SecurityFocus Microsoft Newsletter #304
----------------------------------------
Are Your IIS Web Servers Under Attack?
Monitor IIS activity and block all unwanted traffic. ThreatSentry Host IPS +
Application Firewall protects IIS against new and progressive attack techniques
and delivers affordable defense-in-depth. $399 per server. Free 30-day trial.
http://newsletter.industrybrains.com/c?fe;3;53120;4d8;250;1e60;da4
------------------------------------------------------------------
I. FRONT AND CENTER
1. Dynamic Linking in Linux and Windows, part two
II. MICROSOFT VULNERABILITY SUMMARY
1. Zen Cart Multiple SQL Injection Vulnerabilities
2. PHProjekt Multiple Remote File Include Vulnerabilities
3. Microsoft Internet Explorer MSOE.DLL Denial Of Service Vulnerability
4. Microsoft Internet Explorer CHTSKDIC.DLL Denial Of Service
Vulnerability
5. Microsoft Internet Explorer IMSKDIC.DLL Denial Of Service
Vulnerability
6. Microsoft Windows PNG File IHDR Block Denial of Service Vulnerability
7. ImageMagick SGI Image File Remote Heap Buffer Overflow Vulnerability
8. Novell eDirectory eMBoxClient.JAR Information Disclosure Vulnerability
9. Novell eDirectory Unspecified Nessus Denial of Service Vulnerability
10. 04WebServer Multiple Vulnerabilities
11. Opera Web Browser IRC Chat Client Remote Denial of Service
Vulnerability
12. RETIRED: Microsoft Windows Help Multiple Remote Vulnerabilities
13. ScatterChat ECB Mode Cryptographic Module Weakness
14. IPCheck Server Monitor Directory Traversal Vulnerability
15. YaBBSE Index.PHP Cross-Site Scripting Vulnerability
16. IrfanView ANI Image File Denial Of Service Vulnerability
17. OpenMPT Multiple Remote Code Execution Vulnerabilities
18. Apache CGI Script Source Code Information Disclosure Vulnerability
19. Drupal Bibliography Multiple Input Validation Vulnerabilities
20. eIQNetworks Enterprise Security Analyzer Monitoring.EXE Multiple
Buffer Overflow Vulnerabilities
21. Microsoft Management Console Zone Bypass Vulnerability
22. Microsoft Visual Basic for Applications Document Check Buffer
Overflow Vulnerability
23. Microsoft Windows Server Service Remote Buffer Overflow Vulnerability
24. Microsoft Hyperlink Object Library Function Remote Buffer Overflow
Vulnerability
25. Microsoft Windows DNS Client Buffer Overrun Vulnerability
26. CA eTrust Antivirus WebScan Malicious Update Code Execution
Vulnerability
27. EasyCafe Security Restriction Bypass Vulnerability
28. Microsoft Internet Explorer Source Element Cross-Domain Information
Disclosure Vulnerability
29. Computer Associates Virus Definition Downgrade Vulnerability
30. XChat Remote Denial of Service Vulnerability
31. Microsoft Windows 2000 Kernel Local Privilege Escalation
Vulnerability 32. Microsoft Windows Unhandled Exception Remote Code
Execution Vulnerability
33. Microsoft Windows User Profile Privilege Escalation Vulnerability
34. Microsoft Windows GDI32.DLL WMF Remote Denial of Service
Vulnerability
35. Microsoft Internet Explorer IFrame Refresh Denial of Service
Vulnerability
36. Microsoft Powerpoint Remote Code Execution Vulnerability
37. Microsoft Internet Explorer COM Object Instantiation Code Execution
Vulnerability
38. Microsoft Internet Explorer Window Location Cross-Domain Information
Disclosure Vulnerability
39. Microsoft Winsock Gethostbyname Buffer Overflow Vulnerability
40. Microsoft Internet Explorer Chained Cascading Style Sheets Remote
Code Execution Vulnerability
41. Microsoft Internet Explorer HTML Layout and Positioning Remote Code
Execution Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Licensed Software Audit
2. Workstation Shutdown / Logoff Policy
3. Local Security Policy screen can't retrieve sec policy information
4. Impact of removing administrative rights in an enterprise running XP
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Dynamic Linking in Linux and Windows, part two
By Reji Thomas and Bhasker Reddy
This article discusses the shared libraries concept in both Windows and Linux,
and offers a walk through various data structures to explain how dynamic
linking is done in these operating systems.
http://www.securityfocus.com/infocus/1873
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Zen Cart Multiple SQL Injection Vulnerabilities
BugTraq ID: 19542
Remote: Yes
Date Published: 2006-08-15
Relevant URL: http://www.securityfocus.com/bid/19542
Summary:
Zen Cart is prone to multiple SQL injection vulnerabilities because it fails to
properly sanitize user-supplied input before using it in an SQL query.
