SecurityFocus Microsoft Newsletter #287
----------------------------------------

This Issue is Sponsored By: Patchlink

Automatically analyze, deploy and track security patches
Does your patch management solution automatically track and re-deploy to ensure network security? 20% of patches unknowingly become un-patched. Learn more about automating the analysis, distribution and tracking of security patches using PatchLink's security patch & vulnerability management solution -- the world's largest repository of tested patches. Request a free trial disk.

http://a.gklmedia.com/sfmn/nl/148

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Virtualization for security
       2. Stop the bots
II.  MICROSOFT VULNERABILITY SUMMARY
       1. Opera Web Browser Stylesheet Attribute Buffer Overflow Vulnerability
       2. Manila Multiple Cross-Site Scripting Vulnerabilities
       3. Microsoft Internet Explorer HTML Tag Memory Corruption Vulnerability
4. Microsoft Windows Shell COM Object Remote Code Execution Vulnerability 5. Microsoft MDAC RDS.Dataspace ActiveX Control Remote Code Execution Vulnerability 6. Microsoft Internet Explorer Persistent Window Content Address Bar Spoofing Vulnerability 7. Microsoft Outlook Express Windows Address Book File Parsing Buffer Overflow Vulnerability 8. Microsoft Internet Explorer Popup Cross-Domain Information Disclosure Vulnerability 9. Microsoft Internet Explorer Erroneous IOleClientSite Data Zone Bypass Vulnerability 10. Microsoft Internet Explorer Double Byte Character Memory Corruption Vulnerability 11. Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability 12. Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability 13. Microsoft Internet Explorer Invalid HTML Parsing Code Execution Vulnerability
       14. TUGZip Remote Directory Traversal Vulnerability
       15. PHPList Index.PHP Local File Include Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. Windows Update error
       2. MS06-013 Cumulative IE Update (912812)  Issues
       3. Detecting PwDump
       4. SecurityFocus Microsoft Newsletter #286
       5. Laptop Encryption & Write Permissions
       6. Adding Users via Web Interface
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Virtualization for security
By Scott Granneman
Scott Granneman gives an overview of the virtualization options for all three major operating system families and looks at the many ways the technology can improve your security posture in an organization or at home.
http://www.securityfocus.com/columnists/397

2. Stop the bots
By Kelly Martin
Botnets are a major source of evil on the Internet, from spam, phishing attacks, virus propagation and denial-of-service attacks to the stealing of financial information and other illegal activity. Does disbanding them raise legal and ethical implications?
http://www.securityfocus.com/columnists/398


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Opera Web Browser Stylesheet Attribute Buffer Overflow Vulnerability
BugTraq ID: 17513
Remote: Yes
Date Published: 2006-04-13
Relevant URL: http://www.securityfocus.com/bid/17513
Summary:
Opera is prone to a buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before using it in a string-copy operation.

This issue allows remote attackers to crash affected web browsers. Due to the nature of this issue, attackers may be able to exploit this issue to execute machine code, but this has not been confirmed.

Opera version 8.52 is vulnerable to this issue; other versions may also be affected.

2. Manila Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 17475
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17475
Summary:
Manila is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Versions 9.5 and prior are vulnerable; other versions may also be affected.

3. Microsoft Internet Explorer HTML Tag Memory Corruption Vulnerability
BugTraq ID: 17468
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17468
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. This is related to the handling of certain HTML tags.

Attackers could exploit this issue via a malicious web page to execute arbitrary code in the context of the currently logged-in user. They could also use HTML email for the attack.

4. Microsoft Windows Shell COM Object Remote Code Execution Vulnerability
BugTraq ID: 17464
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17464
Summary:
Microsoft Windows Shell is prone to a remote code-execution vulnerability. This issue is due to a flaw in its handling of remote COM objects.

Remote attackers may exploit this issue to execute arbitrary machine code in the context of the targeted user. This may facilitate the remote compromise of affected computers.

This issue is described as a variant of the one in BID 10363 (Microsoft Windows XP Self-Executing Folder Vulnerability).

5. Microsoft MDAC RDS.Dataspace ActiveX Control Remote Code Execution Vulnerability
BugTraq ID: 17462
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17462
Summary:
The Microsoft MDAC RDS.Dataspace ActiveX control is vulnerable to remote code execution. An attacker could exploit this issue to execute code in the context of the user visiting a malicious web page.

6. Microsoft Internet Explorer Persistent Window Content Address Bar Spoofing Vulnerability
BugTraq ID: 17460
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17460
Summary:
Microsoft Internet Explorer is prone to address-bar spoofing. Attackers may exploit this via a malicious web page to spoof the contents of a page that the victim may trust. This vulnerability may be useful in phishing or other attacks that rely on content spoofing.

7. Microsoft Outlook Express Windows Address Book File Parsing Buffer Overflow Vulnerability
BugTraq ID: 17459
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17459
Summary:
Microsoft Outlook Express is prone to a remote buffer-overflow vulnerability.

