SecurityFocus Microsoft Newsletter #299
----------------------------------------
This issue is Sponsored by: SPI Dynamics
ALERT: "How A Hacker Launches A LDAP Injection Attack!" - White Paper
It's as simple as placing additional LDAP query commands into a Web form input
box giving hackers complete access to all your backend systems! Firewalls and
IDS will not stop such attacks because LDAP Injections are seen as valid data.
Download this *FREE* white paper from SPI Dynamics for a complete guide to
protection!
https://download.spidynamics.com/1/ad/LD.asp?Campaign_ID=70160000000CYIn
------------------------------------------------------------------
I. FRONT AND CENTER
1. Basic journey of a packet
2. Windows genuine disadvantage
II. MICROSOFT VULNERABILITY SUMMARY
1. Microsoft Excel File Rebuilding Remote Code Execution Vulnerability
2. Microsoft Internet Explorer HtmlDlgSafeHelper Remote Denial Of
Service Vulnerability
3. Samba Internal Data Structures Denial of Service Vulnerability
4. Microsoft Windows DHCP Client Service Remote Code Execution
Vulnerability
5. EBay Enhanced Picture Service ActiveX Remote Buffer Overflow
Vulnerability
6. Microsoft ASP.NET Application Folder Information Disclosure
Vulnerability
7. MIMESweeper For Web Access Denied Cross-site Scripting Vulnerability
8. Microsoft Office Malformed GIF File Remote Code Execution
Vulnerability
9. Microsoft Office Malformed PNG File Remote Code Execution
Vulnerability
10. Microsoft Office String Parsing Remote Code Execution Vulnerability
11. Microsoft Office Property Code Execution Vulnerability
12. Microsoft Excel LABEL Record Remote Code Execution Vulnerability
13. SIPfoundry SIPXtapi CSeq Processing Remote Buffer-Overflow
Vulnerability
14. Microsoft Office MSO.DLL LsCreateLine() Potential Code Execution
Vulnerability
15. Microsoft Internet Explorer Object.Microsoft.DXTFilter Denial Of
Service Vulnerability
16. Microsoft Internet Explorer DirectAnimation.DAUserData Denial Of
Service Vulnerability
17. Microsoft Internet Explorer 6 RDS.DataControl Denial Of Service
Vulnerability
18. Microsoft Windows Server Driver Remote Information Disclosure
Vulnerability
19. Microsoft Excel FNGROUPCOUNT Record Remote Code Execution
Vulnerability
20. Microsoft Office Malformed String Parsing Code Execution
Vulnerability
21. Microsoft Excel COLINFO Record Remote Code Execution Vulnerability
22. Microsoft Excel OBJECT Record Remote Code Execution Vulnerability
23. Microsoft Excel Selection Record Variant Remote Code Execution
Vulnerability
24. Microsoft Internet Explorer Table Frameset Denial Of Service
Vulnerability
25. Microsoft Excel Style Handling and Repair Remote Code Execution
Vulnerability
26. Microsoft Windows Server Driver Mailslot Remote Heap Buffer Overflow
Vulnerability
27. Sparklet Remote Format String Vulnerability
28. Microsoft July Advance Notification Multiple Vulnerabilities
29. WebEx ActiveX Multiple Remote Code Execution Vulnerabilities
30. Microsoft IIS ASP Remote Code Execution Vulnerability
31. Microsoft Internet Explorer Structured Graphics Control Denial Of
Service Vulnerability
32. Microsoft Excel Selection Record Remote Code Execution Vulnerability
33. Retired: RARLAB WinRAR Self-Extracting Archive Buffer Overflow
Vulnerability
34. Windows Explorer Explorer.exe Denial Of Service Vulnerability
35. COWON America JetAudio Audio File ID Tag Remote Buffer Overflow
Vulnerability
36. Microsoft Internet Explorer Href Title Denial Of Service
Vulnerability
37. Zone Labs ZoneAlarm Registry Key Local Denial Of Service
Vulnerability
38. Invision Power Board Index.PHP Act Parameter SQL Injection
Vulnerability
39. NASCAR Racing UDP Datagram Remote Denial of Service Vulnerability
40. Microsoft Internet Explorer ADODB.Recordset Filter Property Denial
of Service Vulnerability
41. Microsoft Internet Explorer OutlookExpress.AddressBook Denial of
Service Vulnerability
42. Communigate Pro Server Pop Denial of Service Vulnerability
43. Microsoft Internet Explorer HHCtrl ActiveX Control Memory Corruption
Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. DACLS for software distribution points...
