SecurityFocus Microsoft Newsletter #303
----------------------------------------

This issue is Sponsored by: SPI Dynamics

ALERT: Ajax Security Dangers- How Hackers are attacking Ajax Web Apps
While Ajax can greatly improve the usability of a Web application, it can also create several opportunities for possible attack if the application is not designed with security in mind. Download this SPI Dynamics white paper.

https://download.spidynamics.com/1/ad/AJAX.asp?Campaign_ID=70160000000CZBn

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Dynamic linking in Linux and Windows, part one
       2. E-mail privacy in the workplace
II.  MICROSOFT VULNERABILITY SUMMARY
       1. Microsoft Management Console Zone Bypass Vulnerability
2. Microsoft Visual Basic for Applications Document Check Buffer Overflow Vulnerability
       3. Microsoft Windows Server Service Remote Buffer Overflow Vulnerability
4. Microsoft Hyperlink Object Library Function Remote Buffer Overflow Vulnerability
       5. Microsoft Windows DNS Client Buffer Overrun Vulnerability
6. CA eTrust Antivirus WebScan Malicious Update Code Execution Vulnerability
       7. EasyCafe Security Restriction Bypass Vulnerability
8. Microsoft Internet Explorer Source Element Cross-Domain Information Disclosure Vulnerability
       9. Computer Associates Virus Definition Downgrade Vulnerability
       10. XChat Remote Denial of Service Vulnerability
11. Microsoft Windows 2000 Kernel Local Privilege Escalation Vulnerability 12. Microsoft Windows Unhandled Exception Remote Code Execution Vulnerability 13. Clam Anti-Virus ClamAV UPX Compressed PE File Heap Buffer Overflow Vulnerability
       14. LHAZ LHA Long Multiple Buffer Overflow Vulnerabilities
       15. Microsoft Windows User Profile Privilege Escalation Vulnerability
16. Microsoft Windows GDI32.DLL WMF Remote Denial of Service Vulnerability 17. Microsoft Internet Explorer IFrame Refresh Denial of Service Vulnerability
       18. Yahoo! Messenger File Extension Spoofing Vulnerability
       19. CA eTrust Antivirus WebScan Remote Buffer Overflow Vulnerability
       20. Microsoft Powerpoint Remote Code Execution Vulnerability
21. Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability 22. Microsoft Internet Explorer Window Location Cross-Domain Information Disclosure Vulnerability
       23. Microsoft August Advance Notification Multiple Vulnerabilities
24. Fenestrae Faxination Server Unspecified Command Execution Vulnerability
       25. Microsoft Winsock Gethostbyname Buffer Overflow Vulnerability
26. Microsoft Internet Explorer Chained Cascading Style Sheets Remote Code Execution Vulnerability 27. Microsoft Internet Explorer HTML Layout and Positioning Remote Code Execution Vulnerability 28. Simpliciti Locked Browser JavaScript Kiosk Security Bypass Vulnerability 29. RETIRED: Microsoft Windows GDI Plus Library Remote Denial Of Service Vulnerability 30. Microsoft Windows Routing and Remote Access Denial of Service Vulnerability
       31. LibTIFF TiffScanLineSize Remote Buffer Overflow Vulnerability
       32. LibTiff Sanity Checks Multiple Denial of Service Vulnerabilities
       33. LibTiff EstimateStripByteCounts() Denial of Service Vulnerability
       34. LibTIFF TiffFetchShortPair Remote Buffer Overflow Vulnerability
35. Symantec On-Demand Protection Encrypted Data Information Disclosure Vulnerability 36. Easy File Sharing FTP Server Pass Command Remote Buffer Overflow Vulnerability
       37. Microsoft PowerPoint Unspecified Code Execution Vulnerability
38. Microsoft Internet Explorer Deleted Frame Object Denial Of Service Vulnerability 39. Microsoft Internet Explorer ADODB.Recordset NextRecordset Denial of Service Vulnerability 40. Microsoft Windows Graphical Device Interface Plus Library Denial Of Service Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. Help needed
       2. Account Control: Running Windows Vista with Least Privilege
       3. free backgammon
       4. SecurityFocus Microsoft Newsletter #302
       5. username change best practices...
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Dynamic linking in Linux and Windows, part one
By Reji Thomas, and Bhasker Reddy
This article discusses shared libraries in both Windows and Linux, and offers a walk through various data structures to explain how dynamic linking is done in these operating systems. The paper will be useful for developers interested in the security implications and the relative speed of dynamic linking, and assumes some prior knowledge of static and shared libraries.
http://www.securityfocus.com/infocus/1872