A successful attack could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
These issues affect version 1.3.0.2; earlier versions may also be vulnerable.
2. PHProjekt Multiple Remote File Include Vulnerabilities
BugTraq ID: 19541
Remote: Yes
Date Published: 2006-08-16
Relevant URL: http://www.securityfocus.com/bid/19541
Summary:
Multiple remote file include vulnerabilities affect PHProjekt. These issues are
due to a failure of the application to properly sanitize user-supplied input
prior to using it in a PHP 'include()' function call.
An attacker may leverage these issues to execute arbitrary server-side script
code on an affected computer with the privileges of the Web server process.
Version 5.1 of PHProjekt is vulnerable to this issue; previous versions may be
affected as well.
3. Microsoft Internet Explorer MSOE.DLL Denial Of Service Vulnerability
BugTraq ID: 19530
Remote: Yes
Date Published: 2006-08-15
Relevant URL: http://www.securityfocus.com/bid/19530
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue occurs because the application fails to load a DLL library when
instantiated as an ActiveX control.
An attacker may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users, and may cause arbitrary code to run within
the context of the application.
4. Microsoft Internet Explorer CHTSKDIC.DLL Denial Of Service Vulnerability
BugTraq ID: 19529
Remote: Yes
Date Published: 2006-08-15
Relevant URL: http://www.securityfocus.com/bid/19529
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability
because the application fails to load a DLL library when instantiated as an
ActiveX control.
An attacker may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users and may cause arbitrary code to run within
the context of the user running the application.
5. Microsoft Internet Explorer IMSKDIC.DLL Denial Of Service Vulnerability
BugTraq ID: 19521
Remote: Yes
Date Published: 2006-08-15
Relevant URL: http://www.securityfocus.com/bid/19521
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue occurs because the application fails to load a DLL library when
instantiated as an ActiveX control.
An attacker may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users and may cause arbitrary code to run within
the context of the application.
6. Microsoft Windows PNG File IHDR Block Denial of Service Vulnerability
BugTraq ID: 19520
Remote: Yes
Date Published: 2006-08-15
Relevant URL: http://www.securityfocus.com/bid/19520
Summary:
Microsoft Windows is reportedly prone to a remote denial-of-service
vulnerability because the PNG-rendering portion of the operating system fails
to handle malicious PNG (Portable Network Graphics) files.
This issue may cause Windows Explorer to consume excessive resources and crash,
denying service to legitimate users.
7. ImageMagick SGI Image File Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 19507
Remote: Yes
Date Published: 2006-08-14
Relevant URL: http://www.securityfocus.com/bid/19507
Summary:
ImageMagick is prone to a remote heap buffer-overflow vulnerability because the
application fails to properly bounds-check user-supplied input before copying
it to an insufficiently sized memory buffer.
This issue allows attackers to execute arbitrary machine code in the context of
applications that use the ImageMagick library.
ImageMagick versions in the 6.x series, up to version 6.2.8, are vulnerable to
this issue.
8. Novell eDirectory eMBoxClient.JAR Information Disclosure Vulnerability
BugTraq ID: 19499
Remote: Yes
Date Published: 2006-08-11
Relevant URL: http://www.securityfocus.com/bid/19499
Summary:
The Novell eDirectory Server is prone to an information-disclosure
vulnerability because the application fails to protect sensitive information
from unprivileged users.
The flaw presents itself in eDirectory version 8.7.3.8; other versions may also
be affected.
9. Novell eDirectory Unspecified Nessus Denial of Service Vulnerability
BugTraq ID: 19498
Remote: Yes
Date Published: 2006-08-11
Relevant URL: http://www.securityfocus.com/bid/19498
Summary:
The Novell eDirectory Server is prone to an unspecified denial-of-service
vulnerability. The system experiences high CPU usage when it is subjected to a
Nessus scan.
