SecurityFocus Microsoft Newsletter #302
----------------------------------------
This issue is Sponsored by: Black Hat
Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas.
World renowned security experts reveal tomorrow's threats today. Free of vendor
pitches, the Briefings are designed to be pragmatic regardless of your
security environment. Featuring 36 hands-on training courses and 10 conference
tracks, networking opportunities with over 2,500 delegates from 40+ nations.
http://www.blackhat.com
------------------------------------------------------------------
I. FRONT AND CENTER
1. E-mail privacy in the workplace
II. MICROSOFT VULNERABILITY SUMMARY
1. Symantec On-Demand Protection Encrypted Data Information Disclosure
Vulnerability
2. Easy File Sharing FTP Server Pass Command Remote Buffer Overflow
Vulnerability
3. Microsoft PowerPoint Unspecified Code Execution Vulnerability
4. Microsoft Internet Explorer Deleted Frame Object Denial Of Service
Vulnerability
5. Microsoft Internet Explorer ADODB.Recordset NextRecordset Denial of
Service Vulnerability
6. Microsoft Windows Graphical Device Interface Plus Library Denial Of
Service Vulnerability
7. Microsoft Windows SMB PIPE Remote Denial of Service Vulnerability
8. Yahoo! Messenger Remote Search String Arbitrary Browser Navigation
Vulnerability
9. InterActual Player ITIRecorder.MicRecorder ActiveX Control Remote
Buffer Overflow Vulnerability
10. Microsoft Internet Explorer NDFXArtEffects Stack Overflow
Vulnerability
11. Internet Security Systems SMB Mailslot Parsing Denial of Service
Vulnerability
12. eIQNetworks Enterprise Security Analyzer Multiple Syslog Daemon
Buffer Overflow Vulnerabilities
13. eIQNetworks Enterprise Security Analyzer SyslogServer.EXE Buffer
Overflow Vulnerability
14. eIQnetworks Enterprise Security Analyzer Topology Server Remote
Buffer Overflow Vulnerability
15. eIQnetworks Enterprise Security Analyzer License Manager Remote
Buffer Overflow Vulnerability
16. Intervations FileCopa Directory Arguments Mutiple Buffer Overflow
Vulnerabilities
17. AGEphone SIP Packet Handling Buffer Overflow Vulnerability
18. Microsoft Internet Explorer Native Function Iterator Denial Of
Service Vulnerability
19. Microsoft Windows Remote Denial of Service Vulnerability
20. Opsware NAS Root Password Information Disclosure Vulnerability
21. Microsoft Internet Explorer NMSA.ASFSourceMediaDescription Stack
Overflow Vulnerability
22. Microsoft Internet Explorer Multiple Object ListWidth Property
Denial Of Service Vulnerability
23. Microsoft Internet Explorer Internet.HHCtrl Click Denial Of Service
Vulnerability
24. Password Safe Local Insecure Idle Timeout Lock Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Domain admin mailbox rights on Exchange 2003
2. username change best practices...
3. [Administrivia] Guest moderator
4. MS Exchange
5. Impact of removing administrative rights in an enterprise running XP
6. .Net Satisfies Security Compliance Satistactions or Not ???
7. API hooking
8. Co-Hosting SQL with IIS FTP service
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. E-mail privacy in the workplace
By Mark Rasch
Even with a well-heeled corporate privacy policy stating that all employee
communications may be monitored in the workplace, the legality of e-mail
monitoring is not as clear cut as one might think.
http://www.securityfocus.com/columnists/412
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Symantec On-Demand Protection Encrypted Data Information Disclosure
Vulnerability
BugTraq ID: 19248
Remote: No
Date Published: 2006-07-31
Relevant URL: http://www.securityfocus.com/bid/19248
Summary:
Symantec On-Demand Protection (SODP) and On-Demand Agent (SODA) are prone to a
vulnerability that could disclose potentially sensitive information.
An attacker may be able to decrypt the files saved by the applications. The
impact of this issue will depend on the information disclosed.
This issue affects SODA versions 2.5 MR2 (build 2156) and earlier, and SODP
versions 2.6 (build 2232) and earlier. This issue only affects the Microsoft
Windows versions of the applications.
