006-03-16
Relevant URL: http://www.securityfocus.com/bid/17134
Summary:
Microsoft Commerce Server 2002 is prone to an authentication-bypass vulnerability. This issue is due to a failure in the application to correctly authenticate users due to the possible existence of sample files.

An attacker can exploit this issue to bypass the authentication mechanism and gain access to the affected application as any pre-existing user.

Microsoft Commerce Server 2002 prior to Service Pack 2 are affected by this issue.

7. Microsoft Internet Explorer Script Action Handler Buffer Overflow Vulnerability
BugTraq ID: 17131
Remote: Yes
Date Published: 2006-03-16
Relevant URL: http://www.securityfocus.com/bid/17131
Summary:
Microsoft Internet Explorer is susceptible to a remote buffer-overflow vulnerability in 'MSHTML.DLL'. This issue is due to a failure of the application to properly bounds check user-supplied input data prior to copying it into an insufficiently-sized memory buffer.

This issue may be exploited by remote attackers to crash affected web browsers. Remote code execution may also be possible, but this has not been confirmed.

Internet Explorer 6 is vulnerable to this issue; other versions may also be affected.

8. Dwarf HTTP Server Multiple Input Validation Vulnerabilities
BugTraq ID: 17123
Remote: Yes
Date Published: 2006-03-15
Relevant URL: http://www.securityfocus.com/bid/17123
Summary:
Dwarf HTTP Server is prone to multiple input-validation vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input.

An attacker may conduct cross-site scripting attacks and disclose sensitive information.

Versions 1.3.2. and prior are vulnerable; other versions may also be affected.

9. Microsoft Excel Malformed Formula Size Remote Code Execution Vulnerability
BugTraq ID: 17108
Remote: Yes
Date Published: 2006-03-14
Relevant URL: http://www.securityfocus.com/bid/17108
Summary:
Microsoft Excel is prone to a remote code execution vulnerability. This issue may be triggered when an Excel document with a malformed formula size is opened.

10. Macromedia Flash Multiple Unspecified Security Vulnerabilities
BugTraq ID: 17106
Remote: Yes
Date Published: 2006-03-14
Relevant URL: http://www.securityfocus.com/bid/17106
Summary:
The Macromedia Flash plug-in is susceptible to multiple unspecified vulnerabilities.

An attacker can potentially exploit these vulnerabilities to execute arbitrary code. The most likely vector of attack is through a malicious SWF file that has been designed to trigger the vulnerability and has been placed on a website. A denial-of-service condition may also occur.

Versions of the Flash Player prior to 7.0.63.0 and 8.0.24.0 are vulnerable to these issues.

11. Unalz Hostile Destination Path Vulnerability
BugTraq ID: 17105
Remote: Yes
Date Published: 2006-03-14
Relevant URL: http://www.securityfocus.com/bid/17105
Summary:
The 'unalz' tool contains a vulnerability in the handling of pathnames for archived files.

By specifying a path for an archived item that points outside the expected destination directory, the creator of the archive can cause the file to be extracted to arbitrary locations on the filesystem, possibly including paths containing system binaries and other sensitive or confidential information.

Presumably, an attacker could use this to create or overwrite binaries in any desired location, using the privileges of the invoking user.

Version 0.53 is vulnerable; other versions may also be affected.

12. Drupal Multiple Input Validation Vulnerabilities
BugTraq ID: 17104
Remote: Yes
Date Published: 2006-03-14
Relevant URL: http://www.securityfocus.com/bid/17104
Summary:
Drupal is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to:

- have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site
- access sensitive information
- hijack user sessions
- use a vulnerable Drupal installation as an email relay.

13. Microsoft Excel Malformed Record Remote Code Execution Vulnerability
BugTraq ID: 17101
Remote: Yes
Date Published: 2006-03-14
Relevant URL: http://www.securityfocus.com/bid/17101
Summary:
Microsoft Excel is prone to a remote code execution vulnerability. This issue may be triggered when a Excel document with malformed record data is opened.

14. Firebird Local Inet_Server Buffer Overflow Vulnerability
BugTraq ID: 17077
Remote: No
Date Published: 2006-03-13
Relevant URL: http://www.securityfocus.com/bid/17077
Summary:
Firebird is susceptible to a local buffer-overflow vulnerability. This issue is due to the application's failure to properly check boundaries of user-supplied command-line argument data before copying it to an insufficiently sized memory buffer.

Attackers may exploit this issue to execute arbitrary machine code with elevated privileges, because the affected binaries are often installed with setuid privileges.

15. Apple QuickTime/iTunes Integer And Heap Overflow Vulnerabilities
BugTraq ID: 17074
Remote: Yes
Date Published: 2006-03-11
Relevant URL: http://www.securityfocus.com/bid/17074
Summary:
An integer overflow and heap-based buffer overflow vulnerability have been reported in Apple QuickTime and iTunes. These issues affect both Mac OS X and Microsoft Windows releases of the software.

A successful exploit will result in execution of arbitrary code in the context of the currently logged in user.

16. Free-AV AntiVir Personal Edition Classic Local Privilege Escalation Vulnerability
BugTraq ID: 17071
Remote: No
Date Published: 2006-03-11
Relevant URL: http://www.securityfocus.com/bid/17071
Summary:
AntiVir Personal Edition Classic is prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to launch other applications with SYSTEM privileges. This may facilitate a complete compromise of the affected computer.

AntiVir Personal Edition Classic version 7 is vulnerable; other versions may also be affected.

17. SafeDisc Secdrv.SYS Local Privilege Escalation Vulnerability
BugTraq ID: 17070
Remote: No
Date Published: 2006-03-11
Relevant URL: http://www.securityfocus.com/bid/17070
Summary:
SafeDisc is prone to a local privilege-escalation vulnerability. This issue is due to the failure of the application to restrict access to the configuration parameters of an installed service.


This vulnerability allows local attackers to execute arbitrary malicious code with SYSTEM-level privileges, facilitating the complete compromise of affected computers.

18. Microsoft Office Routing Slip Processing Remote Buffer Overflow Vulnerability
BugTraq ID: 17000
Remote: Yes
Date Published: 2006-03-14
Relevant URL: http://www.securityfocus.com/bid/17000
Summary:
Microsoft Office is prone to a remote buffer overflow vulnerability.

This vulnerability presents itself when a specially crafted document is handled by the application.

A successful attack can result in a remote compromise in the context of an affected user.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. virtual memory protection using AWE
http://www.securityfocus.com/archive/88/428309

2. SecurityFocus Microsoft Newsletter #282
http://www.securityfocus.com/archive/88/427942

3. Moderation in moderation
http://www.securityfocus.com/archive/88/427941

4. EFS disaster!
http://www.securityfocus.com/archive/88/427915

5. trouble using SSL on WSUS
http://www.securityfocus.com/archive/88/427610

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: RedCannon

Extend Citrix Access and enforce enterprise policy using ultra-thin clients - read Steve Kaplan's latest white paper and learn how ultra-thin USB clients from RedCannon extend and enforce security policies to any untrusted Windows PCs INSTANTLY. Secure any point, anywhere prior to permitting remote access.

http://www.RedCannon.com/Kaplan321/




---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to