The flaw presents itself in eDirectory version 8.7.3.8; other versions may also
be affected.
10. 04WebServer Multiple Vulnerabilities
BugTraq ID: 19496
Remote: Yes
Date Published: 2006-08-14
Relevant URL: http://www.securityfocus.com/bid/19496
Summary:
Multiple remote vulnerabilities affect 04WebServer. Some issues are due to the
application's failure to properly sanitize user-supplied input.
An attacker may leverage these issues to carry out cross-site scripting attacks
and bypass certain security checks.
04WebServer 1.83 and prior versions are vulnerable.
11. Opera Web Browser IRC Chat Client Remote Denial of Service Vulnerability
BugTraq ID: 19491
Remote: Yes
Date Published: 2006-08-14
Relevant URL: http://www.securityfocus.com/bid/19491
Summary:
Opera Web Browser IRC chat client is prone to a remote denial-of-service
vulnerability.
A successful attack can allow the attacker to trigger a crash in the client and
deny service to legitimate users.
This issue affects Opera Web Browser 9. Other versions may be vulnerable as
well.
12. RETIRED: Microsoft Windows Help Multiple Remote Vulnerabilities
BugTraq ID: 19490
Remote: Yes
Date Published: 2006-08-12
Relevant URL: http://www.securityfocus.com/bid/19490
Summary:
The Microsoft Windows Help File viewer (winhlp32.exe) is prone to multiple
remote vulnerabilities.
These vulnerabilities present themselves when the application handles specially
crafted Windows Help (.hlp) files.
A successful attack may let the attacker crash the application or execute
arbitrary code in the context of a vulnerable user who opens a malicious file.
Specific information regarding affected versions of Microsoft Windows is
currently unavailable.
Update: Since help files can inherently execute arbitrary malicious code, this
BID is being retired.
13. ScatterChat ECB Mode Cryptographic Module Weakness
BugTraq ID: 19485
Remote: Yes
Date Published: 2006-08-11
Relevant URL: http://www.securityfocus.com/bid/19485
Summary:
ScatterChat Instant Messenger is prone to a cryptographic weakness that may
allow an attacker to detect patterns in encrypted client communications.
Information obtained may help the attacker conduct further attacks on the
system.
14. IPCheck Server Monitor Directory Traversal Vulnerability
BugTraq ID: 19473
Remote: Yes
Date Published: 2006-08-10
Relevant URL: http://www.securityfocus.com/bid/19473
Summary:
IPCheck Server Monitor is prone to a directory-traversal vulnerability because
it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the
vulnerable system in the context of the affected application. Information
obtained may aid in further attacks.
Version 5.3.2.609 is vulnerable; other versions may also be affected.
15. YaBBSE Index.PHP Cross-Site Scripting Vulnerability
BugTraq ID: 19460
Remote: Yes
Date Published: 2006-08-10
Relevant URL: http://www.securityfocus.com/bid/19460
Summary:
A cross-site scripting vulnerability affects YaBBSE because the application
fails to properly sanitize user-supplied input before including it in
dynamically generated web content.
An attacker may leverage this issue to have arbitrary script code execute in
the browser of an unsuspecting user. This may help the attacker steal
cookie-based authentication credentials and launch other attacks.
16. IrfanView ANI Image File Denial Of Service Vulnerability
BugTraq ID: 19452
Remote: No
Date Published: 2006-08-09
Relevant URL: http://www.securityfocus.com/bid/19452
Summary:
IrfanView is prone to a denial-of-service vulnerability.
A remote attacker may crash the application, resulting in denial-of-service
conditions to legitimate users.
This issue may potentially be exploited to execute arbitrary machine code, but
this has not been
confirmed.
Version 3.98.0 is vulnerable to this issue; other versions may also be
affected.
17. OpenMPT Multiple Remote Code Execution Vulnerabilities
BugTraq ID: 19448
Remote: Yes
Date Published: 2006-08-09
Relevant URL: http://www.securityfocus.com/bid/19448
Summary:
OpenMPT is prone to multiple remote code-execution vulnerabilities because it
fails to properly bounds-check user-supplied data before copying it to an
insufficiently sized memory buffer.