2. Easy File Sharing FTP Server Pass Command Remote Buffer Overflow
Vulnerability
BugTraq ID: 19243
Remote: Yes
Date Published: 2006-07-31
Relevant URL: http://www.securityfocus.com/bid/19243
Summary:
Easy File Sharing FTP Server is prone to a buffer-overflow vulnerability
because the application fails to do proper bounds checking on user-supplied
data before storing it in a finite-sized buffer.
An attacker can exploit this issue to execute arbitrary machine code in the
context of the affected server application.
Version 2.0 is vulnerable to this issue; other versions may also be affected.
3. Microsoft PowerPoint Unspecified Code Execution Vulnerability
BugTraq ID: 19229
Remote: Yes
Date Published: 2006-07-30
Relevant URL: http://www.securityfocus.com/bid/19229
Summary:
Microsoft PowerPoint is prone to an unspecified code-execution vulnerability.
A proof-of-concept exploit file designed to trigger this vulnerability has been
released. This issue arises when a vulnerable user opens a malicious read-only
PowerPoint file and then closes it.
It is currently unknown if this exploit file pertains to a newly discovered,
unpublished vulnerability or if this exploits a previously disclosed issue.
This issue may be related to one of the vulnerabilities described in BID 18993
(Microsoft Powerpoint Multiple Unspecified Vulnerabilities). If further
analysis reveals that this issue is related to an existing BID, this record
will be retired.
Microsoft PowerPoint 2003 SP2 French Edition is reported vulnerable to this
issue; other versions may also be affected.
4. Microsoft Internet Explorer Deleted Frame Object Denial Of Service
Vulnerability
BugTraq ID: 19228
Remote: Yes
Date Published: 2006-07-29
Relevant URL: http://www.securityfocus.com/bid/19228
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability. This
issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
5. Microsoft Internet Explorer ADODB.Recordset NextRecordset Denial of Service
Vulnerability
BugTraq ID: 19227
Remote: Yes
Date Published: 2006-07-29
Relevant URL: http://www.securityfocus.com/bid/19227
Summary:
Microsoft Internet Explorer is prone to a denial-of-service condition when
processing the 'NextRecordset' method of the 'ADODB.Recordset' object.
A successful attack may cause the browser to fail.
6. Microsoft Windows Graphical Device Interface Plus Library Denial Of Service
Vulnerability
BugTraq ID: 19221
Remote: Yes
Date Published: 2006-07-29
Relevant URL: http://www.securityfocus.com/bid/19221
Summary:
Reportedly, the Microsoft Windows GDI+ library 'gdiplus.dll' is prone to a
denial-of-service vulnerability because the software fails to handle malformed
image files properly.
An attacker may leverage this issue to trigger a denial-of-service condition in
software implementing the vulnerable library. Other attacks may also be
possible.
7. Microsoft Windows SMB PIPE Remote Denial of Service Vulnerability
BugTraq ID: 19215
Remote: Yes
Date Published: 2006-07-28
Relevant URL: http://www.securityfocus.com/bid/19215
Summary:
Microsoft Windows is reportedly prone to a remote denial-of-service
vulnerability because the operating system fails to properly handle network
traffic.
This issue may cause affected computers to crash, denying service to legitimate
users.
Reports indicate this issue may be currently exploited in the wild; this has
not been confirmed.
8. Yahoo! Messenger Remote Search String Arbitrary Browser Navigation
Vulnerability
BugTraq ID: 19211
Remote: Yes
Date Published: 2006-07-28
Relevant URL: http://www.securityfocus.com/bid/19211
Summary:
Yahoo! Messenger is prone to a browser-navigation vulnerability that may permit
a remote attacker to open a browser window on the victim user's computer to an
arbitrary page.
This issue occurs because the application fails to sanitize malicious messages.
An attacker may be able to exploit this issue to execute a web browser and load
an arbitrary web page. This may lead to other attacks.
This issue affects version 7.5.0.814; other versions may also be vulnerable.
9. InterActual Player ITIRecorder.MicRecorder ActiveX Control Remote Buffer
Overflow Vulnerability
BugTraq ID: 19205
Remote: Yes
Date Published: 2006-07-28
Relevant URL: http://www.securityfocus.com/bid/19205
Summary:
InterActual Player ITIRecorder.MicRecorder ActiveX control is prone to a
buffer-overflow vulnerability because it fails to properly bounds-check
user-supplied input before copying it to an insufficiently sized memory buffer.