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Basic journey of a packet
By Don Parker
The purpose of this introductory article is to look at basic look at the
journey of a packet across the Internet, from packet creation to switches,
routers, NAT, and so on. This topic is recommended for those who are new to the
networking and security field and may not have a basic understanding of the
underlying process.
http://www.securityfocus.com/infocus/1870
2. Windows genuine disadvantage
By Mark Rasch
A recent lawsuit filed against Microsoft should have all companies reexamining
their privacy policies to determine what information they are actually
collecting about customers, and what they can possibly do with it.
http://www.securityfocus.com/columnists/409
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft Excel File Rebuilding Remote Code Execution Vulnerability
BugTraq ID: 18938
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18938
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
2. Microsoft Internet Explorer HtmlDlgSafeHelper Remote Denial Of Service
Vulnerability
BugTraq ID: 18929
Remote: Yes
Date Published: 2006-07-10
Relevant URL: http://www.securityfocus.com/bid/18929
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
3. Samba Internal Data Structures Denial of Service Vulnerability
BugTraq ID: 18927
Remote: Yes
Date Published: 2006-07-10
Relevant URL: http://www.securityfocus.com/bid/18927
Summary:
The smbd daemon is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to consume excessive memory resources
ultimately crashing the affected application.
This issue affects Samba versions 3.0.1 through 3.0.22 inclusive.
4. Microsoft Windows DHCP Client Service Remote Code Execution Vulnerability
BugTraq ID: 18923
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18923
Summary:
Microsoft Windows DHCP Client service is susceptible to a remote code-execution
vulnerability. This issue is due to a failure of the service to properly bounds
check user-supplied input prior to copying it to an insufficiently-sized memory
buffer.
This vulnerability allows remote attackers to execute arbitrary machine code
with SYSTEM-level privileges on affected computers. This facilitates the
complete compromise of affected computers.
5. EBay Enhanced Picture Service ActiveX Remote Buffer Overflow Vulnerability
BugTraq ID: 18921
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18921
Summary:
eBay Enhanced Picture Service ActiveX control is prone to a buffer overflow
vulnerability because it fails to properly bounds-check user-supplied input
before copying it to an insufficiently sized memory buffer.
An attacker could exploit this issue by creating a malicious web page that
would initialize the ActiveX controller and execute arbitrary code within the
context of the user.
This issue could allow an attacker to execute arbitrary code.
This issue affects versions 1.0.3.36 and prior.
6. Microsoft ASP.NET Application Folder Information Disclosure Vulnerability
BugTraq ID: 18920
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18920
Summary:
ASP.NET is prone to an information-disclosure vulnerability. This issue is due
to a failure in the applications to properly validate user-supplied input.
An attacker can exploit this issue to retrieve potentially sensitive
information. Information retrieved may aid in further attacks.
7. MIMESweeper For Web Access Denied Cross-site Scripting Vulnerability
BugTraq ID: 18916
Remote: Yes
Date Published: 2006-07-10
Relevant URL: http://www.securityfocus.com/bid/18916
Summary:
MIMESweeper For Web is prone to a cross-site scripting vulnerability because it
fails to sanitize input before displaying it to users of the application.
An attacker may leverage this issue to have arbitrary script code execute in
the browser of an unsuspecting user in the context of the affected site. This
may help the attacker steal cookie-based authentication credentials and launch
other attacks.
8. Microsoft Office Malformed GIF File Remote Code Execution Vulnerability
BugTraq ID: 18915
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18915
Summary:
Microsoft Office is prone to a remote code-execution vulnerability when
handling a malformed GIF file.
