SecurityFocus Microsoft Newsletter #307
----------------------------------------
This Issue is Sponsored By: Qualys
Free One-Time PCI Scan
Qualys PCI compliance solution - starting at $495 per year. Qualys' solution
enables online merchants and service providers to self certify for the Payment
Card Industy (PCI) Data Security Standard. Get a Free PCI Report on one
External Facing IP.
http://newsletter.industrybrains.com/c?fe;1;5e792;ddf3;264;1e60;da4
------------------------------------------------------------------
I. FRONT AND CENTER
1. Disclosure survey
2. Microsoft Office security, part two
II. MICROSOFT VULNERABILITY SUMMARY
1. J River Media Center Mediacenter.EXE Buffer Overflow Vulnerability
2. Easy Address Book Web Server Remote Format String Vulnerability
3. Alt-N MDaemon WebAdmin Component Unauthorized Access Vulnerability
4. Microsoft Word 2000 Unspecified Remote Code Execution Vulnerability
5. Internet Security Systems BlackICE Local Denial of Service
Vulnerability
6. LibTIFF TIFFFindFieldInfo Remote Buffer Overflow Vulnerability
7. Lyris ListManager Unauthorized Administrative User Addition
Vulnerability
8. Microsoft Internet Explorer COM Object Instantiation Daxctle.OCX Heap
Buffer Overflow vulnerability.
9. Cybozu Garoon Multiple SQL Injection Vulnerabilities
III. MICROSOFT FOCUS LIST SUMMARY
1. Disabling syskey on XP pro
2. FW: MST transforms templates from sec persepctive?
3. Fwd: Whole disk encryption
4. SecurityFocus Microsoft Newsletter #306
5. Workstation Shutdown / Logoff Policy
6. Account Control: Running Windows Vista with Least Privilege
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Disclosure survey
By Federico Biancuzzi
Federico Biancuzzi surveys statements from some of the world's largest software
companies about vulnerability disclosure, interviews two security companies who
pay for vulnerabilities, and then talks with three prominent, independent
researchers about their thoughts on choosing a responsible disclosure process.
In three parts.
http://www.securityfocus.com/columnists/415
2. Microsoft Office security, part two
By Khushbu Jithra
This article discusses Microsoft Office's OLE Structured Storage and the nature
of recent dropper programs and other exploit agents, in an effort to scrutinize
the workings of some of the recent MS Office exploits. Part two will then
collates some forensic investigation avenues through different MS Office
features. Parts of the article sample different MS Office vulnerabilities to
discuss their nature and the method of exploitation.
http://www.securityfocus.com/infocus/1874
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. J River Media Center Mediacenter.EXE Buffer Overflow Vulnerability
BugTraq ID: 19853
Remote: Yes
Date Published: 2006-09-05
Relevant URL: http://www.securityfocus.com/bid/19853
Summary:
Media Center and various Media Center plugins are prone to a buffer-overflow
vulnerability.
This issue occurs because the application does not bounds check data before
copying it into a finite-sized buffer.
This issue allows remote attackers to cause the application to crash, denying
service to the legitimate user. Arbitrary code execution may be possible; this
has not been confirmed.
Version 11.0.309 is vulnerable to this issue; other versions may also be
affected.
2. Easy Address Book Web Server Remote Format String Vulnerability
BugTraq ID: 19842
Remote: Yes
Date Published: 2006-09-04
Relevant URL: http://www.securityfocus.com/bid/19842
Summary:
Easy Address Book Web Server is susceptible to a remote format-string
vulnerability. This issue is due to a failure of the application to properly
sanitize user-supplied data prior to including it in the format-specifier
argument to a formatted-printing function.
This issue allows remote attackers to execute arbitrary machine code in the
context of the affected server process, facilitating the complete compromise of
affected computers. Failed exploit attempts likely result in crashing the
service.
Easy Address Book Web Server version 1.2 is vulnerable to this issue; other
versions may also be affected.
3. Alt-N MDaemon WebAdmin Component Unauthorized Access Vulnerability
BugTraq ID: 19841
Remote: Yes
Date Published: 2006-09-04
Relevant URL: http://www.securityfocus.com/bid/19841
Summary:
MDaemon WebAdmin component is prone to an unauthorized access vulnerability.
A successful exploit would allow an attacker to gain access to the MDaemon
account and potentially gain sensitive information; other attacks are also
possible.
Versions prior to 3.2.6 are vulnerable to this issue.
4. Microsoft Word 2000 Unspecified Remote Code Execution Vulnerability
BugTraq ID: 19835
Remote: Yes
Date Published: 2006-09-02
Relevant URL: http://www.securityfocus.com/bid/19835
Summary:
Microsoft Word is prone to a remote code-execution vulnerability.
