SecurityFocus Microsoft Newsletter #284
----------------------------------------

Test your Network Security Free with QualysGuard
Requiring NO software, QualysGuard will safely and accurately test your network and provide you with the necessary fixes to proactively guard your network. Try QualysGuard Risk Free with No Obligation.

http://www.securityfocus.com/cgi-bin/ib.pl

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Security Czar
       2. Learning an advanced skillset
II.  MICROSOFT VULNERABILITY SUMMARY
       1. MPlayer Multiple Integer Overflow Vulnerabilities
2. SweetSuite.NET Content Management System Search.ASPX Cross-Site Scripting Vulnerability
       3. Microsoft Office XP Array Index Denial of Service Vulnerability
4. Microsoft .NET Framework SDK MSIL Tools Buffer Overflow Vulnerabilities 5. Pablo Software Solutions Baby Web/Quick 'n Easy Web ASP Source Disclosure Vulnerability
       6. Pubcookies Multiple Cross-Site Scripting Vulnerabilities
7. Internet Security Systems BlackICE and RealSecure Desktop Local Privilege Escalation Vulnerability 8. Retired: Sendmail SM_SysLog Remote Memory Leak Denial Of Service Vulnerability
       9. VBulleting ImpEx Remote File Include Vulnerability
       10. Baby FTP Server Information Disclosure Weakness
       11. Orion Application Server JSP Source Disclosure Vulnerability
12. Microsoft Internet Explorer CreateTextRange Remote Code Execution Vulnerability 13. Sendmail Asynchronous Signal Handling Remote Code Execution Vulnerability 14. Microsoft ASP.NET COM Components W3WP Remote Denial Of Service Vulnerability 15. Microsoft Internet Explorer Unspecified Remote HTA Execution Vulnerability
       16. MailEnable Unspecified POP Authentication Bypass Vulnerability
17. MailEnable Enterprise/Professional Editions Webmail Denial of Service Vulnerability
       18. PHPWebSite Multiple SQL Injection Vulnerabilities
III. MICROSOFT FOCUS LIST SUMMARY
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Security Czar
By Scott Granneman
In this column Scott Granneman takes the role of dictator of the security world and presents his ideas about mandatory reforms that would improve security for millions of people.
http://www.securityfocus.com/columnists/394

2. Learning an advanced skillset
By Don Parker
The purpose of this article is to guide network security analysts towards learning the advanced skillset required to help further their careers. We'll look at two key pillars of knowledge, protocols and programming, and why they're both so important in the security field.
http://www.securityfocus.com/infocus/1861


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. MPlayer Multiple Integer Overflow Vulnerabilities
BugTraq ID: 17295
Remote: Yes
Date Published: 2006-03-29
Relevant URL: http://www.securityfocus.com/bid/17295
Summary:
MPlayer is susceptible to two integer-overflow vulnerabilities. An attacker may exploit these issues to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may help the attacker gain unauthorized access or escalate privileges.

MPlayer version 1.0.20060329 is affected by these issues; other versions may also be affected.

2. SweetSuite.NET Content Management System Search.ASPX Cross-Site Scripting Vulnerability
BugTraq ID: 17254
Remote: Yes
Date Published: 2006-03-27
Relevant URL: http://www.securityfocus.com/bid/17254
Summary:
SweetSuite.NET Content Management System is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

3. Microsoft Office XP Array Index Denial of Service Vulnerability
BugTraq ID: 17252
Remote: Yes
Date Published: 2006-03-27
Relevant URL: http://www.securityfocus.com/bid/17252
Summary:
Microsoft Office is prone to a denial-of-service condition when handling malformed array indices. When an Office application such as Excel, Word, or PowerPoint tries to open a file containing a malformed array index, an exception will be thrown, causing the application to fail.

Office XP is vulnerable to this issue; other versions may also be affected.