The issue occurs when an Office application such as Excel, Word, or PowerPoint
tries to open a malformed GIF file.
An attacker could exploit this vulnerability to cause memory corruption and
subsequently the execution of malicious code in the context of the user running
the affected application.
9. Microsoft Office Malformed PNG File Remote Code Execution Vulnerability
BugTraq ID: 18913
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18913
Summary:
Microsoft Office is prone to a remote code-execution vulnerability when
handling a malformed PNG graphic file.
The issue occurs when an Office application such as Excel, Word, or PowerPoint
tries to open a malformed PNG graphic file.
An attacker could exploit this vulnerability to cause memory corruption and
subsequently the execution of malicious code in the context of the user running
the affected application.
10. Microsoft Office String Parsing Remote Code Execution Vulnerability
BugTraq ID: 18912
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18912
Summary:
Microsoft Office is susceptible to a remote code-execution vulnerability. This
issue is due to a failure of the application to properly handle malformed
strings in Office documents.
Successfully exploiting this issue allows attackers to execute arbitrary code
in the context of targeted users.
11. Microsoft Office Property Code Execution Vulnerability
BugTraq ID: 18911
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18911
Summary:
Microsoft Office is prone to a code-execution vulnerability. This is due to a
failure to handle exceptional conditions.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
12. Microsoft Excel LABEL Record Remote Code Execution Vulnerability
BugTraq ID: 18910
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18910
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
13. SIPfoundry SIPXtapi CSeq Processing Remote Buffer-Overflow Vulnerability
BugTraq ID: 18906
Remote: Yes
Date Published: 2006-07-10
Relevant URL: http://www.securityfocus.com/bid/18906
Summary:
The sipXtapi product is reported to be prone to a remote buffer-overflow
vulnerability. This issue presents itself when the application handles a
specially crafted 'CSeq' value.
A successful attack may lead to unauthorized remote access in the context of a
user running an affected application that uses the vulnerable library.
Reports indicate that sipXtapi versions that were released prior to March 24,
2006 are vulnerable to this issue. Certain PingTel products and versions of AOL
Triton may be affected because they employ the vulnerable library.
14. Microsoft Office MSO.DLL LsCreateLine() Potential Code Execution
Vulnerability
BugTraq ID: 18905
Remote: Yes
Date Published: 2006-07-08
Relevant URL: http://www.securityfocus.com/bid/18905
Summary:
Microsoft Office is reported to be prone to a potential code execution
vulnerability.
This vulnerability occurs when the application handles a specially crafted
document. A successful attack may result in a remote compromise in the context
of an affected user. Attack attempts may result in a denial of service
condition as well.
Reports indicate that this issue can be triggered with a malicious Microsoft
Word document; however, other Microsoft Office applications that employ the
vulnerable function are vulnerable as well.
15. Microsoft Internet Explorer Object.Microsoft.DXTFilter Denial Of Service
Vulnerability
BugTraq ID: 18903
Remote: Yes
Date Published: 2006-07-09
Relevant URL: http://www.securityfocus.com/bid/18903
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
16. Microsoft Internet Explorer DirectAnimation.DAUserData Denial Of Service
Vulnerability
BugTraq ID: 18902
Remote: Yes
Date Published: 2006-07-08
Relevant URL: http://www.securityfocus.com/bid/18902
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website that uses the 'DirectAnimation.DAUserData' object in a
malicious manner.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
17. Microsoft Internet Explorer 6 RDS.DataControl Denial Of Service
Vulnerability
BugTraq ID: 18900
Remote: Yes
Date Published: 2006-07-08
Relevant URL: http://www.securityfocus.com/bid/18900
Summary:
Microsoft Internet Explorer version 6 is reportedly prone to a
denial-of-service vulnerability because the application fails to perform
boundary checks before copying user-supplied data into sensitive process
buffers.
This issue is triggered when an attacker convinces a victim user to activate a
malicious ActiveX control object.
Remote attackers may exploit this issue to crash Internet Explorer 6,
effectively denying service to legitimate users.
A stack-based heap overflow may be possible, and as a result, remote code
execution in the context of the user running the affected application may
occur. This has not been confirmed.