2. E-mail privacy in the workplace
By Mark Rasch
Even with a well-heeled corporate privacy policy stating that all employee communications may be monitored in the workplace, the legality of e-mail monitoring is not as clear cut as one might think.
http://www.securityfocus.com/columnists/412


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft Management Console Zone Bypass Vulnerability
BugTraq ID: 19417
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19417
Summary:
Microsoft Management Console (MMC) is prone to a cross-zone scripting vulnerability. The cause of this vulnerability is that the operating system does not properly restrict access to MMC components, allowing the MMC files to be referenced from the Internet Zone in some cases.

This vulnerability could let an attacker execute arbitrary code, completely compromising the computer.

2. Microsoft Visual Basic for Applications Document Check Buffer Overflow Vulnerability
BugTraq ID: 19414
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19414
Summary:
A vulnerability has been discovered in Microsoft Visual Basic for Applications. The vulnerability occurs due to insufficient bounds checking when checking the properties of malicious documents. As a result, a malformed document may be capable of triggering a buffer-overflow within the affected application, effectively allowing for the execution of arbitrary code.

Microsoft Office, Access, Visio, Word, and Works are also reportedly attack vectors, since they employ VBA when handling certain document types. Email is another potential attack vector for this vulnerability, however opening an email would not trigger the issue. Replying or forwarding the message could potentially trigger it.

Microsoft has reported that this issue is being exploited in the wild.

3. Microsoft Windows Server Service Remote Buffer Overflow Vulnerability
BugTraq ID: 19409
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19409
Summary:
Microsoft Windows Server Service is prone to a remote buffer-overflow vulnerability.

This vulnerability arises when the service processes a malicious message in RPC communications.

A successful attack may result in arbitrary code execution with SYSTEM privileges leading to a full compromise. Attack attempts may result in denial-of-service conditions as well.

Microsoft has reported that this issue is being exploited in the wild.

4. Microsoft Hyperlink Object Library Function Remote Buffer Overflow Vulnerability
BugTraq ID: 19405
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19405
Summary:
Microsoft's Hyperlink Object Library is prone to a buffer-overflow vulnerability. This issue is due to the library's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Successfully exploiting this issue allows attackers to execute arbitrary machine code in the context of applications that use the affected library. This facilitates the remote compromise of affected computers. Failed exploit attempts will likely crash targeted applications.

This issue is different than the one described in BID 18500 (Microsoft HLINK.DLL Link Memory Corruption Vulnerability).

5. Microsoft Windows DNS Client Buffer Overrun Vulnerability
BugTraq ID: 19404
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19404
Summary:
Microsoft Windows is prone to a remotely exploitable buffer overrun condition in the DNS client.

This issue is exposed when a client handles a malicious response from a DNS server. This may be leveraged to execute arbitrary code and facilitate a complete compromise of the affected computer.

6. CA eTrust Antivirus WebScan Malicious Update Code Execution Vulnerability
BugTraq ID: 19403
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19403
Summary:
CA eTrust Antivirus WebScan is prone to a remote code-execution vulnerability because it fails to properly validate parameters supplied to the WebScan ActiveX control.

An attacker could exploit this vulnerability to cause WebScan to install malicious application files from an attacker-specified source. This could result in the execution of arbitrary code.

This issue affects version 1.1.0.1047 and earlier; other versions may also be affected.

7. EasyCafe Security Restriction Bypass Vulnerability
BugTraq ID: 19401
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19401
Summary:
EasyCafe is prone to a security restriction bypass vulnerability

This issue occurs becaue the application fails to prevent an attacker from gaining unauthorized access to a clients computer.

An attacker can exploit this issue to gain unauthorized access to the clients computer. Other attacks are also possible.