Reports indicate that this issue can allow remote attackers to execute
arbitrary code on a vulnerable computer by supplying a malicious Word document
to a user. This issue is being actively exploited in the wild as
Trojan.MDropper.Q.
This issue is currently only known to affected Microsoft Office 2000 running on
Microsoft Windows 2000 computers.
This BID will be updated as further analysis is completed.
5. Internet Security Systems BlackICE Local Denial of Service Vulnerability
BugTraq ID: 19800
Remote: No
Date Published: 2006-09-01
Relevant URL: http://www.securityfocus.com/bid/19800
Summary:
Internet Security Systems (ISS) BlackICE PC Protection is prone to a local
denial-of-service vulnerability because the application fails to properly
sanitize user-supplied input.
This vulnerability allows local attackers to crash affected systems,
facilitating a denial-of-service condition on the local computer. Remote code
execution may also be possible if the vulnerability is exploited in privileged
kernel mode.
Versions 3.6.cpn, 3.6.cpj, and 3.6.cpiE are vulnerable to this issue; other
versions may also be affected.
6. LibTIFF TIFFFindFieldInfo Remote Buffer Overflow Vulnerability
BugTraq ID: 19793
Remote: Yes
Date Published: 2006-08-31
Relevant URL: http://www.securityfocus.com/bid/19793
Summary:
LibTIFF is prone to a buffer-overflow vulnerability because the library fails
to do proper boundary checks before copying user-supplied data into a
finite-sized buffer.
This issue allows remote attackers to execute arbitrary machine code in the
context of appications using the affected library. Failed exploit attempts will
likely crash the application, denying service to legitimate users.
This issue is known to affect versions of LibTIFF included with Sony PSP
devices running firmware versions 2.0 through 2.8.
Specific information regarding affected versions of LibTIFF is currently
unavailable. This BID will be updated as more information is disclosed.
7. Lyris ListManager Unauthorized Administrative User Addition Vulnerability
BugTraq ID: 19784
Remote: Yes
Date Published: 2006-08-30
Relevant URL: http://www.securityfocus.com/bid/19784
Summary:
Lyris ListManager is prone to a design flaw that facilitates the addition of an
unauthorized administrative user. The issue derives from the use of hidden form
fields in the 'add administrator' form.
Attackers with administrative privileges to a Lyris list may exploit this
vulnerability to add administrative users to arbitrary lists hosted on the same
server. For example, an administrator for List-A can maliciously modify hidden
form fields when conventionally adding an administrative user, causing that
user to be added as an administrator to List-B.
Version 8.95 is vulnerable; other versions may also be affected.
8. Microsoft Internet Explorer COM Object Instantiation Daxctle.OCX Heap Buffer
Overflow vulnerability.
BugTraq ID: 19738
Remote: Yes
Date Published: 2006-08-28
Relevant URL: http://www.securityfocus.com/bid/19738
Summary:
Microsoft Internet Explorer is prone to a heap buffer-overflow vulnerability..
The vulnerability arises because of the way Internet Explorer tries to
instantiate certain COM objects as ActiveX controls.
An attacker can exploit this issue to execute arbitrary code within context of
the affected application. Failed exploit attempts will result in a
denial-of-service condition.
9. Cybozu Garoon Multiple SQL Injection Vulnerabilities
BugTraq ID: 19731
Remote: Yes
Date Published: 2006-08-28
Relevant URL: http://www.securityfocus.com/bid/19731
Summary:
Cybozu Garoon is prone to multiple SQL-injection vulnerabilities because it
fails to properly sanitize user-supplied input before using it in an SQL query.
A successful attack could allow an attacker to compromise the application,
access or modify data, exploit vulnerabilities in the underlying database
implementation, or gain administrative access to the application.
These issues affect versions prior to 2.1.1.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Disabling syskey on XP pro
http://www.securityfocus.com/archive/88/445136
2. FW: MST transforms templates from sec persepctive?
http://www.securityfocus.com/archive/88/445134
3. Fwd: Whole disk encryption
http://www.securityfocus.com/archive/88/444818
4. SecurityFocus Microsoft Newsletter #306
http://www.securityfocus.com/archive/88/444702
5. Workstation Shutdown / Logoff Policy
http://www.securityfocus.com/archive/88/443340
6. Account Control: Running Windows Vista with Least Privilege
http://www.securityfocus.com/archive/88/442279
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: Qualys
Free One-Time PCI Scan
Qualys PCI compliance solution - starting at $495 per year. Qualys' solution
enables online merchants and service providers to self certify for the Payment
Card Industy (PCI) Data Security Standard. Get a Free PCI Report on one
External Facing IP.
http://newsletter.industrybrains.com/c?fe;1;5e792;ddf3;264;1e60;da4
---------------------------------------------------------------------------
---------------------------------------------------------------------------