18. Microsoft Windows Server Driver Remote Information Disclosure Vulnerability
BugTraq ID: 18891
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18891
Summary:
Microsoft Windows Server driver is susceptible to a remote
information-disclosure vulnerability. This issue is due to a flaw in the
handling of certain SMB traffic.
Exploiting this issue allows remote attackers to gain access to potentially
sensitive fragments of kernel memory. This may aid them in further attacks.
19. Microsoft Excel FNGROUPCOUNT Record Remote Code Execution Vulnerability
BugTraq ID: 18890
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18890
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
20. Microsoft Office Malformed String Parsing Code Execution Vulnerability
BugTraq ID: 18889
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18889
Summary:
Microsoft Office is prone to a code-execution vulnerability. This condition
can occur when a malformed string within an Office file is parsed.
This vulnerability is located in a shared library used by multiple Office
applications, potentially allowing many different attack vectors.
An attacker could exploit this issue by enticing a victim to load a malicious
Office file. If the vulnerability is successfully exploited, this could result
in execution of arbitrary code in the context of the currently logged in user.
This issue is different than the one described in BID 18912 (Microsoft Office
String Parsing Remote Code Execution Vulnerability)
21. Microsoft Excel COLINFO Record Remote Code Execution Vulnerability
BugTraq ID: 18888
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18888
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability. This is due
to a failure to handle exceptional conditions.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
22. Microsoft Excel OBJECT Record Remote Code Execution Vulnerability
BugTraq ID: 18886
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18886
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability. This is due
to a failure to handle exceptional conditions.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
23. Microsoft Excel Selection Record Variant Remote Code Execution
Vulnerability
BugTraq ID: 18885
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18885
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
24. Microsoft Internet Explorer Table Frameset Denial Of Service Vulnerability
BugTraq ID: 18873
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18873
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
25. Microsoft Excel Style Handling and Repair Remote Code Execution
Vulnerability
BugTraq ID: 18872
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18872
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to execute arbitrary code
in the context of targeted users.
A proof-of-concept malicious code named 'Trojan.Hongmosa' is actively
exploiting this vulnerability, which results in crashing Excel running on
Simplified Chinese, Traditional Chinese, Japanese, or Korean Windows.
Note that Microsoft Office applications include functionality to embed Office
files as objects contained in other Office files. As an example, Microsoft Word
files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
This issue is distinct from the issue described in BID 18422 (Microsoft Excel
Unspecified Remote Code Execution Vulnerability). Proof-of-concept 'Nanika.xls'
was originally thought to be related to BID 18422; however, reports indicate
that 'Nanika.xls' triggers this vulnerability.
26. Microsoft Windows Server Driver Mailslot Remote Heap Buffer Overflow
Vulnerability
BugTraq ID: 18863
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18863
Summary:
Microsoft Windows Server driver is susceptible to a remote heap buffer-overflow
vulnerability. This issue is due to a failure of the software to properly
bounds check user-supplied input prior to copying it to an insufficiently-sized
memory buffer.
Exploiting this issue allows anonymous, remote attackers to execute arbitrary
machine code in the context of the affected driver. This facilitates the
complete compromise of affected computers.
Microsoft Windows XP SP2 and Microsoft Windows Server 2003 SP1 are not
vulnerable to this issue in their default configuration.
27. Sparklet Remote Format String Vulnerability
BugTraq ID: 18862
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18862
Summary:
Sparklet is prone to a remote format-string vulnerability.
This is issue arises when the application displays a text string on the client
screen during a match.
A successful exploit could result in executing arbitrary code or crashing the
application.
Versions 0.9.4try3 and previous versions are vulnerable to this issue.
28. Microsoft July Advance Notification Multiple Vulnerabilities
BugTraq ID: 18861
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18861
Summary:
Microsoft has released advance notification that the vendor will be releasing
twelve security bulletins for Windows on July 11, 2006. The highest severity
rating for these issues is 'Critical'.
Further details about these issues are not currently available. Individual BIDs
will be created and this record will be removed when the security bulletins are
released.
