SecurityFocus Microsoft Newsletter #290
----------------------------------------

FREE Safend Auditor - Monitor your endpoints!
Safend's FREE Auditor provides the visibility you need to protect your desktops and laptops. Safend Auditor identifies every USB, FireWire and PCMCIA device that has connected to your endpoints. Asses you endpoint vulnerabilities for FREE!

http://www.securityfocus.com/cgi-bin/ib.pl

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Innovative ways to fool people
       2. Malicious cryptography, part 1
II.  MICROSOFT VULNERABILITY SUMMARY
       1. Microsoft Infotech Storage Library Heap Corruption Vulnerability
       2. ICQ Banner Ad Cross-Application Scripting Vulnerability
3. Microsoft Exchange Server Calendar Remote Code Execution Vulnerability 4. Microsoft Windows MSDTC Invalid Memory Access Denial Of Service Vulnerability
       5. Microsoft Windows MSDTC Heap Buffer Overflow Vulnerability
       6. Drupal Project Module HTML Injection Vulnerability
7. Intervations FileCopa User Command Remote Buffer Overflow Vulnerability 8. Sophos Anti-Virus CAB File Scanning Remote Heap Overflow Vulnerability 9. Kerio WinRoute Firewall Unspecified Remote Denial of Service Vulnerability
       10. Xeneo Web Server Source Disclosure Vulnerability
       11. ACFTP FTP Server User Command Remote Denial of Service Vulnerability
       12. Cryptomathic ActiveX Control Remote Buffer Overflow Vulnerability
       13. Invision Power Board Index.PHP SQL Injection Vulnerability
       14. Invision Power Board Func_mod.PHP SQL Injection Vulnerability
15. XM Easy Personal FTP Server Unspecified Authentication Buffer Overflow Vulnerability 16. Sami FTP Server Unspecified Authentication Buffer Overflow Vulnerability
       17. Microsoft May Advance Notification Multiple Vulnerabilities
18. Linux Kernel RNDIS_Query_Response Remote Buffer Overflow Vulnerability
       19. UltraVNC Weak Challenge-Response Authentication Vulnerability
20. Microsoft Internet Explorer Unspecified OBJECT Tag Memory Corruption Variant Vulnerability
       21. BankTown ActiveX Control Remote Buffer Overflow Vulnerability
22. Gene6 FTP Server Multiple Commands Remote Buffer Overflow Vulnerabilities
       23. LibTiff TIFFToRGB Denial of Service Vulnerability
       24. WarFTPD WDM.EXE Remote Buffer Overflow Vulnerability
       25. FileZilla FTP Server Multiple Remote Buffer Overflow Vulnerabilities
       26. Golden FTP Server NLST Command Remote Buffer Overflow Vulnerability
27. EMC Dantz Retrospect Backup Server Local Privilege Escalation Vulnerability
       28. Invision Gallery Post.PHP SQL Injection Vulnerability
29. MySQL Remote Information Disclosure and Buffer Overflow Vulnerabilities
       30. Clam AntiVirus FreshClam Remote Buffer Overflow Vulnerability
       31. Cisco Secure ACS Insecure Password Storage Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. USB device installation problem
       2. Autorun in screensaver
       3. Sniffer question
       4. Patch Management on Critical Servers (Healthcare)
       5. windows 2003 1wan 2lan => vpn to ech private lan?
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Innovative ways to fool people
By Scott Granneman
Scott Granneman's latest column looks at recent security examples where people have been fooled in increasingly innovative ways: from keyloggers used in a massive bank heist and new Trojans that encrypt data and request ransom money, to real financial rip-offs that extend out from online virtual gaming worlds like World of Warcraft.
http://www.securityfocus.com/columnists/401

2. Malicious cryptography, part 1
By Frederic Raynal
This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses. Part one introduces the concepts behind cryptovirology and offers examples of malicious potential with the SuckIt rootkit and a possible SSH worm. It then introduces armored viruses that use shape shifting (polymorphism and metamorphism) to avoid detection.
http://www.securityfocus.com/infocus/1865


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft Infotech Storage Library Heap Corruption Vulnerability
BugTraq ID: 17926
Remote: Yes
Date Published: 2006-05-09
Relevant URL: http://www.securityfocus.com/bid/17926
Summary:
Microsoft Windows is susceptible to a heap-corruption vulnerability while attempting to read specially crafted CHM or ITS files. This occurs in the 'ITSS.DLL' library.

This vulnerability allows remote attackers to execute arbitrary machine code in the context of applications utilizing the affected library.

