SecurityFocus Microsoft Newsletter #294
----------------------------------------
This issue is sponsored by: SPI Dynamics
EASY TARGETS: Hacking Web Applications- A Step-by-Step Attack Analysis
The speed with which Web Applications are developed make them prime targets for
attackers, often these applications were developed so quickly that they are not
coded properly or subjected to any security testing. Hackers know this and use
it as their weapon. Download *FREE* white paper from SPI Dynamics for a
complete guide to protection!
https://download.spidynamics.com/1/ad/web.asp?cs1_ContSupRef=70130000000CRxF
------------------------------------------------------------------
I. FRONT AND CENTER
1. Browsers, phishing, and user interface design
2. Standards in desktop firewall policies
II. MICROSOFT VULNERABILITY SUMMARY
1. Microsoft June Advance Notification Multiple Vulnerabilities
2. Microsoft NetMeeting Remote Memory Corruption Denial of Service
Vulnerability
3. Multiple Vendor Web Browser JavaScript Key Filtering Vulnerability
4. TIBCO Rendezvous HTTP Interface Remote Buffer Overflow Vulnerability
5. TIBCO Hawk Configuration Interface Local Buffer Overflow Vulnerability
6. GD Graphics Library Remote Denial of Service Vulnerability
7. Microsoft Internet Explorer Frameset Denial of Service Vulnerability
8. Drupal Multiple Input Validation Vulnerabilities
9. Avast! Antivirus CHM Unpacker Unspecified Vulnerability
10. ASPNuke Article.ASP SQL Injection Vulnerability
11. F-Secure Multiple Products Web Console Buffer Overflow Vulnerability
12. Snort URIContent Rules Detection Evasion Vulnerability
13. Microsoft Internet Explorer MHTML URI Buffer Overflow Vulnerability
14. Etype Eserv Multiple Input Validation Vulnerabilities
15. Multiple Browser Marquee Denial of Service Vulnerability
16. Eitsop My Web Server Remote Denial of Service Vulnerability
17. Alt-N MDaemon Remote Pre-Authentication IMAP Buffer Overflow
Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Blackhat Vegas 2006 ISA Training Announcement
2. Windows XP Services Best Practice
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Browsers, phishing, and user interface design
By Scott Granneman
Phishing works for so many reasons, we need to rethink browser and user
interface design to provide some real-life security to the average user who
doesn't see or understand the security cues.
http://www.securityfocus.com/columnists/405
2. Standards in desktop firewall policies
By Phil Kostenbader and Bob Donnelly
The idea of a common desktop firewall policy in any size organization is a very
good thing. It makes responses to external or internal situations such as virus
outbreaks or network-oriented propagation of viruses more predictable. In
addition to providing a level of protection against port scanning, attacks or
software vulnerabilities, it can provide the organizations local security team
a baseline or starting point in dealing with such events.
http://www.securityfocus.com/infocus/1867
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft June Advance Notification Multiple Vulnerabilities
BugTraq ID: 18330
Remote: Yes
Date Published: 2006-06-08
Relevant URL: http://www.securityfocus.com/bid/18330
Summary:
Microsoft has released advance notification that they will be releasing twelve
security bulletins for Windows on June 13, 2006. The highest severity rating
for these issues is 'Critical'.
Further details about these issues are not currently available. Individual BIDs
will be created and this record will be removed when the security bulletins are
released.
2. Microsoft NetMeeting Remote Memory Corruption Denial of Service
Vulnerability
BugTraq ID: 18311
Remote: Yes
Date Published: 2006-06-07
Relevant URL: http://www.securityfocus.com/bid/18311
Summary:
Microsoft NetMeeting is prone to a remote memory-corruption vulnerability. This
issue is due to the application's failure to properly handle malformed network
traffic.
This issue allows remote attackers to crash affected applications or to consume
excessive CPU resources. Due to the nature of this issue, attackers might be
able to exploit this issue to execute arbitrary machine code in the context of
the vulnerable application, but this has not been confirmed.
Microsoft NetMeeting version 3.01 is vulnerable to this issue; other versions
may also be affected.
3. Multiple Vendor Web Browser JavaScript Key Filtering Vulnerability
BugTraq ID: 18308
Remote: Yes
Date Published: 2006-06-06
Relevant URL: http://www.securityfocus.com/bid/18308
Summary:
Multiple web browsers are prone to a JavaScript key-filtering vulnerability.
This issue is due to the failure of the browsers to securely handle keystroke
input from users.
This issue is demonstrated to allow attackers to divert keystrokes from one
input form in a webpage to a hidden file-upload dialog in the same page. This
may allow remote attackers to initiate file uploads from unsuspecting users.
Other attacks may also be possible.
Exploiting this issue requires that users manually type the full path of files
that attackers wish to download. This may require substantial typing from
targeted users, so attackers will likely use keyboard-based games, blogs, or
other similar pages to entice users to enter the required keyboard input to
exploit this issue.