Version 2.1.7 to 2.2.14 are vulnerable to this issue; other versions may also be affected.

8. Microsoft Internet Explorer Source Element Cross-Domain Information Disclosure Vulnerability
BugTraq ID: 19400
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19400
Summary:
Microsoft Internet Explorer is prone to an information-disclosure vulnerability because it fails to properly enforce cross-domain policies.

This issue may allow attackers to access arbitrary websites in the context of a targeted user's browser session. This may allow attackers to perform actions in web applications with the privileges of exploited users or to gain access to potentially sensitive information. This may aid attackers in further attacks.

9. Computer Associates Virus Definition Downgrade Vulnerability
BugTraq ID: 19399
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19399
Summary:
A flaw in the Computer Associates WebScan product reportedly could cause the application's virus definitions to be downgraded to a previous version.

This presents a security risk because the virus definitions in question may be out of date and may not effectively detect newer variants of malicious code.

10. XChat Remote Denial of Service Vulnerability
BugTraq ID: 19398
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19398
Summary:
XChat is prone to a remote denial-of-service vulnerability because it fails to properly handle unexpected data from malicious IRC users.

This issue allows remote attackers to crash affected IRC clients, denying service to legitimate users. To exploit this issue, attackers send malformed data to unsuspecting users.

XChat version 2.6.7 for Windows is vulnerable to this issue; other versions and platforms may also be affected.

11. Microsoft Windows 2000 Kernel Local Privilege Escalation Vulnerability
BugTraq ID: 19388
Remote: No
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19388
Summary:
A local privilege-escalation vulnerability exists in Microsoft Windows 2000.

This vulnerability affects the Windows kernel and may be exploited by local attackers to completely compromise an affected computer.

12. Microsoft Windows Unhandled Exception Remote Code Execution Vulnerability
BugTraq ID: 19384
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19384
Summary:
Microsoft Windows is prone to a remote code-execution vulnerability. This vulnerability is caused by an error in how chained exceptions are unloaded by the operating system.

This vulnerability could be exploited by a malicious web page. A successful exploit would completely compromise the affected computer.

Specific details about this vulnerability are not available at this time. This BID will be updated if more information becomes available.

13. Clam Anti-Virus ClamAV UPX Compressed PE File Heap Buffer Overflow Vulnerability
BugTraq ID: 19381
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19381
Summary:
ClamAV is prone to a heap buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.

This issue occurs when the application attempts to handle compressed UPX files.

Exploiting this issue could allow attacker-supplied machine code to be executed in the context of the affected application. The issue would occur when the malformed file is scanned manually or automatically in deployments such as email gateways.

ClamAV versions 0.88.2 and 0.88.3 are vulnerable to this issue; prior versions may also be affected.

14. LHAZ LHA Long Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 19377
Remote: Yes
Date Published: 2006-07-31
Relevant URL: http://www.securityfocus.com/bid/19377
Summary:
Lhaz is prone to multiple buffer-overflow vulnerabilities because the application fails to check overly long filenames before copying them to a finite-sized buffer.

An attacker can exploit these issues to execute arbitrary code within the context of the affected application.

Version 1.31 is vulnerable to these issues; other versions may also be affected.

15. Microsoft Windows User Profile Privilege Escalation Vulnerability
BugTraq ID: 19375
Remote: No
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19375
Summary:
Microsoft Windows is prone to a local privilege-escalation vulnerability. The vulnerability is caused by an insecure search path for the WinLogon facility. If exploited, this could let an attacker run an arbitrary DLL with elevated privileges.

This issue is reported to affect Windows 2000 in the default configuration. Other Windows operating systems are not affected unless the configuration settings related to this vulnerability are changed from the default.

16. Microsoft Windows GDI32.DLL WMF Remote Denial of Service Vulnerability
BugTraq ID: 19365
Remote: Yes
Date Published: 2006-08-06
Relevant URL: http://www.securityfocus.com/bid/19365
Summary:
Microsoft Windows is reportedly prone to a remote denial-of-service vulnerability. This issue occurs because the application fails to handle Malicious WMF file.

This issue may cause Windows Explorer to crash, denying service to legitimate users.