4. Microsoft .NET Framework SDK MSIL Tools Buffer Overflow Vulnerabilities
BugTraq ID: 17243
Remote: Yes
Date Published: 2006-03-27
Relevant URL: http://www.securityfocus.com/bid/17243
Summary:
Microsoft .NET Framework SDK contains tools for assembling and disassembling MSIL files. These tools are prone to buffer-overflow vulnerabilities that attackers could exploit to cause a denial of service or potentially execute arbitrary code.

These issues were reported to affect the .NET Framework SDK version 1.1 SP1; earlier versions may also be affected. Version 2.0 may also be affected, but code execution does not seem possible.

5. Pablo Software Solutions Baby Web/Quick 'n Easy Web ASP Source Disclosure Vulnerability
BugTraq ID: 17222
Remote: Yes
Date Published: 2006-03-24
Relevant URL: http://www.securityfocus.com/bid/17222
Summary:
A problem with Baby Web Server and Quick 'n Easy Web Server results in the disclosure of the source code of Active Server Pages. This allows attackers to gain unauthorized access to sensitive information, potentially aiding them in further attacks.

This issue affects the discontinued Baby Web Server and versions prior to 3.1.1 of its successor Quick 'n Easy Web Server.

6. Pubcookies Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 17221
Remote: Yes
Date Published: 2006-03-24
Relevant URL: http://www.securityfocus.com/bid/17221
Summary:
Pubcookies is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

These issues were addressed in Pubcookie 3.3.0a and 3.2.1b.

7. Internet Security Systems BlackICE and RealSecure Desktop Local Privilege Escalation Vulnerability
BugTraq ID: 17218
Remote: No
Date Published: 2006-03-23
Relevant URL: http://www.securityfocus.com/bid/17218
Summary:
Multiple Internet Security Systems (ISS) products are susceptible to a local privilege-escalation vulnerability. This issue is due to the application's failure to properly lower the privileges of the running process when required.

Due to the nature of the affected application, it executes with SYSTEM privileges. When a local user opens the help browser from the affected application, it runs with the same elevated privileges as the calling application.

This vulnerability allows local attackers to access and execute arbitrary files with SYSTEM privileges, facilitating the compromise of the local computer.

8. Retired: Sendmail SM_SysLog Remote Memory Leak Denial Of Service Vulnerability
BugTraq ID: 17207
Remote: Yes
Date Published: 2006-03-23
Relevant URL: http://www.securityfocus.com/bid/17207
Summary:
Sendmail is prone to a remote denial-of-service vulnerability. The application fails to properly free allocated memory regions when it is finished with them.

Remote attackers may leverage this issue to consume excessive memory, eventually crashing the application. This will deny further email service to legitimate users.

Sendmail versions prior to 8.13.6 are vulnerable to this issue.

** Update: Due to further analysis and details from the vendor, this BID is retired. Since the memory buffer that was documented as not being freed is a local variable, this is not a vulnerability.

9. VBulleting ImpEx Remote File Include Vulnerability
BugTraq ID: 17206
Remote: Yes
Date Published: 2006-03-23
Relevant URL: http://www.securityfocus.com/bid/17206
Summary:
vBulletin ImpEx is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

10. Baby FTP Server Information Disclosure Weakness
BugTraq ID: 17205
Remote: Yes
Date Published: 2006-03-23
Relevant URL: http://www.securityfocus.com/bid/17205
Summary:
Baby FTP Server is susceptible to a remote information-disclosure weakness. This issue is due to a lack of proper sanitization of user-supplied input.

An attacker may use information obtained to launch further attacks on the affected computer.

Version 1.24 is vulnerable; other versions may also be affected.

11. Orion Application Server JSP Source Disclosure Vulnerability
BugTraq ID: 17204
Remote: Yes
Date Published: 2006-03-23
Relevant URL: http://www.securityfocus.com/bid/17204
Summary:
A problem with Orion Application Server results in the disclosure of the source code of Java Server Pages. This allows attackers to gain unauthorized access to sensitive information, potentially aiding them in further attacks.