Attackers may exploit this issue by coercing users to open malicious CHM or ITS files with Internet Explorer, or when users attempt to decompile these files with the 'hh -decompile' command. CHM files are considered unsafe files, so there is a possibility that advanced users or security researchers may attempt to decompile these files in order to inspect their contents.

2. ICQ Banner Ad Cross-Application Scripting Vulnerability
BugTraq ID: 17913
Remote: Yes
Date Published: 2006-05-09
Relevant URL: http://www.securityfocus.com/bid/17913
Summary:
ICQ is prone to a cross-application scripting vulnerability. This issue is a result of the application accessing content in a different and presumably higher security context than the original content.

An attacker can exploit this issue to have arbitrary attacker-supplied HTML or JavaScript executed on a victim user's computer in the 'My Computer' security zone.

3. Microsoft Exchange Server Calendar Remote Code Execution Vulnerability
BugTraq ID: 17908
Remote: Yes
Date Published: 2006-05-09
Relevant URL: http://www.securityfocus.com/bid/17908
Summary:
Microsoft Exchange Server is prone to a vulnerability that may let attackers execute code remotely. This issue is exposed when the server handles emails that contain malicious calendar data that is included in meeting requests.

If the issue is successfully exploited, this could completely compromise the computer hosting the mail server.

4. Microsoft Windows MSDTC Invalid Memory Access Denial Of Service Vulnerability
BugTraq ID: 17906
Remote: Yes
Date Published: 2006-05-09
Relevant URL: http://www.securityfocus.com/bid/17906
Summary:
Microsoft Windows Distributed Transaction Coordinator is prone to a denial-of-service vulnerability.

This vulnerability can be exploited remotely to disrupt the MSDTC service, and any services that depend on MSDTC.

This vulnerability affects Windows NT and Windows 2000 by default, since the service comes enabled. The vulnerability only affects Windows XP and Windows Server 2003 if the service is manually enabled.

5. Microsoft Windows MSDTC Heap Buffer Overflow Vulnerability
BugTraq ID: 17905
Remote: Yes
Date Published: 2006-05-09
Relevant URL: http://www.securityfocus.com/bid/17905
Summary:
Microsoft Windows Distributed Transaction Coordinator is prone to a remote heap buffer-overflow vulnerability. This issue is due to the failure of the software to properly bounds check user-supplied input prior to copying it to an insufficiently sized memory buffer.

This BID is flagged with the 'Conflicting Details' credibility rating because of the descrepancy between the vendor and the discoverer as to the possibility of remote code execution.

Microsoft states that this issue may only be exploited to disrupt the MSDTC service, and any services that depend on MSDTC. The discoverer of this issue states that it may be exploited for remote code execution.

This vulnerability affects Windows NT and Windows 2000 by default, since the service comes enabled. The vulnerability only affects Windows XP and Windows Server 2003 if the service is manually enabled.

6. Drupal Project Module HTML Injection Vulnerability
BugTraq ID: 17885
Remote: Yes
Date Published: 2006-05-08
Relevant URL: http://www.securityfocus.com/bid/17885
Summary:
Drupal is prone to an HTML-injection vulnerability. This issue is due to the application's failure to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

7. Intervations FileCopa User Command Remote Buffer Overflow Vulnerability
BugTraq ID: 17881
Remote: Yes
Date Published: 2006-05-08
Relevant URL: http://www.securityfocus.com/bid/17881
Summary:
FileCopa is prone to a buffer-overflow vulnerability when handling data through the USER command. Reportedly, passing excessive data may overflow a finite-sized internal memory buffer. A successful attack may result in memory corruption as memory adjacent to the buffer is overwritten with user-supplied data.

This issue may lead to a denial-of-service condition or the execution of arbitrary code.

8. Sophos Anti-Virus CAB File Scanning Remote Heap Overflow Vulnerability
BugTraq ID: 17876
Remote: Yes
Date Published: 2006-05-08
Relevant URL: http://www.securityfocus.com/bid/17876
Summary:
A remote heap-overflow vulnerability exists in Sophos Anti-Virus Library when scanning CAB files. This issue is due to the library's failure to properly bounds-check user-supplied input before copying data to an internal memory buffer.

Successfully exploiting this vulnerability could result in arbitrary code execution with the privileges of the application.

9. Kerio WinRoute Firewall Unspecified Remote Denial of Service Vulnerability
BugTraq ID: 17859
Remote: Yes
Date Published: 2006-05-05
Relevant URL: http://www.securityfocus.com/bid/17859
Summary:
Kerio WinRoute Firewall is prone to a remote denial-of-service vulnerability. The exact cause of this issue is currently unknown.