17. Microsoft Internet Explorer IFrame Refresh Denial of Service Vulnerability
BugTraq ID: 19364
Remote: Yes
Date Published: 2006-08-06
Relevant URL: http://www.securityfocus.com/bid/19364
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability when handling malicious HTML files.

Successfully exploiting this issue allows attackers to consume excessive CPU resources in the affected browser and eventually cause Internet Explorer to crash, causing a denial-of-service.

18. Yahoo! Messenger File Extension Spoofing Vulnerability
BugTraq ID: 19353
Remote: Yes
Date Published: 2006-08-04
Relevant URL: http://www.securityfocus.com/bid/19353
Summary:
A vulnerability in Yahoo! Messenger allows remote attackers to spoof file extensions. This issue is due to a design error.

An attacker may leverage this issue to spoof downloaded filenames to unsuspecting users. This issue may lead to a compromise of the target computer as well as other consequences.

Yahoo! Messenger version 8.0.0.863 is reportedly affected; earlier versions may be affected as well.

19. CA eTrust Antivirus WebScan Remote Buffer Overflow Vulnerability
BugTraq ID: 19351
Remote: Yes
Date Published: 2006-08-04
Relevant URL: http://www.securityfocus.com/bid/19351
Summary:
CA eTrust Antivirus WebScan is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Due to improper validation of user-supplied input, a remote attacker may cause a buffer-overflow condition and may also execute arbitrary code in the context of the user running the affected application.

This issue affects version 1.1.0.1047 and earlier; other versions may also be affected.

20. Microsoft Powerpoint Remote Code Execution Vulnerability
BugTraq ID: 19341
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19341
Summary:
Microsoft PowerPoint is prone to a remote code-execution vulnerability.

This issue results when the application handles malformed record data within a presentation file.

A successful exploit of this issue will let attackers execute arbitrary code in the context of targeted user

21. Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability
BugTraq ID: 19340
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19340
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability that is related to the instantiation of COM objects. This issue results from a design error.

The vulnerability arises because of the way Internet Explorer tries to instantiate certain COM objects as ActiveX controls, resulting in arbitrary code execution. The affected objects are not intended to be instantiated through Internet Explorer.

22. Microsoft Internet Explorer Window Location Cross-Domain Information Disclosure Vulnerability
BugTraq ID: 19339
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19339
Summary:
Microsoft Internet Explorer is prone to a cross-domain information-disclosure vulnerability.

This vulnerability may let a malicious website access properties of a site in an arbitrary external domain. Attackers could exploit this issue to gain access to sensitive information that is associated with the external domain.

23. Microsoft August Advance Notification Multiple Vulnerabilities
BugTraq ID: 19331
Remote: Yes
Date Published: 2006-08-03
Relevant URL: http://www.securityfocus.com/bid/19331
Summary:
Microsoft has released advance notification that the vendor will be releasing twelve security bulletins for Windows and Office on August 8, 2006. The highest severity rating for these issues is 'Critical'.

Further details about these issues are not currently available. Individual BIDs will be created and this record will be removed when the security bulletins are released.

24. Fenestrae Faxination Server Unspecified Command Execution Vulnerability
BugTraq ID: 19328
Remote: Yes
Date Published: 2006-08-03
Relevant URL: http://www.securityfocus.com/bid/19328
Summary:
Fenestrae Faxination Server is prone to a remote unspecified command-execution vulnerability.

An attacker can exploit this issue to execute arbitrary machine commands with SYSTEM-level privileges on affected computers.

Further details are currently unavailable; this BID will be updated as more information is disclosed.

25. Microsoft Winsock Gethostbyname Buffer Overflow Vulnerability
BugTraq ID: 19319
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19319
Summary:
The Microsoft Winsock API is prone to a buffer-overflow vulnerability.

This issue can occur when the API is invoked via a malicious file or web page that is sufficient to trigger the vulnerability. If the exploit is successful, attacker-supplied code will execute, completely comprising the affected computer.

26. Microsoft Internet Explorer Chained Cascading Style Sheets Remote Code Execution Vulnerability
BugTraq ID: 19316
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19316
Summary:
Microsoft Internet Explorer is prone to remote code-execution vulnerability.

