SecurityFocus Microsoft Newsletter #308
----------------------------------------
This issue is Sponsored by: SPI Dynamics
ALERT: Test and assess your Web Applications- FREE WebInspect Trial
Hackers are exploiting web apps with attacks such as; SQL Injection,XSS and
Session Hijacking, all undetectable by Firewalls and IDS!
Are you vulnerable? Run a FREE Test of your Web Apps via our FREE 15 Day
Product Trial that delivers a comprehensive Vulnerability Report
https://download.spidynamics.com/1/ad/fwi.asp?Campaign_ID=70160000000Cb6B
------------------------------------------------------------------
I. FRONT AND CENTER
1. Disclosure survey
2. Analyzing malicious SSH login attempts
II. MICROSOFT VULNERABILITY SUMMARY
1. Microsoft Internet Explorer HTTP 1.1 and Compression Long URI Buffer
Overflow Variant Vulnerability
2. Adobe ColdFusion Flash Remoting Gateway Denial of Service
Vulnerability
3. Adobe Flash Player Multiple Remote Code Execution Vulnerabilities
4. CCHost Index.PHP SQL Injection Vulnerability
5. IBM Lotus Domino Web Access Session Hijacking Vulnerability
6. Paul Smith Computer Services VCAP Calendar Server Remote Denial of
Service Vulnerability
7. Paul Smith Computer Services VCAP Calendar Server Directory Traversal
Vulnerability
8. Microsoft Publisher Font Parsing Remote Code Execution Vulnerability
9. CMS.R. Index.PHP SQL Injection Vulnerability
10. RETIRED: Invision Power Board Index.PHP ST Parameter SQL Injection
Vulnerability
11. Microsoft Indexing Service Query Validation Cross-Site Scripting
Vulnerability
12. Multithreaded TFTP Server Remote Denial Of Service Vulnerability
13. Microsoft PGM Remote Buffer Overflow Vulnerability
14. RaidenHTTPD Check.PHP Remote File Include Vulnerability
15. IBM Director Multiple Remote Input Validation Vulnerabilities
16. ICQ MCRegEx__Search Remote Heap Buffer Overflow Vulnerability
17. Microsoft September Advance Notification Multiple Vulnerabilities
18. Avira AntiVir Personal Edition Classic Update.EXE Local Privilege
Escalation Vulnerability
19. Ipswitch IMail Server and Collaboration Suite SMTP Daemon Stack
Overflow Vulnerability
20. AuditWizard Log File Information Disclosure Vulnerability
21. J River Media Center Mediacenter.EXE Buffer Overflow Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. windump on browsing of shared folders across vpn in winxp
2. Don't Get Too Comfortable - Sept. '06 Patches
3. IP address assignment problem
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Disclosure survey
By Federico Biancuzzi
Federico Biancuzzi surveys statements from some of the world's largest software
companies about vulnerability disclosure, interviews two security companies who
pay for vulnerabilities, and then talks with three prominent, independent
researchers about their thoughts on choosing a responsible disclosure process.
In three parts.
http://www.securityfocus.com/columnists/415
2. Analyzing malicious SSH login attempts
By Christian Seifert
Malicious SSH login attempts have been appearing in some administrators' logs
for several years. This article takes a new look at the use of honeypots to
analyze malicious SSH login attempts and see what can be learned about this
activity. The article then offers recommendations on how to secure one's system
against these attacks.
http://www.securityfocus.com/infocus/1876
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft Internet Explorer HTTP 1.1 and Compression Long URI Buffer
Overflow Variant Vulnerability
BugTraq ID: 19987
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19987
Summary:
Microsoft Internet Explorer is prone to a remote buffer-overflow vulnerability.
A successful exploit may result in arbitrary code-execution in the context of
the user running the browser.
This issue was introduced with the rereleased patches of Microsoft advisory
MS06-042.
This issue is nearly identical to that discussed in BID 19667 (Microsoft
Internet Explorer HTTP 1.1 and Compression Long URI Buffer Overflow
Vulnerability), but is a separate vulnerability.
2. Adobe ColdFusion Flash Remoting Gateway Denial of Service Vulnerability
BugTraq ID: 19984
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19984
Summary:
Adobe ColdFusion is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to crash the affected application, denying
service to legitimate users.
3. Adobe Flash Player Multiple Remote Code Execution Vulnerabilities
BugTraq ID: 19980
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19980
Summary:
Adobe Flash Player is prone to multiple remote code-execution vulnerabilities
because it fails to properly sanitize user-supplied input.
An attacker could exploit this issue by creating a media file containing large,
dynamically generated string data and submitting it to be processed by the
media player.
These issues allow remote attackers to execute arbitrary machine code in the
context of the user running the application. Other attacks are also possible.
Adobe Flash Player 8.0.24.0 and prior, Adobe Flash Professional 8, Flash Basic,
Adobe Flash MX, and 2004Adobe Flex 1.5 are affected.