This vulnerability allows remote attackers to crash the server, denying further network service to legitimate users.

This issue affects Kerio WinRoute Firewall versions prior to 6.2.1.

10. Xeneo Web Server Source Disclosure Vulnerability
BugTraq ID: 17858
Remote: Yes
Date Published: 2006-05-05
Relevant URL: http://www.securityfocus.com/bid/17858
Summary:
A problem with Xeneo results in the disclosure of the source code of scripts. This allows attackers to gain unauthorized access to sensitive information, potentially aiding them in further attacks.

This issue affects Xeneo version 2.2.22.0; other versions may also be vulnerable.

11. ACFTP FTP Server User Command Remote Denial of Service Vulnerability
BugTraq ID: 17855
Remote: Yes
Date Published: 2006-05-05
Relevant URL: http://www.securityfocus.com/bid/17855
Summary:
acFTP is susceptible to a remote denial-of-service vulnerability. This issue is due to the application's failure to properly handle unexpected input.

This vulnerability allows remote attackers to crash affected servers, denying service to legitimate users.

This issue affects version 1.4; other versions may also be vulnerable.

12. Cryptomathic ActiveX Control Remote Buffer Overflow Vulnerability
BugTraq ID: 17852
Remote: Yes
Date Published: 2006-05-05
Relevant URL: http://www.securityfocus.com/bid/17852
Summary:
Cryptomathic ActiveX control is prone to a buffer-overflow vulnerability. The software fails to perform sufficient bounds-checking of user-supplied input before copying it to an insufficiently sized memory buffer.

Invoking the object from a malicious website or HTML email may trigger the condition. If the vulnerability were successfully exploited, this would corrupt process memory, resulting in arbitrary code execution. Arbitrary code would be executed in the context of the client application.

13. Invision Power Board Index.PHP SQL Injection Vulnerability
BugTraq ID: 17839
Remote: Yes
Date Published: 2006-05-04
Relevant URL: http://www.securityfocus.com/bid/17839
Summary:
Invision Power Board is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

14. Invision Power Board Func_mod.PHP SQL Injection Vulnerability
BugTraq ID: 17837
Remote: Yes
Date Published: 2006-05-04
Relevant URL: http://www.securityfocus.com/bid/17837
Summary:
Invision Power Board is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

15. XM Easy Personal FTP Server Unspecified Authentication Buffer Overflow Vulnerability
BugTraq ID: 17836
Remote: Yes
Date Published: 2006-05-04
Relevant URL: http://www.securityfocus.com/bid/17836
Summary:
XM Easy Personal FTP Server is prone to an unspecified buffer-overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before storing it in a finite-sized buffer.

An attacker can exploit this issue to execute arbitrary machine code in the context of the affected server application. This likely occurs with SYSTEM-level privileges.

Version 4.3 of XM Easy Personal FTP Server is affected by this issue; other versions may also be affected.

16. Sami FTP Server Unspecified Authentication Buffer Overflow Vulnerability
BugTraq ID: 17835
Remote: Yes
Date Published: 2006-05-04
Relevant URL: http://www.securityfocus.com/bid/17835
Summary:
Sami FTP Server is prone to an unspecified buffer-overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before storing it in a finite-sized buffer.

An attacker can exploit this issue to execute arbitrary machine code in the context of the affected server application. This likely occurs with SYSTEM-level privileges.

Version 2.0.2 of Sami FTP Server is affected by this issue; other versions may also be affected.

17. Microsoft May Advance Notification Multiple Vulnerabilities
BugTraq ID: 17833
Remote: Yes
Date Published: 2006-05-04
Relevant URL: http://www.securityfocus.com/bid/17833
Summary:
Microsoft has released advance notification that they will be releasing three security bulletins for Windows on May 9, 2006. The highest severity rating for these issues is Critical.

Further details about these issues are not currently available. Individual BIDs will be created and this record will be removed when the security bulletins are released.

18. Linux Kernel RNDIS_Query_Response Remote Buffer Overflow Vulnerability
BugTraq ID: 17831
Remote: Yes
Date Published: 2006-05-04
Relevant URL: http://www.securityfocus.com/bid/17831
Summary:
The Linux kernel is prone to a remote buffer-overflow vulnerability. This issue is due to the kernel's failure to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.

This issue allows remote attackers to crash affected computers. Presumably, attackers could execute arbitrary machine code in the context of affected kernels, but this has not been confirmed.