This issue is related to how the browser handles chained CSS (Cascading Style Sheets). An attacker could exploit this issue to execute arbitrary code in the context of the user visiting a malicious web page.

This issue affects Internet Explorer on Windows 2000, Windows XP excluding XP SP2, and Windows Server 2003.

27. Microsoft Internet Explorer HTML Layout and Positioning Remote Code Execution Vulnerability
BugTraq ID: 19312
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19312
Summary:
Microsoft Internet Explorer is prone to remote code-execution vulnerability.

This vulnerability is related to how the browser renders HTML with certain layout and positioning combinations. An attacker could exploit this issue to execute arbitrary code in the context of the user visiting a malicious web page.

This issue affects Internet Explorer on Windows 2000, Windows XP, and Windows Server 2003.

28. Simpliciti Locked Browser JavaScript Kiosk Security Bypass Vulnerability
BugTraq ID: 19304
Remote: No
Date Published: 2006-08-02
Relevant URL: http://www.securityfocus.com/bid/19304
Summary:
Simpliciti Locked Browser allows an attacker to use JavaScript to bypass security.

This vulnerability may facilitate privilege escalation. An attacker could use this vulnerability to their advantage and bypass existing security limitations and access controls of the kiosk system.

29. RETIRED: Microsoft Windows GDI Plus Library Remote Denial Of Service Vulnerability
BugTraq ID: 19301
Remote: Yes
Date Published: 2006-08-02
Relevant URL: http://www.securityfocus.com/bid/19301
Summary:
Microsoft Windows GDI+ library 'gdiplus.dll' is prone to a denial-of-service vulnerability because the software fails to handle malformed image files properly.

An attacker may leverage this issue to trigger a denial-of-service condition in software implementing the vulnerable library. Other attacks may also be possible.

This BID has been retired.

30. Microsoft Windows Routing and Remote Access Denial of Service Vulnerability
BugTraq ID: 19300
Remote: Yes
Date Published: 2006-08-02
Relevant URL: http://www.securityfocus.com/bid/19300
Summary:
Microsoft Windows Routing and Remote Access is prone to a denial-of-service vulnerability. This issue is reportedly due to a NULL-pointer dereference error in the affected component.

This issue allows remote attackers to cause a denial of service on affected computers.

31. LibTIFF TiffScanLineSize Remote Buffer Overflow Vulnerability
BugTraq ID: 19288
Remote: Yes
Date Published: 2006-08-01
Relevant URL: http://www.securityfocus.com/bid/19288
Summary:
LibTIFF is prone to a buffer-overflow vulnerability because the library fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer.

This issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected library. Failed exploit attempts will likely crash the application, denying service to legitimate users.

32. LibTiff Sanity Checks Multiple Denial of Service Vulnerabilities
BugTraq ID: 19286
Remote: Yes
Date Published: 2006-08-01
Relevant URL: http://www.securityfocus.com/bid/19286
Summary:
LibTIFF is affected by multiple denial-of-service vulnerabilities.

An attacker can exploit these vulnerabilities to cause a denial of service in applications using the affected library.

33. LibTiff EstimateStripByteCounts() Denial of Service Vulnerability
BugTraq ID: 19284
Remote: Yes
Date Published: 2006-08-01
Relevant URL: http://www.securityfocus.com/bid/19284
Summary:
LibTIFF is affected by a denial-of-service vulnerability.

An attacker can exploit this vulnerability to cause a denial of service in applications using the affected library.

34. LibTIFF TiffFetchShortPair Remote Buffer Overflow Vulnerability
BugTraq ID: 19283
Remote: Yes
Date Published: 2006-08-01
Relevant URL: http://www.securityfocus.com/bid/19283
Summary:
LibTIFF is prone to a buffer-overflow vulnerability because the library fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer.

This issue allows remote attackers to execute arbitrary machine code in the context of appications using the affected library. Failed exploit attempts will likely crash the application, denying service to legitimate users.

