SecurityFocus Microsoft Newsletter #292
----------------------------------------

This issue is sponsored by: Lancope

"Revolutionize the way you view your network security"
How do you protect what you can't see? Stop protecting while blind. Gain network visibility now. Learn how Cisco NetFlow gives visibility and enables cost-effective security across distributed enterprise networks. StealthWatch, the veteran Network Behavior Analysis (NBA) and Response solution, leverages Cisco NetFlow to provide scalable, internal network security. ALERT: Download FREE White Paper "Network Behavior Analysis (NBA) in the Enterprise."

http://www.lancope.com/resource/

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Protection from prying NSA eyes
       2. Malicious cryptography, part two
II.  MICROSOFT VULNERABILITY SUMMARY
       1. BitZipper Remote Directory Traversal Vulnerability
2. Sun Java Runtime Environment Nested Array Objects Denial Of Service Vulnerability 3. Invision Power Board Multiple Arbitrary PHP Code Execution Vulnerabilities
       4. Microsoft Word Unspecified Remote Code Execution Vulnerability
5. Novell eDirectory Server Long URI iMonitor Buffer Overflow Vulnerability 6. Ipswitch WhatsUp Professional 2006 Authentication Bypass Vulnerability
       7. MP3Info Unspecified Buffer Overflow Vulnerability
       8. Hitachi EUR Unspecified SQL Injection Vulnerability
       9. Microsoft Windows Impersonation Privilege Escalation Weakness
       10. Caucho Resin Viewfile Information Disclosure Vulnerability
11. Pragma FortressSSH SSH_MSG_KEXINIT Remote Buffer Overflow Vulnerability 12. Raydium Multiple Remote Buffer Overflow and Denial Of Service Vulnerabilities
       13. FileZilla Client Unspecified Remote Buffer Overflow Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. SecurityFocus Microsoft Newsletter #291
       2. Restricting Remote Registry Access
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Protection from prying NSA eyes
By Mark Rasch
From the U.S. Fourth Amendment, the Stored Communications Act and U.S. wiretap
laws to the Pen-register statute, Mark Rasch looks at legal protections available to the telecommunication companies and individual Americans in the wake of the NSA's massive spying program.
http://www.securityfocus.com/columnists/403

2. Malicious cryptography, part two
By Frederic Raynal
This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses. Part two continues the discussion of armored viruses and then looks at a Bradley worm - a worm that uses cryptography in such a way that it cannot be analyzed. Then it is shown how Skype can be used for malicious purposes, with a crypto-virus that is very difficult to detect.
http://www.securityfocus.com/infocus/1866


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. BitZipper Remote Directory Traversal Vulnerability
BugTraq ID: 18065
Remote: Yes
Date Published: 2006-05-22
Relevant URL: http://www.securityfocus.com/bid/18065
Summary:
Reportedly, an attacker can carry out attacks similar to directory traversals. These issues present themselves when the application processes malicious archives.

A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. Successful exploits may aid in further attacks.

2. Sun Java Runtime Environment Nested Array Objects Denial Of Service Vulnerability
BugTraq ID: 18058
Remote: Yes
Date Published: 2006-05-22
Relevant URL: http://www.securityfocus.com/bid/18058
Summary:
The Sun Java Runtime Environment is vulnerable to a denial-of-service vulnerability. This issue is due to the software's failure to handle exceptional conditions.

This issue is reported to affect Java Runtime Environment versions up to 1.4.2_11 and 1.5.0_06. This issue will crash Internet browsers running an affected Java plug-in.

An attacker may exploit this issue to cause a vulnerable application -- as well as all processes spawned from the application -- to crash, denying service to legitimate users. Due to the scope of the crash, data loss may occur.

3. Invision Power Board Multiple Arbitrary PHP Code Execution Vulnerabilities
BugTraq ID: 18040
Remote: Yes
Date Published: 2006-05-19
Relevant URL: http://www.securityfocus.com/bid/18040
Summary:
Invision Power Board is prone to multiple remote code-execution vulnerabilities. These issues may allow an attacker to gain unauthorized access to a vulnerable computer by executing arbitrary PHP code.

These issues affect versions 2.1.6 and 2.0.4; earlier versions are also vulnerable.

4. Microsoft Word Unspecified Remote Code Execution Vulnerability
BugTraq ID: 18037
Remote: Yes
Date Published: 2006-05-19
Relevant URL: http://www.securityfocus.com/bid/18037
Summary:
Microsoft Word is prone to an unspecified remote code-execution vulnerability.

Reports indicate that this issue can allow remote attackers to execute arbitrary code on a vulnerable computer by supplying a malicious Word document to a user. This issue is being actively exploited in the wild to place a backdoor named Backdoor.Ginwui on targeted computers through a trojan named Trojan.Mdropper.H.

Due to a lack of details, further information is not available at the moment. This BID will be updated as more details become available.

5. Novell eDirectory Server Long URI iMonitor Buffer Overflow Vulnerability
BugTraq ID: 18026
Remote: Yes
Date Published: 2006-05-18
Relevant URL: http://www.securityfocus.com/bid/18026
Summary:
The Novell eDirectory Server iMonitor is prone to a buffer-overflow vulnerability. Successfully exploiting this issue could allow arbitrary code execution with administrative privileges.

iMonitor version 2.4, which is included with eDirectory version 8.8, is vulnerable to this issue; other versions may also be affected.