Reportedly, Mozilla Suite, Mozilla Firefox, Mozilla SeaMonkey, Netscape
Navigator, and Microsoft Internet Explorer are all vulnerable to this issue.
4. TIBCO Rendezvous HTTP Interface Remote Buffer Overflow Vulnerability
BugTraq ID: 18301
Remote: Yes
Date Published: 2006-06-06
Relevant URL: http://www.securityfocus.com/bid/18301
Summary:
TIBCO Rendezvous is prone to a remote buffer-overflow vulnerability. This issue
is due to the application's failure to properly check boundaries of
user-supplied command-line argument data before copying it to an insufficiently
sized memory buffer.
Attackers may exploit this issue to execute arbitrary machine code in the
context of the affected application, facilitating the remote compromise of
affected computers. The affected component may be installed as a service with
administrative privileges on Microsoft Windows computers.
TIBCO Hawk versions prior to 4.6.1, TIBCO Runtime Agent versions prior to 5.4,
and TIBCO Rendezvous versions prior to 7.5.1 are vulnerable to this issue.
5. TIBCO Hawk Configuration Interface Local Buffer Overflow Vulnerability
BugTraq ID: 18300
Remote: No
Date Published: 2006-06-06
Relevant URL: http://www.securityfocus.com/bid/18300
Summary:
TIBCO Hawk is susceptible to a local buffer-overflow vulnerability. This issue
is due to the application's failure to properly check boundaries of
user-supplied command-line argument data before copying it to an insufficiently
sized memory buffer.
Attackers may exploit this issue to execute arbitrary machine code with
elevated privileges. This is a vulnerability only if the affected software is
installed with setuid-privileges on UNIX computers or if it is installed as a
service running with administrative privileges on Microsoft Windows computers.
TIBCO Hawk versions prior to 4.6.1 and TIBCO Runtime Agent versions prior to
5.4 are vulnerable to this issue.
6. GD Graphics Library Remote Denial of Service Vulnerability
BugTraq ID: 18294
Remote: Yes
Date Published: 2006-06-06
Relevant URL: http://www.securityfocus.com/bid/18294
Summary:
The GD Graphics Library is prone to a denial-of-service vulnerability.
Attackers can trigger an infinite-loop condition when the library tries to
handle malformed image files.
This issue allows attackers to consume excessive CPU resources on computers
that use the affected software. This may deny service to legitimate users.
GD version 2.0.33 is vulnerable to this issue; other versions may also be
affected.
7. Microsoft Internet Explorer Frameset Denial of Service Vulnerability
BugTraq ID: 18277
Remote: Yes
Date Published: 2006-06-05
Relevant URL: http://www.securityfocus.com/bid/18277
Summary:
Microsoft Internet Explorer is affected by a denial-of-service vulnerability.
This issue arises because the application fails to handle exceptional
conditions in a proper manner.
An attacker may exploit this issue by enticing a user to visit a malicious site
and then to click anywhere on the page. This results in a denial-of-service
condition in the application.
Internet Explorer version 6 is vulnerable to this issue; earlier versions may
also be affected.
8. Drupal Multiple Input Validation Vulnerabilities
BugTraq ID: 18245
Remote: Yes
Date Published: 2006-06-02
Relevant URL: http://www.securityfocus.com/bid/18245
Summary:
Drupal is prone to multiple input-validation vulnerabilities. The issues
include the execution of arbitrary files, cross-site scripting, and
SQL-injection vulnerabilities. These issues are due to a failure in the
application to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to
compromise the application, access or modify data, steal cookie-based
authentication credentials, or even exploit vulnerabilities in the underlying
database implementation. Other attacks are also possible.
9. Avast! Antivirus CHM Unpacker Unspecified Vulnerability
BugTraq ID: 18238
Remote: Yes
Date Published: 2006-06-02
Relevant URL: http://www.securityfocus.com/bid/18238
Summary:
Avast! Antivirus is prone to an unspecified vulnerability. This issue affects
the CHM unpacker.
This issue affects versions 4.7.827 and earlier.
10. ASPNuke Article.ASP SQL Injection Vulnerability
BugTraq ID: 18215
Remote: Yes
Date Published: 2006-06-01
Relevant URL: http://www.securityfocus.com/bid/18215
Summary:
ASPNuke is prone to an SQL-injection vulnerability. This issue is due to a
failure in the application to properly sanitize user-supplied input before
using it in an SQL query.
A successful exploit could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
11. F-Secure Multiple Products Web Console Buffer Overflow Vulnerability
BugTraq ID: 18201
Remote: Yes
Date Published: 2006-06-01
Relevant URL: http://www.securityfocus.com/bid/18201
Summary:
F-Secure Anti-Virus for Microsoft Exchange and F-Secure Internet Gatekeeper are
vulnerable to a buffer-overflow vulnerability.