29. WebEx ActiveX Multiple Remote Code Execution Vulnerabilities
BugTraq ID: 18860
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18860
Summary:
WebEx ActiveX control is prone to multiple remote code-execution
vulnerabilities.
An attacker could exploit these issues by creating a malicious web page that
would initialize the WebEx ActiveX control, and then download and initialize
malicious DLL files.
This issue could allow an attacker to execute arbitrary code.
Versions 2.0.0.7 and prior are affected.
30. Microsoft IIS ASP Remote Code Execution Vulnerability
BugTraq ID: 18858
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18858
Summary:
Microsoft Internet Information Server (IIS) is susceptible to a remote
code-execution vulnerability. This issue is due to a failure of the application
to properly bounds check user-supplied input prior to copying it to an
insufficiently-sized memory buffer.
Attackers must have the ability to place and execute malicious ASP pages on
computers running the affected ASP server software to exploit this issue. This
may be an issue in shared-hosting environments.
This issue allows remote attackers to execute arbitrary machine code in the
context of the affected web server software.
31. Microsoft Internet Explorer Structured Graphics Control Denial Of Service
Vulnerability
BugTraq ID: 18855
Remote: Yes
Date Published: 2006-07-06
Relevant URL: http://www.securityfocus.com/bid/18855
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability
because it fails to handle ActiveX controls properly.
This issue is triggered when an attacker convinces a victim user to activate a
malicious ActiveX control.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
32. Microsoft Excel Selection Record Remote Code Execution Vulnerability
BugTraq ID: 18853
Remote: Yes
Date Published: 2006-07-11
Relevant URL: http://www.securityfocus.com/bid/18853
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to corrupt process memory,
and execute arbitrary code in the context of targeted users.
Note that MS Office applications include functionality to embed Office files as
objects contained in other Microsoft Office files. As an example, Microsoft
Word files may contain embedded malicious Microsoft Excel files, making Word
documents another possible attack vector.
33. Retired: RARLAB WinRAR Self-Extracting Archive Buffer Overflow
Vulnerability
BugTraq ID: 18851
Remote: Yes
Date Published: 2006-07-05
Relevant URL: http://www.securityfocus.com/bid/18851
Summary:
A client-side buffer overflow vulnerability exists in WinRAR.
A remote attacker may supply malicious self-extracting archives to a user to be
processed by WinRAR to exploit this issue.
A successful attack may result in a remote compromise in the context of the
vulnerable user.
WinRAR 3.60 and prior versions are affected.
Further reports indicate that the vulnerability lies in the code embedded in
self-extracting archives, therefore this issue requires that users directly
execute malicious EXE files. As users are already executing attacker-provided
executable files, nothing extra is gained by this vulnerability. This BID is
therefore retired.
34. Windows Explorer Explorer.exe Denial Of Service Vulnerability
BugTraq ID: 18838
Remote: Yes
Date Published: 2006-07-05
Relevant URL: http://www.securityfocus.com/bid/18838
Summary:
Microsoft Windows Explorer is prone to a denial of service vulnerability. The
application fails to handle malicious '.url' files properly while parsing the
URI file.
Remote attackers may exploit this issue to crash Internet Explorer, Windows
Explorer, and possibly others.
35. COWON America JetAudio Audio File ID Tag Remote Buffer Overflow
Vulnerability
BugTraq ID: 18825
Remote: Yes
Date Published: 2006-07-05
Relevant URL: http://www.securityfocus.com/bid/18825
Summary:
jetAudio is prone to a remote buffer-overflow vulnerability.
The vulnerability presents itself when the application handles a malicious
audio file.
A successful exploit may allow an attacker to gain unauthorized remote access
in the context of an affected user.
jetAudio version 6.2.6.8330 Basic is reported vulnerable. Other versions may be
affected as well.
36. Microsoft Internet Explorer Href Title Denial Of Service Vulnerability
BugTraq ID: 18820
Remote: Yes
Date Published: 2006-07-04
Relevant URL: http://www.securityfocus.com/bid/18820
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability
because of an error in processing an HTML 'href' tag with a very large title.