6. Ipswitch WhatsUp Professional 2006 Authentication Bypass Vulnerability
BugTraq ID: 18019
Remote: Yes
Date Published: 2006-05-17
Relevant URL: http://www.securityfocus.com/bid/18019
Summary:
Ipswitch WhatsUp Professional 2006 is susceptible to a remote authentication-bypass vulnerability.

This issue allows remote attackers to gain administrative access to the web-based administrative interface of the application. This will aid them in further network attacks.

7. MP3Info Unspecified Buffer Overflow Vulnerability
BugTraq ID: 18016
Remote: Yes
Date Published: 2006-05-17
Relevant URL: http://www.securityfocus.com/bid/18016
Summary:
MP3Info is prone to a buffer-overflow vulnerability. The application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

This issue allows attackers to execute arbitrary machine code in the context of users running the affected application.

Version 0.8.4 of MP3Info is vulnerable to this issue; other versions may also be affected.

8. Hitachi EUR Unspecified SQL Injection Vulnerability
BugTraq ID: 18015
Remote: Yes
Date Published: 2006-05-17
Relevant URL: http://www.securityfocus.com/bid/18015
Summary:
Hitachi EUR is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

A successful attack could allow an attacker to compromise the application, access or modify data, gain administrative access to the application, or exploit vulnerabilities in the underlying database implementation.

9. Microsoft Windows Impersonation Privilege Escalation Weakness
BugTraq ID: 18008
Remote: Yes
Date Published: 2006-05-16
Relevant URL: http://www.securityfocus.com/bid/18008
Summary:
Microsoft Windows is susceptible to a weakness that may allow attackers to gain elevated privileges. This issue is due to the ability of services to impersonate clients after they have authenticated.

Microsoft encourages the use of the 'Local Service' and 'Network Service' accounts to mitigate the consequences of exploiting vulnerabilities in services. Attackers exploiting latent vulnerabilities in services running with these low-privilege accounts may take advantage of this weakness to gain elevated privileges.

Under certain circumstances, this issue may aid attackers who can exploit latent vulnerabilities in low-privileged services in gaining elevated privileges, allowing them to fully compromise targeted computers.

This issue is similar to the one documented in BID 8276 (Microsoft SQL Server / MSDE Named Pipes Privilege Escalation Vulnerability).LoadDocument.aspx?guid=4E4FB9BA810E48B186E99FAFC7E3462C

10. Caucho Resin Viewfile Information Disclosure Vulnerability
BugTraq ID: 18007
Remote: Yes
Date Published: 2006-05-16
Relevant URL: http://www.securityfocus.com/bid/18007
Summary:
Resin is prone to an information-disclosure vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve the contents of arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.

11. Pragma FortressSSH SSH_MSG_KEXINIT Remote Buffer Overflow Vulnerability
BugTraq ID: 17991
Remote: Yes
Date Published: 2006-05-16
Relevant URL: http://www.securityfocus.com/bid/17991
Summary:
A remote buffer-overflow vulnerability exits in FortressSSH.

This issue may permit remote code execution in vulnerable servers. A complete compromise leading to SYSTEM level access may be possible.

FortressSSH 4.0.7.20 is reported vulnerable. Other versions may be affected as well.

12. Raydium Multiple Remote Buffer Overflow and Denial Of Service Vulnerabilities
BugTraq ID: 17986
Remote: Yes
Date Published: 2006-05-15
Relevant URL: http://www.securityfocus.com/bid/17986
Summary:
Raydium is susceptible to multiple remote vulnerabilities:

- Multiple buffer-overflow vulnerabilities in both client and server instances.
- A format-string vulnerability in both client and server instances.
- A NULL-pointer dereference denial-of-service vulnerability in both client and server instances.
- A buffer-overflow vulnerability in client instances.

These vulnerabilities allow remote attackers to execute arbitrary machine code in the context of affected client and server instances of games that use the affected game engine software. Attackers may also crash vulnerable instances, denying service to legitimate users.

13. FileZilla Client Unspecified Remote Buffer Overflow Vulnerability
BugTraq ID: 17972
Remote: Yes
Date Published: 2006-05-15
Relevant URL: http://www.securityfocus.com/bid/17972
Summary:
FileZilla client is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

FileZilla versions prior to 2.2.23 are vulnerable to this issue.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #291
http://www.securityfocus.com/archive/88/434273

2. Restricting Remote Registry Access
http://www.securityfocus.com/archive/88/433671

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
This issue is sponsored by: Lancope

"Revolutionize the way you view your network security"
How do you protect what you can't see? Stop protecting while blind. Gain network visibility now. Learn how Cisco NetFlow gives visibility and enables cost-effective security across distributed enterprise networks. StealthWatch, the veteran Network Behavior Analysis (NBA) and Response solution, leverages Cisco NetFlow to provide scalable, internal network security. ALERT: Download FREE White Paper "Network Behavior Analysis (NBA) in the Enterprise."

http://www.lancope.com/resource/




---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to