35. Symantec On-Demand Protection Encrypted Data Information Disclosure Vulnerability
BugTraq ID: 19248
Remote: No
Date Published: 2006-07-31
Relevant URL: http://www.securityfocus.com/bid/19248
Summary:
Symantec On-Demand Protection (SODP) and On-Demand Agent (SODA) are prone to a vulnerability that could disclose potentially sensitive information.

An attacker may be able to decrypt the files saved by the applications. The impact of this issue will depend on the information disclosed.

This issue affects:

- SODA versions 2.5 MR2 (build 2156) and earlier
- SODP versions 2.6 (build 2232) and earlier.

Note that this issue affects only the Microsoft Windows versions of the applications.

36. Easy File Sharing FTP Server Pass Command Remote Buffer Overflow Vulnerability
BugTraq ID: 19243
Remote: Yes
Date Published: 2006-07-31
Relevant URL: http://www.securityfocus.com/bid/19243
Summary:
Easy File Sharing FTP Server is prone to a buffer-overflow vulnerability because the application fails to do proper bounds checking on user-supplied data before storing it in a finite-sized buffer.

An attacker can exploit this issue to execute arbitrary machine code in the context of the affected server application.

Version 2.0 is vulnerable to this issue; other versions may also be affected.

37. Microsoft PowerPoint Unspecified Code Execution Vulnerability
BugTraq ID: 19229
Remote: Yes
Date Published: 2006-07-30
Relevant URL: http://www.securityfocus.com/bid/19229
Summary:
Microsoft PowerPoint is prone to an unspecified code-execution vulnerability.

A proof-of-concept exploit file designed to trigger this vulnerability has been released. This issue arises when a vulnerable user opens a malicious read-only PowerPoint file and then closes it.

This issue is the third vulnerability discussed in BID 18993 (Microsoft Powerpoint Multiple Unspecified Vulnerabilities). This separate document details further information regarding that issue.

Microsoft PowerPoint 2003 SP2 French Edition is reported vulnerable to this issue; other versions may also be affected.

38. Microsoft Internet Explorer Deleted Frame Object Denial Of Service Vulnerability
BugTraq ID: 19228
Remote: Yes
Date Published: 2006-07-29
Relevant URL: http://www.securityfocus.com/bid/19228
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability. This issue is triggered when an attacker convinces a victim user to visit a malicious website.

Remote attackers may exploit this issue to crash Internet Explorer, effectively denying service to legitimate users.

39. Microsoft Internet Explorer ADODB.Recordset NextRecordset Denial of Service Vulnerability
BugTraq ID: 19227
Remote: Yes
Date Published: 2006-07-29
Relevant URL: http://www.securityfocus.com/bid/19227
Summary:
Microsoft Internet Explorer is prone to a denial-of-service condition when processing the 'NextRecordset' method of the 'ADODB.Recordset' object.

A successful attack may cause the browser to fail.

40. Microsoft Windows Graphical Device Interface Plus Library Denial Of Service Vulnerability
BugTraq ID: 19221
Remote: Yes
Date Published: 2006-07-29
Relevant URL: http://www.securityfocus.com/bid/19221
Summary:
Reportedly, the Microsoft Windows GDI+ library 'gdiplus.dll' is prone to a denial-of-service vulnerability because the software fails to handle malformed image files properly.

An attacker may leverage this issue to trigger a denial-of-service condition in software implementing the vulnerable library. Other attacks may also be possible.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Help needed
http://www.securityfocus.com/archive/88/442340

2. Account Control: Running Windows Vista with Least Privilege
http://www.securityfocus.com/archive/88/442279

3. free backgammon
http://www.securityfocus.com/archive/88/442167

4. SecurityFocus Microsoft Newsletter #302
http://www.securityfocus.com/archive/88/442049

5. username change best practices...
http://www.securityfocus.com/archive/88/441749

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
This issue is Sponsored by: SPI Dynamics

ALERT: Ajax Security Dangers- How Hackers are attacking Ajax Web Apps
While Ajax can greatly improve the usability of a Web application, it can also create several opportunities for possible attack if the application is not designed with security in mind. Download this SPI Dynamics white paper.

https://download.spidynamics.com/1/ad/AJAX.asp?Campaign_ID=70160000000CZBn



---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to