This vulnerability presets itself when the application processes a specially crafted Windows Address Book (.wab) file.

An attacker may exploit this issue to execute arbitrary code in the context of a user running the vulnerable application. This may result in a remote compromise.

8. Microsoft Internet Explorer Popup Cross-Domain Information Disclosure Vulnerability
BugTraq ID: 17457
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17457
Summary:
Microsoft Internet Explorer is prone to a cross-domain information-disclosure vulnerability.

This vulnerability may let a malicious website access properties of a site in an arbitrary external domain. Attackers could exploit this issue to gain access to sensitive information that is associated with the external domain, such as cookies associated with a userĂ¢??s session on the external site.

9. Microsoft Internet Explorer Erroneous IOleClientSite Data Zone Bypass Vulnerability
BugTraq ID: 17455
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17455
Summary:
Microsoft Internet Explorer is prone to a zone-bypass vulnerability because the browser returns erroneous IOleClientSite when dynamically creating an embedded object. This could cause malicious script code to be executed in a security zone with fewer restrictions than the zone that the content originates from.

Attackers may exploit this issue to execute arbitrary code in the context of the currently logged-in user on the affected computer. They may also be able to execute malicious script code in the context of a site that exists in another domain. Attackers may exploit this issue through a malicious web page.

10. Microsoft Internet Explorer Double Byte Character Memory Corruption Vulnerability
BugTraq ID: 17454
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17454
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. This is related to an error in how double-byte character set (DBCS) characters are handled in Internationalized Domain Names (IDN) included in URLS from rendered HTML content.

An attacker could exploit this issue via a malicious web page to execute arbitrary code in the context of the currently logged-in user. The issue could also be exploited through HTML email/newsgroup postings, or other applications that employ the affected component.

Microsoft has stated that this issue does not apply to Internet Explorer 6.0 on Windows Server 2003 SP1.

11. Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability
BugTraq ID: 17453
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17453
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability that is related to the instantiation of COM objects. This issue results from a design error.

The vulnerability arises because of the way Internet Explorer tries to instantiate certain COM objects as ActiveX controls, resulting in arbitrary code execution. The affected objects are not intended to be instantiated through Internet Explorer.

This BID is related to the issues described in BID 14511 (Microsoft Internet Explorer COM Object Instantiation Buffer Overflow Vulnerability) and BID 15061 Microsoft Internet Explorer COM Object Instantiation Variant Vulnerability). However, this issue affects a different set of COM objects that were not addressed in the previous BIDs.

12. Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
BugTraq ID: 17452
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17452
Summary:
Microsoft FrontPage Server Extensions are prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before it is rendered to other users.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user, with the privileges of the victim userĂ¢??s account. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

13. Microsoft Internet Explorer Invalid HTML Parsing Code Execution Vulnerability
BugTraq ID: 17450
Remote: Yes
Date Published: 2006-04-11
Relevant URL: http://www.securityfocus.com/bid/17450
Summary:
Microsoft Internet Explorer is prone to a vulnerability that may permit remote attackers to execute arbitrary code. This vulnerability occurs when the browser parses invalid HTML.

Attackers can exploit this vulnerability through a malicious web page or HTML email.

14. TUGZip Remote Directory Traversal Vulnerability
BugTraq ID: 17432
Remote: Yes
Date Published: 2006-04-10
Relevant URL: http://www.securityfocus.com/bid/17432
Summary:
Reportedly, an attacker can carry out attacks similar to directory traversals. These issues present themselves when the application processes malicious archives.

A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. Successful exploitation may aid in further attacks.

15. PHPList Index.PHP Local File Include Vulnerability
BugTraq ID: 17429
Remote: Yes
Date Published: 2006-04-10
Relevant URL: http://www.securityfocus.com/bid/17429
Summary:
PHPList is prone to a local file-include vulnerability. This may facilitate the unauthorized viewing of files and unauthorized execution of local scripts.

Attackers may exploit this issue to execute arbitrary code by manipulating log files.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Windows Update error
http://www.securityfocus.com/archive/88/431107

2. MS06-013 Cumulative IE Update (912812)  Issues
http://www.securityfocus.com/archive/88/430939

3. Detecting PwDump
http://www.securityfocus.com/archive/88/430932

4. SecurityFocus Microsoft Newsletter #286
http://www.securityfocus.com/archive/88/430755

5. Laptop Encryption & Write Permissions
http://www.securityfocus.com/archive/88/430680

6. Adding Users via Web Interface
http://www.securityfocus.com/archive/88/430662

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: Patchlink

Automatically analyze, deploy and track security patches
Does your patch management solution automatically track and re-deploy to ensure network security? 20% of patches unknowingly become un-patched. Learn more about automating the analysis, distribution and tracking of security patches using PatchLink's security patch & vulnerability management solution -- the world's largest repository of tested patches. Request a free trial disk.

http://a.gklmedia.com/sfmn/nl/148



---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to