4. CCHost Index.PHP SQL Injection Vulnerability
BugTraq ID: 19978
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19978
Summary:
ccHost is prone to an SQL-injection vulnerability because it fails to properly
sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
5. IBM Lotus Domino Web Access Session Hijacking Vulnerability
BugTraq ID: 19966
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19966
Summary:
IBM Lotus Domino Web Access is prone to a session-hijacking vulnerability.
An attacker can exploit this issue to authenticate to the application as any
user provided that the user's authentication credentials are still on the
server. This may lead to other attacks.
Version 7.0.1 is vulnerable to this issue; other versions may also be affected.
6. Paul Smith Computer Services VCAP Calendar Server Remote Denial of Service
Vulnerability
BugTraq ID: 19959
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19959
Summary:
vCAP Calendar Server is prone to a remote denial-of-service vulnerability. This
issue is due to a design error.
An attacker can exploit this issue to crash the application, effectively
denying service.
vCAP Calendar Server 1.9.0 Beta and prior versions are vulnerable to this
issue.
7. Paul Smith Computer Services VCAP Calendar Server Directory Traversal
Vulnerability
BugTraq ID: 19958
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19958
Summary:
vCAP Calendar Server is prone to a directory-traversal vulnerability because it
fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the
vulnerable system in the context of the affected application. Information
obtained may aid in further attacks.
vCAP Calendar Server 1.9.0 Beta and prior versions are vulnerable to this
issue.
8. Microsoft Publisher Font Parsing Remote Code Execution Vulnerability
BugTraq ID: 19951
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19951
Summary:
Microsoft Publisher is prone to a code-execution vulnerability. This is due to
a flaw when handling malformed PUB files.
Successfully exploiting this issue allows attackers to corrupt process memory
and to execute arbitrary code in the context of targeted users.
9. CMS.R. Index.PHP SQL Injection Vulnerability
BugTraq ID: 19950
Remote: Yes
Date Published: 2006-09-11
Relevant URL: http://www.securityfocus.com/bid/19950
Summary:
CMS.R. is prone to an SQL-injection vulnerability because it fails to properly
sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
10. RETIRED: Invision Power Board Index.PHP ST Parameter SQL Injection
Vulnerability
BugTraq ID: 19946
Remote: Yes
Date Published: 2006-09-11
Relevant URL: http://www.securityfocus.com/bid/19946
Summary:
Invision Power Board is prone to an SQL-injection vulnerability because the
application fails to properly sanitize user-supplied input before using it in
an SQL query.
A successful exploit could allow an attacker to compromise the application,
access or modify data, or exploit vulnerabilities in the underlying database
implementation.
Update: The vendor states that this is not a vulnerability, because the
affected parameter is passed through PHP's 'intval' prior to its use. This BID
is therefore being retired.
11. Microsoft Indexing Service Query Validation Cross-Site Scripting
Vulnerability
BugTraq ID: 19927
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19927
Summary:
Microsoft Indexing Service is prone to a cross-site scripting vulnerability
because the application fails to properly sanitize user-supplied input before
it is rendered to other users.
An attacker may leverage this issue to have arbitrary script code execute in
the browser of an unsuspecting user, in the context of the victim's session.
This could allow the attacker to perform actions on behalf of the victim, such
as spoofing content or hijacking their session.
Microsoft Indexing Service is not installed or enabled by default. Even if
installed, it is not accessible from Internet Information Services (IIS). This
vulnerability affects only systems that have IIS and Indexing Service installed
and that have the Indexing Service configured to be accessible from IIS through
a web-based interface.
12. Multithreaded TFTP Server Remote Denial Of Service Vulnerability
BugTraq ID: 19925
Remote: Yes
Date Published: 2006-09-08
Relevant URL: http://www.securityfocus.com/bid/19925
Summary:
Multithreaded TFTP Server is prone to a remote denial-of-service vulnerability
because the application fails to handle a excessively long FTP command.
A remote attacker may exploit this issue to crash the affected service, denying
further service to legitimate users.
13. Microsoft PGM Remote Buffer Overflow Vulnerability
BugTraq ID: 19922
Remote: Yes
Date Published: 2006-09-12
Relevant URL: http://www.securityfocus.com/bid/19922
Summary:
Microsoft Pragmatic General Multicast (PGM) is prone to a remote
buffer-overflow vulnerability because the application fails to properly
bounds-check externally supplied data.
An attacker can exploit this issue to execute arbitrary code, facilitating a
complete system compromise.
This issue affects systems only when Microsoft Message Queuing (MSMQ) 3.0 is
installed; this is not the default.
14. RaidenHTTPD Check.PHP Remote File Include Vulnerability
BugTraq ID: 19918
Remote: Yes
Date Published: 2006-09-08
Relevant URL: http://www.securityfocus.com/bid/19918
Summary:
RaidenHTTPD is prone to a remote file-include vulnerability because it fails to
properly sanitize user-supplied input.