This issue only affects Orion Application Server installations on Microsoft Windows platforms. Versions 5.0.5 and 5.0.6 are vulnerable; earlier versions may also be vulnerable.

12. Microsoft Internet Explorer CreateTextRange Remote Code Execution Vulnerability
BugTraq ID: 17196
Remote: Yes
Date Published: 2006-03-22
Relevant URL: http://www.securityfocus.com/bid/17196
Summary:
Microsoft Internet Explorer is susceptible to a remote code-execution vulnerability. This issue is due to a flaw that results in an invalid table-pointer dereference.

Remote attackers may exploit this issue to crash affected browsers or to execute arbitrary machine code in the context of affected users.

Microsoft has reported that this issue does not affect the March 20, 2006 release of Internet Explorer 7 Beta 2 Preview.

13. Sendmail Asynchronous Signal Handling Remote Code Execution Vulnerability
BugTraq ID: 17192
Remote: Yes
Date Published: 2006-03-22
Relevant URL: http://www.securityfocus.com/bid/17192
Summary:
Sendmail is prone to a remote code-execution vulnerability.

Remote attackers may leverage this issue to execute arbitrary code with the privileges of the application, which typically runs as superuser.

Sendmail versions prior to 8.13.6 are vulnerable to this issue.

14. Microsoft ASP.NET COM Components W3WP Remote Denial Of Service Vulnerability
BugTraq ID: 17188
Remote: Yes
Date Published: 2006-03-22
Relevant URL: http://www.securityfocus.com/bid/17188
Summary:
Improper access of COM and COM+ components in ASP.NET applications can cause a denial-of-service condition in 'w3wp.exe' processes.

A remote attacker can exploit this issue to cause denial-of-service conditions in applications using improperly coded ASP.NET, effectively denying service to legitimate users.

15. Microsoft Internet Explorer Unspecified Remote HTA Execution Vulnerability
BugTraq ID: 17181
Remote: Yes
Date Published: 2006-03-21
Relevant URL: http://www.securityfocus.com/bid/17181
Summary:
Microsoft Internet Explorer is affected by an unspecified remote vulnerability.

This vulnerability affects Internet Explorer 6.0 running on Microsoft Windows 98, Windows XP, and Windows Server 2003. A successful attack may allow remote attackers to execute HTA applications in the context of targeted users. This may allow remote attackers to execute code and potentially to compromise affected computers.

Due to a lack of information, further details cannot be provided. This BID will be updated when more information becomes available.

16. MailEnable Unspecified POP Authentication Bypass Vulnerability
BugTraq ID: 17162
Remote: Yes
Date Published: 2006-03-20
Relevant URL: http://www.securityfocus.com/bid/17162
Summary:
MailEnable is prone to an unspecified authentication-bypass vulnerability.

This vulnerability affects the POP service of various MailEnable versions. Very little information beyond that is available at this time. This BID will be updated as further information becomes available.

17. MailEnable Enterprise/Professional Editions Webmail Denial of Service Vulnerability
BugTraq ID: 17161
Remote: Yes
Date Published: 2006-03-20
Relevant URL: http://www.securityfocus.com/bid/17161
Summary:
MailEnable Enterprise/Professional Editions are prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to cause the application to consume all available resources, effectively denying service to legitimate users.

This issue is reported to be a seperate issue from that discussed in BID 16525 (MailEnable Enterprise Edition Webmail Denial of Service Vulnerability).

18. PHPWebSite Multiple SQL Injection Vulnerabilities
BugTraq ID: 17150
Remote: Yes
Date Published: 2006-03-20
Relevant URL: http://www.securityfocus.com/bid/17150
Summary:
phpWebSite is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
Test your Network Security Free with QualysGuard
Requiring NO software, QualysGuard will safely and accurately test your network and provide you with the necessary fixes to proactively guard your network. Try QualysGuard Risk Free with No Obligation.

http://www.securityfocus.com/cgi-bin/ib.pl




---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to