These issues allow remote attackers to execute arbitrary machine code in the
context of affected servers. This facilitates the remote compromise of affected
computers.
These versions are affected:
- 1.17.02.43 and earlier
- SVN versions 157 and earlier.
18. Apache CGI Script Source Code Information Disclosure Vulnerability
BugTraq ID: 19447
Remote: Yes
Date Published: 2006-08-09
Relevant URL: http://www.securityfocus.com/bid/19447
Summary:
Apache is prone to an information-disclosure vulnerability because it fails to
properly handle exceptional conditions.
An attacker can exploit this issue to retrieve script source code. Information
obtained may aid in further attacks.
Versions 2.2.2 for Microsoft Windows is vulnerable to this issue; other
versions may also be affected.
19. Drupal Bibliography Multiple Input Validation Vulnerabilities
BugTraq ID: 19441
Remote: Yes
Date Published: 2006-08-09
Relevant URL: http://www.securityfocus.com/bid/19441
Summary:
Drupal Bibliography module is prone to multiple input-validation
vulnerabilities, incuding multiple cross-site scripting and SQL-injection
issues, because the application fails to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to
compromise the application, access or modify data, steal cookie-based
authentication credentials, or even exploit vulnerabilities in the underlying
database implementation. Other attacks are also possible.
Versions prior to 4.6 and 4.7 are vulnerable; other versions may also be
affected.
20. eIQNetworks Enterprise Security Analyzer Monitoring.EXE Multiple Buffer
Overflow Vulnerabilities
BugTraq ID: 19424
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19424
Summary:
eIQnetworks Enterprise Security Analyzer is prone to multiple remote
buffer-overflow vulnerabilities.
These issues can facilitate a remote compromise due to arbitrary code
execution.
Enterprise Security Analyzer versions prior to 2.5.0 are vulnerable.
21. Microsoft Management Console Zone Bypass Vulnerability
BugTraq ID: 19417
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19417
Summary:
Microsoft Management Console (MMC) is prone to a cross-zone scripting
vulnerability because the operating system fails to properly restrict access to
MMC components, allowing the MMC files to be referenced from the Internet Zone
in some cases.
This vulnerability could let an attacker execute arbitrary code, completely
compromising the computer.
22. Microsoft Visual Basic for Applications Document Check Buffer Overflow
Vulnerability
BugTraq ID: 19414
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19414
Summary:
A vulnerability has been discovered in Microsoft Visual Basic for Applications.
The vulnerability occurs due to insufficient bounds checking when checking the
properties of malicious documents. As a result, a malformed document may be
able to trigger a buffer-overflow within the affected application, effectively
allowing for the execution of arbitrary code.
Microsoft Office, Access, Visio, Word, and Works are also reportedly attack
vectors, since they employ VBA when handling certain document types. Email is
another potential attack vector for this vulnerability, but merely opening an
email would not trigger the issue; replying or forwarding the message could
potentially trigger it.
Microsoft has reported that this issue is being exploited in the wild.
23. Microsoft Windows Server Service Remote Buffer Overflow Vulnerability
BugTraq ID: 19409
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19409
Summary:
Microsoft Windows Server Service is prone to a remote buffer-overflow
vulnerability.
This vulnerability arises when the service processes a malicious message in RPC
communications.
A successful attack may result in arbitrary code execution with SYSTEM
privileges leading to a full compromise. Attack attempts may result in
denial-of-service conditions as well.
Microsoft has reported that this issue is being exploited in the wild.
Update (August 14, 2006): A worm named 'W32.Wargbot' that exploits this issue
to spread is currently in the wild.
24. Microsoft Hyperlink Object Library Function Remote Buffer Overflow
Vulnerability
BugTraq ID: 19405
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19405
Summary:
Microsoft's Hyperlink Object Library is prone to a buffer-overflow
vulnerability. This issue is due to the library's failure to properly
bounds-check user-supplied input before copying it to an insufficiently sized
memory buffer.
Successfully exploiting this issue allows attackers to execute arbitrary
machine code in the context of applications that use the affected library. This
facilitates the remote compromise of affected computers. Failed exploit
attempts will likely crash targeted applications.
This issue is different from the one described in BID 18500 (Microsoft
HLINK.DLL Link Memory Corruption Vulnerability).