The vulnerability presents itself in the application's Web Console. A
successful attack may lead to a denial-of-service condition or to the execution
of arbitrary code in the context of the application.
Note that by default, the Web Console is configured to accept connections from
localhost only. A remote threat would arise only if the application has been
configured to be remotely accessible. A local attacker may potentially exploit
this issue to gain elevated privileges as well.
12. Snort URIContent Rules Detection Evasion Vulnerability
BugTraq ID: 18200
Remote: Yes
Date Published: 2006-05-31
Relevant URL: http://www.securityfocus.com/bid/18200
Summary:
Snort is reportedly prone to a vulnerability that may allow malicious packets
to bypass detection.
A successful attack can allow attackers to bypass intrusion detection and to
carry out attacks against computers protected by Snort.
This vulnerability affects Snort 2.4.4. Other versions may be vulnerable as
well.
13. Microsoft Internet Explorer MHTML URI Buffer Overflow Vulnerability
BugTraq ID: 18198
Remote: Yes
Date Published: 2006-05-31
Relevant URL: http://www.securityfocus.com/bid/18198
Summary:
Microsoft Internet Explorer is susceptible to a remote buffer-overflow
vulnerability in 'INETCOMM.DLL'. The application fails to properly bounds-check
user-supplied input data before copying it into an insufficiently sized memory
buffer.
Remote attackers may exploit this issue to crash applications that use the
affected library. This includes Internet Explorer, Windows Explorer, and
possibly others. Remote code execution may also be possible, but this has not
been confirmed.
14. Etype Eserv Multiple Input Validation Vulnerabilities
BugTraq ID: 18179
Remote: Yes
Date Published: 2006-05-31
Relevant URL: http://www.securityfocus.com/bid/18179
Summary:
Eserv is prone to multiple input-validation vulnerabilities. These issues
include directory-traversal and code-disclosure vulnerabilities.
An attacker can exploit these issues to read other users' email messages,
create and rename directories, delete arbitrary empty directories, and access
the source code of arbitrary script files.
These issues affect version 3.25; other versions may also be vulnerable.
15. Multiple Browser Marquee Denial of Service Vulnerability
BugTraq ID: 18165
Remote: Yes
Date Published: 2006-05-30
Relevant URL: http://www.securityfocus.com/bid/18165
Summary:
Multiple browsers are prone to a denial-of-service vulnerability when parsing
certain HTML content.
Successfully exploiting this issue allows attackers to consume excessive CPU
resources in affected browsers, denying service to legitimate users.
Mozilla Firefox version 1.5.0.3 is vulnerable to this issue; other versions and
products may also be affected.
Internet Explorer 6.0 on Microsoft Windows XP is reported vulnerable to this
issue; other versions may also be affected.
16. Eitsop My Web Server Remote Denial of Service Vulnerability
BugTraq ID: 18144
Remote: Yes
Date Published: 2006-05-29
Relevant URL: http://www.securityfocus.com/bid/18144
Summary:
My Web Server is prone to a remote denial-of-service vulnerability. This issue
is due to a failure in the application to handle exceptional conditions.
This vulnerability allows remote attackers to crash the server, denying further
service to legitimate users.
This issue affects version 1.0; other versions may also be vulnerable.
17. Alt-N MDaemon Remote Pre-Authentication IMAP Buffer Overflow Vulnerability
BugTraq ID: 18129
Remote: Yes
Date Published: 2006-05-29
Relevant URL: http://www.securityfocus.com/bid/18129
Summary:
Alt-N MDaemon IMAP Server is susceptible to a remote buffer-overflow
vulnerability. This issue is due to the application's failure to properly
bounds-check user-supplied input before copying it to an insufficiently sized
memory buffer.
This issue allows remote, unauthenticated attackers to execute arbitrary
machine code in the context of affected servers. This facilitates the complete
compromise of affected computers.
Specific information regarding affected versions is not currently available.
This BID will be updated as further information is disclosed.
UPDATE: The reporter of this issue states that this issue may not be
exploitable. This BID may be retired in the future.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Blackhat Vegas 2006 ISA Training Announcement
http://www.securityfocus.com/archive/88/436042
2. Windows XP Services Best Practice
http://www.securityfocus.com/archive/88/435926
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is sponsored by: SPI Dynamics
EASY TARGETS: Hacking Web Applications- A Step-by-Step Attack Analysis
The speed with which Web Applications are developed make them prime targets for
attackers, often these applications were developed so quickly that they are not
coded properly or subjected to any security testing. Hackers know this and use
it as their weapon. Download *FREE* white paper from SPI Dynamics for a
complete guide to protection!
https://download.spidynamics.com/1/ad/web.asp?cs1_ContSupRef=70130000000CRxF
---------------------------------------------------------------------------
---------------------------------------------------------------------------