An attacker can exploit this vulnerability to cause the application to stop
responding, denying service to legitimate users.
37. Zone Labs ZoneAlarm Registry Key Local Denial Of Service Vulnerability
BugTraq ID: 18789
Remote: No
Date Published: 2006-07-03
Relevant URL: http://www.securityfocus.com/bid/18789
Summary:
ZoneAlarm is prone to a denial-of-service vulnerability because it fails to
properly handle exceptional conditions.
A local attacker can exploit this issue to cause an error in the application
and to crash the system, effectively denying service.
38. Invision Power Board Index.PHP Act Parameter SQL Injection Vulnerability
BugTraq ID: 18782
Remote: Yes
Date Published: 2006-07-03
Relevant URL: http://www.securityfocus.com/bid/18782
Summary:
Invision Power Board is prone to an SQL-injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.
Successful exploitation could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
Version 1.3 Final is affected; other versions may also be vulnerable to this
issue.
39. NASCAR Racing UDP Datagram Remote Denial of Service Vulnerability
BugTraq ID: 18778
Remote: Yes
Date Published: 2006-07-03
Relevant URL: http://www.securityfocus.com/bid/18778
Summary:
NASCAR Racing is prone to a denial-of-service vulnerability. This issue is due
to the application's failure to properly handle empty UDP datagrams.
The vulnerability allows remote attackers from external networks to block
communication between the client and the server.
This issue affects NASCAR Racing 4.1.3.1.6, NASCAR Racing 2002 Season 1.1.0.2,
and NASCAR Racing 2003 Sesason 1.2.0.1; other versions may also be vulnerable.
40. Microsoft Internet Explorer ADODB.Recordset Filter Property Denial of
Service Vulnerability
BugTraq ID: 18773
Remote: Yes
Date Published: 2006-07-03
Relevant URL: http://www.securityfocus.com/bid/18773
Summary:
Microsoft Internet Explorer is prone to a denial-of-service condition when
processing the 'ADODB.Recordset Filter Property' COM object.
A successful attack may cause the browser to fail due to a null-pointer
dereference.
41. Microsoft Internet Explorer OutlookExpress.AddressBook Denial of Service
Vulnerability
BugTraq ID: 18771
Remote: Yes
Date Published: 2006-07-02
Relevant URL: http://www.securityfocus.com/bid/18771
Summary:
Microsoft Internet Explorer is prone to a denial-of-service condition when
processing the 'OutlookExpress.AddressBook' COM object.
A successful attack may cause the browser to fail due to a null-pointer
dereference.
42. Communigate Pro Server Pop Denial of Service Vulnerability
BugTraq ID: 18770
Remote: Yes
Date Published: 2006-07-03
Relevant URL: http://www.securityfocus.com/bid/18770
Summary:
CommuniGate Pro Server is prone to a remote denial-of-service vulnerability.
This issue reportedly resides in the application's Pop component.
43. Microsoft Internet Explorer HHCtrl ActiveX Control Memory Corruption
Vulnerability
BugTraq ID: 18769
Remote: Yes
Date Published: 2006-07-02
Relevant URL: http://www.securityfocus.com/bid/18769
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. This
is related to the handling of the HHCtrl ActiveX control.
Attackers may exploit this issue via a malicious web page to execute arbitrary
code in the context of the currently logged-in user. Exploitation attempts may
lead to a denial-of-service condition as well. Attackers may also employ HTML
email to carry out an attack.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. DACLS for software distribution points...
http://www.securityfocus.com/archive/88/439301
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is Sponsored by: SPI Dynamics
ALERT: "How A Hacker Launches A LDAP Injection Attack!" - White Paper
It's as simple as placing additional LDAP query commands into a Web form input
box giving hackers complete access to all your backend systems! Firewalls and
IDS will not stop such attacks because LDAP Injections are seen as valid data.
Download this *FREE* white paper from SPI Dynamics for a complete guide to
protection!
https://download.spidynamics.com/1/ad/LD.asp?Campaign_ID=70160000000CYIn
---------------------------------------------------------------------------
---------------------------------------------------------------------------