25. Microsoft Windows DNS Client Buffer Overrun Vulnerability
BugTraq ID: 19404
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19404
Summary:
Microsoft Windows is prone to a remotely exploitable buffer overrun condition
in the DNS client.
This issue is exposed when a client handles a malicious response from a DNS
server. Attackers may leverage this to execute arbitrary code and launch a
complete compromise of the affected computer.
26. CA eTrust Antivirus WebScan Malicious Update Code Execution Vulnerability
BugTraq ID: 19403
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19403
Summary:
CA eTrust Antivirus WebScan is prone to a remote code-execution vulnerability
because it fails to properly validate parameters supplied to the WebScan
ActiveX control.
An attacker could exploit this vulnerability to cause WebScan to install
malicious application files from an attacker-specified source. This could
result in the execution of arbitrary code.
This issue affects version 1.1.0.1047 and earlier; other versions may also be
affected.
27. EasyCafe Security Restriction Bypass Vulnerability
BugTraq ID: 19401
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19401
Summary:
EasyCafe is prone to a vulnerability that lets attackers bypass security
restrictions.
This issue occurs because the application fails to prevent an attacker from
gaining unauthorized access to a client computer.
An attacker can exploit this issue to gain unauthorized access to the client's
computer. Other attacks are also possible.
Version 2.1.7 to 2.2.14 are vulnerable to this issue; other versions may also
be affected.
28. Microsoft Internet Explorer Source Element Cross-Domain Information
Disclosure Vulnerability
BugTraq ID: 19400
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19400
Summary:
Microsoft Internet Explorer is prone to an information-disclosure vulnerability
because it fails to properly enforce cross-domain policies.
This issue may allow attackers to access arbitrary websites in the context of a
targeted user's browser session. This may allow attackers to perform actions in
web applications with the privileges of exploited users or to gain access to
potentially sensitive information. This may aid attackers in further attacks.
29. Computer Associates Virus Definition Downgrade Vulnerability
BugTraq ID: 19399
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19399
Summary:
A flaw in the Computer Associates WebScan product reportedly could cause the
application's virus definitions to be downgraded to a previous version.
This presents a security risk because the virus definitions in question may be
out of date and may not effectively detect newer variants of malicious code.
30. XChat Remote Denial of Service Vulnerability
BugTraq ID: 19398
Remote: Yes
Date Published: 2006-08-07
Relevant URL: http://www.securityfocus.com/bid/19398
Summary:
XChat is prone to a remote denial-of-service vulnerability because it fails to
properly handle unexpected data from malicious IRC users.
This issue allows remote attackers to crash affected IRC clients, denying
service to legitimate users. To exploit this issue, attackers send malformed
data to unsuspecting users.
XChat version 2.6.7 for Windows is vulnerable to this issue; other versions and
platforms may also be affected.
NOTE: The vendor refutes this issue, stating that the exploit has no affect on
XChat.
31. Microsoft Windows 2000 Kernel Local Privilege Escalation Vulnerability
BugTraq ID: 19388
Remote: No
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19388
Summary:
A local privilege-escalation vulnerability affects Microsoft Windows 2000.
This vulnerability affects the Windows kernel; local attackers may exploit it
to completely compromise an affected computer.
32. Microsoft Windows Unhandled Exception Remote Code Execution Vulnerability
BugTraq ID: 19384
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19384
Summary:
Microsoft Windows is prone to a remote code-execution vulnerability. This
vulnerability is caused by an error in how chained exceptions are unloaded by
the operating system.
This vulnerability could be exploited by a malicious web page. A successful
exploit would completely compromise the affected computer.
Specific details about this vulnerability are not available at this time. This
BID will be updated if more information becomes available.
33. Microsoft Windows User Profile Privilege Escalation Vulnerability
BugTraq ID: 19375
Remote: No
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19375
Summary:
Microsoft Windows is prone to a local privilege-escalation vulnerability. The
vulnerability is caused by an insecure search path for the WinLogon facility.
If exploited, this could let an attacker run an arbitrary DLL with elevated
privileges.
This issue is reported to affect Windows 2000 in the default configuration.
Other Windows operating systems are not affected unless the configuration
settings related to this vulnerability are changed from the default.