An attacker could exploit this issue by creating a malicious web page that
would initialize the ActiveX controller and execute arbitrary code within the
context of the user.
This issue could allow an attacker to execute arbitrary code.
This issue affects versions 2.60.12.0201 with IARECORD.DLL (1.07.11.0620).
Other versions may be vulnerable as well.
10. Microsoft Internet Explorer NDFXArtEffects Stack Overflow Vulnerability
BugTraq ID: 19184
Remote: Yes
Date Published: 2006-07-27
Relevant URL: http://www.securityfocus.com/bid/19184
Summary:
Microsoft Internet Explorer is prone to a stack-overflow vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
11. Internet Security Systems SMB Mailslot Parsing Denial of Service
Vulnerability
BugTraq ID: 19178
Remote: Yes
Date Published: 2006-07-26
Relevant URL: http://www.securityfocus.com/bid/19178
Summary:
The Internet Security Systems implementation of SMB/TCP Mailslot is prone to a
denial-of-service vulnerability. This issue is due to a design error when
dealing with certain legitimate SMB Mailslot traffic.
An attacker can exploit this issue to crash the affected service, effectively
denying service to legitimate users.
12. eIQNetworks Enterprise Security Analyzer Multiple Syslog Daemon Buffer
Overflow Vulnerabilities
BugTraq ID: 19167
Remote: Yes
Date Published: 2006-07-26
Relevant URL: http://www.securityfocus.com/bid/19167
Summary:
eIQnetworks Enterprise Security Analyzer Syslog daemon is prone to multiple
remote buffer-overflow vulnerabilities.
These issues can facilitate a remote compromise due to arbitrary code
execution.
Enterprise Security Analyzer versions prior to 2.5.0 are vulnerable.
13. eIQNetworks Enterprise Security Analyzer SyslogServer.EXE Buffer Overflow
Vulnerability
BugTraq ID: 19165
Remote: Yes
Date Published: 2006-07-26
Relevant URL: http://www.securityfocus.com/bid/19165
Summary:
eIQnetworks Enterprise Security Analyzer Syslog daemon is prone to a remote
buffer-overflow vulnerability.
This issue can facilitate a remote compromise due to arbitrary code execution.
Enterprise Security Analyzer versions prior to 2.5.0 are vulnerable.
14. eIQnetworks Enterprise Security Analyzer Topology Server Remote Buffer
Overflow Vulnerability
BugTraq ID: 19164
Remote: Yes
Date Published: 2006-07-26
Relevant URL: http://www.securityfocus.com/bid/19164
Summary:
eIQnetworks Enterprise Security Analyzer Topology Server is prone to a remote
buffer-overflow vulnerability.
This issue can facilitate a remote compromise due to arbitrary code execution.
Enterprise Security Analyzer versions prior to 2.5.0 are vulnerable. OEM
vendors' versions prior to 4.6 are also vulnerable.
15. eIQnetworks Enterprise Security Analyzer License Manager Remote Buffer
Overflow Vulnerability
BugTraq ID: 19163
Remote: Yes
Date Published: 2006-07-26
Relevant URL: http://www.securityfocus.com/bid/19163
Summary:
eIQnetworks Enterprise Security Analyzer License Manager is prone to a remote
buffer-overflow vulnerability.
This issue can facilitate a remote compromise due to arbitrary code execution.
Enterprise Security Analyzer versions prior to 2.5.0 are vulnerable.
16. Intervations FileCopa Directory Arguments Mutiple Buffer Overflow
Vulnerabilities
BugTraq ID: 19153
Remote: Yes
Date Published: 2006-07-25
Relevant URL: http://www.securityfocus.com/bid/19153
Summary:
FileCopa is prone to multiple buffer-overflow vulnerabilities because the
application fails to properly bounds-check user-supplied input before copying
it to insufficiently sized memory buffers.
Successful exploits may allow remote attackers to execute arbitrary machine
code in the context of the affected application, which may facilitate the
remote compromise of affected computers.
FileCOPA 1.01 version 2006-07-18 is vulnerable; other versions may also be
affected.
17. AGEphone SIP Packet Handling Buffer Overflow Vulnerability
BugTraq ID: 19148
Remote: Yes
Date Published: 2006-07-25
Relevant URL: http://www.securityfocus.com/bid/19148
Summary:
AGEphone is prone to a remote buffer-overflow vulnerability.