An attacker can exploit this issue to include an arbitrary remote file
containing malicious PHP code and execute it in the context of the webserver
process. This may allow the attacker to compromise the application and the
underlying system; other attacks are also possible.
This issue affects version 1.1.49; other versions may also be vulnerable.
15. IBM Director Multiple Remote Input Validation Vulnerabilities
BugTraq ID: 19915
Remote: Yes
Date Published: 2006-09-08
Relevant URL: http://www.securityfocus.com/bid/19915
Summary:
IBM Director is prone to multiple input-validation vulnerabilities.
An attacker can exploit these issues to cause denial-of-service conditions,
effectively denying service to legitimate users, and to access cookie and
authentication data that may aid in further attacks.
16. ICQ MCRegEx__Search Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 19897
Remote: Yes
Date Published: 2006-09-07
Relevant URL: http://www.securityfocus.com/bid/19897
Summary:
ICQ is prone to a remote heap buffer-overflow vulnerability.
This issue may allow attackers to execute arbitrary machine code within the
context of the vulnerable application or to cause a denial-of-service
condition.
This issue affects ICQ Pro 2003b Build #3916; other versions may also be
vulnerable.
17. Microsoft September Advance Notification Multiple Vulnerabilities
BugTraq ID: 19895
Remote: Yes
Date Published: 2006-09-07
Relevant URL: http://www.securityfocus.com/bid/19895
Summary:
Microsoft has released advance notification that the vendor will be releasing
three security bulletins for Windows and Office on September 12, 2006. The
highest severity rating for these issues is 'Critical'.
Further details about these issues are not currently available. Individual BIDs
will be created and this record will be removed when the security bulletins are
released.
18. Avira AntiVir Personal Edition Classic Update.EXE Local Privilege
Escalation Vulnerability
BugTraq ID: 19889
Remote: No
Date Published: 2006-09-07
Relevant URL: http://www.securityfocus.com/bid/19889
Summary:
AntiVir Personal Edition Classic is prone to a local privilege-escalation
vulnerability.
A local attacker can exploit this issue to execute arbitrary code with SYSTEM
privileges. This may facilitate a complete compromise of the affected computer.
AntiVir Personal Edition Classic version 7 is vulnerable; other versions may
also be affected.
19. Ipswitch IMail Server and Collaboration Suite SMTP Daemon Stack Overflow
Vulnerability
BugTraq ID: 19885
Remote: Yes
Date Published: 2006-09-07
Relevant URL: http://www.securityfocus.com/bid/19885
Summary:
Ipswitch IMail Server and Collaboration Suite are prone to a stack-overflow
vulnerability. Updates are available.
This vulnerability may lead to remote arbitrary code execution or
denial-of-service conditions.
Ipswitch Collaboration 2006 Suite Premium and Standard Editions, IMail, IMail
Plus, and IMail Secure are vulnerable.
20. AuditWizard Log File Information Disclosure Vulnerability
BugTraq ID: 19860
Remote: No
Date Published: 2006-09-05
Relevant URL: http://www.securityfocus.com/bid/19860
Summary:
AuditWizard is prone to an information-disclosure vulnerability because the
application fails to properly ensure that sensitive information is not
disclosed to local users.
This issue allows local attackers to gain access to sensitive administrative
account-authentication credentials.
Reportedly, the vendor may have reissued version 6.3.2 with fixes that address
this issue; Symantec has not confirmed this.
21. J River Media Center Mediacenter.EXE Buffer Overflow Vulnerability
BugTraq ID: 19853
Remote: Yes
Date Published: 2006-09-05
Relevant URL: http://www.securityfocus.com/bid/19853
Summary:
Media Center and various Media Center plugins are prone to a buffer-overflow
vulnerability.
This issue occurs because the application fails to bounds-check data before
copying it into a finite-sized buffer.
This issue allows remote attackers to cause the application to crash, denying
service to the legitimate user. Arbitrary code execution may be possible, but
this has not been confirmed.
Version 11.0.309 is vulnerable to this issue; other versions may also be
affected.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. windump on browsing of shared folders across vpn in winxp
http://www.securityfocus.com/archive/88/446048
2. Don't Get Too Comfortable - Sept. '06 Patches
http://www.securityfocus.com/archive/88/445921
3. IP address assignment problem
http://www.securityfocus.com/archive/88/444349
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is Sponsored by: SPI Dynamics
ALERT: Test and assess your Web Applications- FREE WebInspect Trial
Hackers are exploiting web apps with attacks such as; SQL Injection,XSS and
Session Hijacking, all undetectable by Firewalls and IDS!
Are you vulnerable? Run a FREE Test of your Web Apps via our FREE 15 Day
Product Trial that delivers a comprehensive Vulnerability Report
https://download.spidynamics.com/1/ad/fwi.asp?Campaign_ID=70160000000Cb6B
---------------------------------------------------------------------------
---------------------------------------------------------------------------