34. Microsoft Windows GDI32.DLL WMF Remote Denial of Service Vulnerability
BugTraq ID: 19365
Remote: Yes
Date Published: 2006-08-06
Relevant URL: http://www.securityfocus.com/bid/19365
Summary:
Microsoft Windows is reportedly prone to a remote denial-of-service
vulnerability. This issue occurs because the application fails to handle
Malicious WMF file.
This issue may cause Windows Explorer to crash, denying service to legitimate
users.
35. Microsoft Internet Explorer IFrame Refresh Denial of Service Vulnerability
BugTraq ID: 19364
Remote: Yes
Date Published: 2006-08-06
Relevant URL: http://www.securityfocus.com/bid/19364
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability when
handling malicious HTML files.
Successfully exploiting this issue allows attackers to consume excessive CPU
resources in the affected browser and eventually cause Internet Explorer to
crash, causing a denial-of-service.
36. Microsoft Powerpoint Remote Code Execution Vulnerability
BugTraq ID: 19341
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19341
Summary:
Microsoft PowerPoint is prone to a remote code-execution vulnerability.
This issue occurs when the application handles malformed record data within a
presentation file.
A successful exploit of this issue will let attackers execute arbitrary code in
the context of the targeted user.
37. Microsoft Internet Explorer COM Object Instantiation Code Execution
Vulnerability
BugTraq ID: 19340
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19340
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability that
is related to the instantiation of COM objects. This issue stems from a design
error.
The vulnerability arises because of the way Internet Explorer tries to
instantiate certain COM objects as ActiveX controls, resulting in arbitrary
code execution. The affected objects are not intended to be instantiated
through Internet Explorer.
38. Microsoft Internet Explorer Window Location Cross-Domain Information
Disclosure Vulnerability
BugTraq ID: 19339
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19339
Summary:
Microsoft Internet Explorer is prone to a cross-domain information-disclosure
vulnerability.
This vulnerability may let a malicious website access properties of a site in
an arbitrary external domain. Attackers could exploit this issue to gain access
to sensitive information that is associated with the external domain.
39. Microsoft Winsock Gethostbyname Buffer Overflow Vulnerability
BugTraq ID: 19319
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19319
Summary:
The Microsoft Winsock API is prone to a buffer-overflow vulnerability.
This issue can occur when the API is invoked via a malicious file or web page
that is sufficient to trigger the vulnerability. If the exploit is successful,
attacker-supplied code will execute, completely compromising the affected
computer.
40. Microsoft Internet Explorer Chained Cascading Style Sheets Remote Code
Execution Vulnerability
BugTraq ID: 19316
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19316
Summary:
Microsoft Internet Explorer is prone to remote code-execution vulnerability.
This issue is related to how the browser handles chained CSS (Cascading Style
Sheets). An attacker could exploit this issue to execute arbitrary code in the
context of the user visiting a malicious web page.
This issue affects Internet Explorer on Windows 2000, Windows XP (excluding XP
SP2), and Windows Server 2003.
41. Microsoft Internet Explorer HTML Layout and Positioning Remote Code
Execution Vulnerability
BugTraq ID: 19312
Remote: Yes
Date Published: 2006-08-08
Relevant URL: http://www.securityfocus.com/bid/19312
Summary:
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.
This vulnerability is related to how the browser renders HTML with certain
layout and positioning combinations. An attacker could exploit this issue to
execute arbitrary code in the context of the user visiting a malicious web
page.
This issue affects Internet Explorer on Windows 2000, Windows XP, and Windows
Server 2003.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Licensed Software Audit
http://www.securityfocus.com/archive/88/443369
2. Workstation Shutdown / Logoff Policy
http://www.securityfocus.com/archive/88/443340
3. Local Security Policy screen can't retrieve sec policy information
http://www.securityfocus.com/archive/88/443100
4. Impact of removing administrative rights in an enterprise running XP
http://www.securityfocus.com/archive/88/441275
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
Are Your IIS Web Servers Under Attack?
Monitor IIS activity and block all unwanted traffic. ThreatSentry Host IPS +
Application Firewall protects IIS against new and progressive attack techniques
and delivers affordable defense-in-depth. $399 per server. Free 30-day trial.
http://newsletter.industrybrains.com/c?fe;3;53120;4d8;250;1e60;da4
---------------------------------------------------------------------------
---------------------------------------------------------------------------