Linux kernel versions in the 2.6 series prior to 2.6.16 are vulnerable to this issue.

19. UltraVNC Weak Challenge-Response Authentication Vulnerability
BugTraq ID: 17824
Remote: Yes
Date Published: 2006-05-03
Relevant URL: http://www.securityfocus.com/bid/17824
Summary:
UltraVNC is susceptible to a weak challenge-response authentication vulnerability. This issue is due to the use of insecure encryption during the authentication process of UltraVNC.

Exploiting this issue allows attackers to gain access to the plaintext password used during the UltraVNC authentication process. This will aid them in further attacks.

UltraVNC version 1.0.1 is vulnerable to this issue; other versions may also be affected.

20. Microsoft Internet Explorer Unspecified OBJECT Tag Memory Corruption Variant Vulnerability
BugTraq ID: 17820
Remote: Yes
Date Published: 2006-05-03
Relevant URL: http://www.securityfocus.com/bid/17820
Summary:
Microsoft Internet Explorer is prone to an unspecified memory-corruption vulnerability.

An attacker could exploit this issue via a malicious web page to potentially execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely crash the affected application.

Microsoft Internet Explorer 6 for Microsoft Windows XP SP2 is reportedly vulnerable to this issue; other versions may also be affected.

This issue is reportedly a variant of BID 17658 (Microsoft Internet Explorer Nested OBJECT Tag Memory Corruption Vulnerability). Further details are currently unavailable. This BID will be updated as more information is disclosed.

21. BankTown ActiveX Control Remote Buffer Overflow Vulnerability
BugTraq ID: 17815
Remote: Yes
Date Published: 2006-05-03
Relevant URL: http://www.securityfocus.com/bid/17815
Summary:
BankTown ActiveX control is prone to a buffer-overflow vulnerability. The software fails to perform sufficient bounds-checking of user-supplied input before copying it to an insufficiently sized memory buffer.

Invoking the object from a malicious website may trigger the condition. If the vulnerability were successfully exploited, this would corrupt process memory, resulting in arbitrary code execution. Arbitrary code would be executed in the context of the client application.

22. Gene6 FTP Server Multiple Commands Remote Buffer Overflow Vulnerabilities
BugTraq ID: 17810
Remote: Yes
Date Published: 2006-05-03
Relevant URL: http://www.securityfocus.com/bid/17810
Summary:
Gene6 FTP Server is prone to multiple buffer-overflow vulnerabilities when handling data through various commands.

Reportedly, passing excessive data may overflow a finite-sized internal memory buffer. A successful attack may result in memory corruption as memory adjacent to the buffer is overwritten with user-supplied data.

These issues may lead to a denial-of-service condition or the execution of arbitrary code.

This issue is reported to affect version 3.1.0; other versions may also be vulnerable.

23. LibTiff TIFFToRGB Denial of Service Vulnerability
BugTraq ID: 17809
Remote: Yes
Date Published: 2006-05-03
Relevant URL: http://www.securityfocus.com/bid/17809
Summary:
LibTIFF is affected by a denial-of-service vulnerability.

An attacker can exploit this vulnerability to cause a denial of service in applications using the affected library.

24. WarFTPD WDM.EXE Remote Buffer Overflow Vulnerability
BugTraq ID: 17803
Remote: Yes
Date Published: 2006-05-02
Relevant URL: http://www.securityfocus.com/bid/17803
Summary:
WarFTPD is prone to a buffer-overflow vulnerability.

Reportedly, passing excessive data may overflow a finite-sized internal memory buffer. A successful attack may result in memory corruption as memory adjacent to the buffer is overwritten with user-supplied data.

This issue may lead to a denial-of-service condition or the execution of arbitrary code.

The specific versions of WarFTPd vulnerable to this issue are not currently known. Presumably, this issue affects the latest release of the affected software, and possibly earlier versions.

25. FileZilla FTP Server Multiple Remote Buffer Overflow Vulnerabilities
BugTraq ID: 17802
Remote: Yes
Date Published: 2006-05-02
Relevant URL: http://www.securityfocus.com/bid/17802
Summary:
FileZilla FTP Server is prone to multiple buffer-overflow vulnerabilities.

Reportedly, passing excessive data may overflow finite-sized internal memory buffers. A successful attack may result in memory corruption as memory adjacent to the buffer is overwritten with user-supplied data.

These issues may lead to a denial-of-service condition or the execution of arbitrary code.