Specifically, this issue presents itself when the application handles a
malicious SIP (Session Initiation Protocol) packet.
AGEphone versions 1.24 and 1.38.1 are reported vulnerable; other versions may
be affected as well.
18. Microsoft Internet Explorer Native Function Iterator Denial Of Service
Vulnerability
BugTraq ID: 19140
Remote: Yes
Date Published: 2006-07-25
Relevant URL: http://www.securityfocus.com/bid/19140
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability. This
issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
19. Microsoft Windows Remote Denial of Service Vulnerability
BugTraq ID: 19135
Remote: Yes
Date Published: 2006-07-24
Relevant URL: http://www.securityfocus.com/bid/19135
Summary:
Microsoft Windows is reportedly prone to a remote denial-of-service
vulnerability. This issue may be due to the operating system's failure to
properly handle unexpected network traffic.
This issue may cause affected computers to crash, denying service to legitimate
users.
Note that Microsoft has not been able to reproduce this issue. This BID will be
updated as further analysis is performed.
20. Opsware NAS Root Password Information Disclosure Vulnerability
BugTraq ID: 19126
Remote: No
Date Published: 2006-07-24
Relevant URL: http://www.securityfocus.com/bid/19126
Summary:
Opsware NAS is prone to a local information-disclosure vulnerability. This
issue occurs because the application fails to protect sensitive information to
unprivileged users.
An attacker can exploit this issue by gaining access to the root MySQL account
and reveal authentication credentials for network devices. This issue could
also lead to other attacks.
Opsware NAS 6.0 is vulnerable to this issue; other versions may also be
affected.
21. Microsoft Internet Explorer NMSA.ASFSourceMediaDescription Stack Overflow
Vulnerability
BugTraq ID: 19114
Remote: Yes
Date Published: 2006-07-24
Relevant URL: http://www.securityfocus.com/bid/19114
Summary:
Microsoft Internet Explorer is prone to a stack-overflow vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
22. Microsoft Internet Explorer Multiple Object ListWidth Property Denial Of
Service Vulnerability
BugTraq ID: 19113
Remote: Yes
Date Published: 2006-07-23
Relevant URL: http://www.securityfocus.com/bid/19113
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
23. Microsoft Internet Explorer Internet.HHCtrl Click Denial Of Service
Vulnerability
BugTraq ID: 19109
Remote: Yes
Date Published: 2006-07-22
Relevant URL: http://www.securityfocus.com/bid/19109
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a
malicious website.
Remote attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
24. Password Safe Local Insecure Idle Timeout Lock Vulnerability
BugTraq ID: 19078
Remote: No
Date Published: 2006-07-24
Relevant URL: http://www.securityfocus.com/bid/19078
Summary:
Password Safe is prone to a vulnerability that may result in information
disclosure. This issue is due to a flaw in the implementation of the inactivity
timer, which is designed to lock the database when it is not in use.
This issue may allow local attackers to gain access to the contents of the
Password Safe database, since the database-locking feature may not function
correctly under certain circumstances.
Versions 2.11, 2.16, and 3.0 beta 1 are vulnerable to this issue. Other
versions may also be affected.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Domain admin mailbox rights on Exchange 2003
http://www.securityfocus.com/archive/88/441811
2. username change best practices...
http://www.securityfocus.com/archive/88/441749
3. [Administrivia] Guest moderator
http://www.securityfocus.com/archive/88/441537
4. MS Exchange
http://www.securityfocus.com/archive/88/441417
5. Impact of removing administrative rights in an enterprise running XP
http://www.securityfocus.com/archive/88/441275
6. .Net Satisfies Security Compliance Satistactions or Not ???
http://www.securityfocus.com/archive/88/441276
7. API hooking
http://www.securityfocus.com/archive/88/441274
8. Co-Hosting SQL with IIS FTP service
http://www.securityfocus.com/archive/88/441077
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is Sponsored by: Black Hat
Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas.
World renowned security experts reveal tomorrow's threats today. Free of vendor
pitches, the Briefings are designed to be pragmatic regardless of your
security environment. Featuring 36 hands-on training courses and 10 conference
tracks, networking opportunities with over 2,500 delegates from 40+ nations.
http://www.blackhat.com
---------------------------------------------------------------------------
---------------------------------------------------------------------------