Version 2.2.22 of FileZilla is vulnerable to these issues; other versions may also be affected.

26. Golden FTP Server NLST Command Remote Buffer Overflow Vulnerability
BugTraq ID: 17801
Remote: Yes
Date Published: 2006-05-02
Relevant URL: http://www.securityfocus.com/bid/17801
Summary:
Golden FTP Server is prone to a buffer-overflow vulnerability when handling data through the NLST command.

Reportedly, passing excessive data may overflow a finite-sized internal memory buffer. A successful attack may result in memory corruption as memory adjacent to the buffer is overwritten with user-supplied data.

This issue may lead to a denial-of-service condition or the execution of arbitrary code.

Version 2.70 of Golden FTP Server is vulnerable to this issue; other versions may also be affected.

27. EMC Dantz Retrospect Backup Server Local Privilege Escalation Vulnerability
BugTraq ID: 17798
Remote: No
Date Published: 2006-05-02
Relevant URL: http://www.securityfocus.com/bid/17798
Summary:
Dantz Retrospect Backup Server is prone to a local privilege-escalation vulnerability. This issue is due to the software's failure to properly ensure that administrative privileges are dropped before executing applications.

This issue allows local users to gain administrative privileges, facilitating the complete compromise of affected computers.

28. Invision Gallery Post.PHP SQL Injection Vulnerability
BugTraq ID: 17793
Remote: Yes
Date Published: 2006-05-02
Relevant URL: http://www.securityfocus.com/bid/17793
Summary:
Invision Gallery is prone to a SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

29. MySQL Remote Information Disclosure and Buffer Overflow Vulnerabilities
BugTraq ID: 17780
Remote: Yes
Date Published: 2006-05-02
Relevant URL: http://www.securityfocus.com/bid/17780
Summary:
MySQL is susceptible to multiple remote vulnerabilities:

- A buffer-overflow vulnerability due to insufficient bounds-checking of user-supplied data before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of affected database servers. Failed exploit attempts will likely crash the server, denying further service to legitimate users.

- Two information-disclosure vulnerabilities due to insufficient input-sanitization and bounds-checking of user-supplied data. These issues allow remote users to gain access to potentially sensitive information that may aid them in further attacks.

30. Clam AntiVirus FreshClam Remote Buffer Overflow Vulnerability
BugTraq ID: 17754
Remote: Yes
Date Published: 2006-05-01
Relevant URL: http://www.securityfocus.com/bid/17754
Summary:
ClamAV's freshclam utility is susceptible to a remote buffer-overflow vulnerability. The utility fails to perform sufficient boundary checks in server-supplied HTTP data before copying it to an insufficiently sized memory buffer.

To exploit this issue, attackers must subvert webservers in the ClamAV database server pool. Or, they would perform DNS-based attacks or man-in-the-middle attacks to cause affected freshclam applications to connect to attacker-controlled webservers.

This issue allows remote attackers to execute arbitrary machine code in the context of the freshclam utility. The affected utility may run with superuser privileges, aiding remote attackers in the complete compromise of affected computers.

ClamAV versions 0.88 and 0.88.1 are affected by this issue.

31. Cisco Secure ACS Insecure Password Storage Vulnerability
BugTraq ID: 16743
Remote: Yes
Date Published: 2006-05-08
Relevant URL: http://www.securityfocus.com/bid/16743
Summary:
Cisco Secure ACS is susceptible to an insecure password-storage vulnerability. This issue is due to a failure of the application to properly secure sensitive password information.

This issue allows attackers to gain access to encrypted passwords and to the key used to encrypt them. This allows them to obtain the plaintext passwords, aiding them in attacking other services that depend on the ACS server for authentication.

Cisco Secure Access Control Server for Windows versions 3.x are affected by this issue.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. USB device installation problem
http://www.securityfocus.com/archive/88/433355

2. Autorun in screensaver
http://www.securityfocus.com/archive/88/433357

3. Sniffer question
http://www.securityfocus.com/archive/88/433354

4. Patch Management on Critical Servers (Healthcare)
http://www.securityfocus.com/archive/88/433214

5. windows 2003 1wan 2lan => vpn to ech private lan?
http://www.securityfocus.com/archive/88/432951

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
FREE Safend Auditor - Monitor your endpoints!
Safend's FREE Auditor provides the visibility you need to protect your desktops and laptops. Safend Auditor identifies every USB, FireWire and PCMCIA device that has connected to your endpoints. Asses you endpoint vulnerabilities for FREE!

http://www.securityfocus.com/cgi-bin/ib.pl




---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to