SecurityFocus Microsoft Newsletter #312
----------------------------------------

This Issue is Sponsored by: SPI Dynamics

ALERT: "How A Hacker Launches A Cross-Site Scripting Attack" - White Paper
Cross-site scripting vulnerabilities in web apps allow hackers to compromise confidential information, steal cookies and create requests that can be mistaken
https://download.spidynamics.com/1/ad/xss.asp?Campaign_ID=70160000000Cc5Y

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Hacking Web 2.0 Applications with Firefox
II.  MICROSOFT VULNERABILITY SUMMARY
       1. Novell BorderManager IPSec/IKE Remote Denial Of Service Vulnerability
2. OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
       3. SHTTPD Remote Buffer Overflow Vulnerability
       4. Microsoft Word Mac Remote Code Execution Vulnerability
       5. Microsoft Office Malformed Record Remote Code Execution Vulnerability
6. Microsoft Office Malformed Chart Record Remote Code Execution Vulnerability 7. Microsoft Office Improper Memory Access Remote Code Execution Vulnerability
       8. Microsoft Windows SMB Rename Remote Denial of Service Vulnerability
9. CA Multiple Products Discovery Service Remote Buffer Overflow Vulnerability
       10. Symantec AntiVirus IOCTL Kernel Privilege Escalation Vulnerability
       11. Microsoft Word Mail Merge Remote Code Execution Vulnerability
       12. Microsoft October Advance Notification Multiple Vulnerabilities
13. Microsoft Excel Lotus 1-2-3 File Handling Remote Code Execution Vulnerability
       14. Microsoft Word Malformed String Remote Code Execution Vulnerability
       15. Microsoft XML Core Services Information Disclosure Vulnerability
16. Microsoft Windows XML Core Services XSLT Buffer Overrun Vulnerability 17. Microsoft ASP.NET AutoPostBack Variable Cross-Site Scripting Vulnerability
       18. Invision Gallery Index.PHP Directory Traversal Vulnerability
       19. Invision Gallery Index.PHP SQL Injection Vulnerability
20. Microsoft PowerPoint Record Improper Memory Access Remote Code Execution Vulnerability
       21. Microsoft PowerPoint Data Record Remote Code Execution Vulnerability
       22. Microsoft Office Smart Tag Remote Code Execution Vulnerability
23. Microsoft Windows Object Packager Remote Code Execution Vulnerability 24. Microsoft PowerPoint Object Pointer Remote Code Execution Vulnerability 25. Sunbelt Kerio Personal Firewall Multiple Local Denial of Service Vulnerabilities
       26. ProRat Remote Login Authentication Bypass Vulnerability
       27. MailEnable SMTP NTLM Authentication Multiple Vulnerabilities
28. Trend Micro OfficeScan ATXCONSOLE.OCX ActiveX Control Format String Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. security implications of disabling WMI service
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Hacking Web 2.0 Applications with Firefox
By Shreeraj Shah
This article looks at some of the methods, tools and tricks to dissect web 2.0 applications (including Ajax) and discover security holes using Firefox and ithttp://www.securityfocus.com/infocus/1879


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Novell BorderManager IPSec/IKE Remote Denial Of Service Vulnerability
BugTraq ID: 20428
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20428
Summary:
Novell BorderManager is affected by a remote denial-of-service vulnerability because the application fails to properly handle user-supplied input.

Exploiting this issue will allow an attacker to cause the affected client computer to hang, denying service to legitimate users.

Novell BorderManager version 3.8 is vulnerable.

2. OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
BugTraq ID: 20418
Remote: Yes
Date Published: 2006-10-09
Relevant URL: http://www.securityfocus.com/bid/20418
Summary:
It is reported that OpenSSH contains an information disclosure weakness. This issue exists in the portable version of OpenSSH. The portable version is the version that is distributed for operating systems other than its native OpenBSD platform.

This issue has been confirmed as not deriving from either the Pluggable Authentication Module (PAM) issue disclosed in BID 11781 in 2004, or the more recent Generic Security Services Application Programming Interface (GSSAPI) based information leak outlined in BID 20245. It is reported that it is possible to verify access credentials for users with an existing system password by measuring SSH authentication timing differences.

This weakness allows remote users to test for the existence of valid usernames with a password set. Knowledge of system users with established passwords may aid in further attacks.

3. SHTTPD Remote Buffer Overflow Vulnerability
BugTraq ID: 20393
Remote: Yes
Date Published: 2006-10-06
Relevant URL: http://www.securityfocus.com/bid/20393
Summary:
SHTTPD is prone to a remote buffer-overflow vulnerability.

Specifically, the issue presents itself as an error in the handling of HTTP POST requests.

SHTTPD 1.34 is reported vulnerable; other versions may be affected as well.

4. Microsoft Word Mac Remote Code Execution Vulnerability
BugTraq ID: 20387
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20387
Summary:
Microsoft Word for Mac is prone to a remote code-execution vulnerability when parsing Word files. Exploiting this vulnerability may allow an attacker to execute arbitrary machine code in the context of the user who opened the file.

An attacker could leverage this issue to gain the permissions of an unsuspecting user. A successful exploit could result in the remote compromise of the affected system.

5. Microsoft Office Malformed Record Remote Code Execution Vulnerability
BugTraq ID: 20384
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20384
Summary:
Microsoft Office is prone to a remote code-execution vulnerability. This issue occurs when Office attempts to process malformed files.

An attacker could exploit this issue by enticing a victim to load a malicious Office file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

6. Microsoft Office Malformed Chart Record Remote Code Execution Vulnerability
BugTraq ID: 20383
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20383
Summary:
Microsoft Office is prone to a remote code-execution vulnerability. This issue occurs when Office attempts to process malformed files.

An attacker could exploit this issue by enticing a victim to load a malicious Office file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

7. Microsoft Office Improper Memory Access Remote Code Execution Vulnerability
BugTraq ID: 20382
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20382
Summary:
Microsoft Office is prone to a remote code-execution vulnerability. This issue occurs when Office attempts to process malformed files.

An attacker could exploit this issue by enticing a victim to load a malicious Office file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

8. Microsoft Windows SMB Rename Remote Denial of Service Vulnerability
BugTraq ID: 20373
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20373
Summary:
Microsoft Windows is prone to a remote denial-of-service vulnerability because the Server service fails to properly handle network messages.

Exploiting this issue may cause affected computers to crash, denying service to legitimate users.

To exploit this issue, an attacker must have valid logon credentials.

9. CA Multiple Products Discovery Service Remote Buffer Overflow Vulnerability
BugTraq ID: 20364
Remote: Yes
Date Published: 2006-10-02
Relevant URL: http://www.securityfocus.com/bid/20364
Summary:
Multiple Computer Associates products are prone to a remote stack-based buffer-overflow vulnerability.

This issue arises because these applications fail to perform boundary checks before copying user-supplied data into insufficiently sized buffers.

A successful attack may result in arbitrary code execution with the privileges of the affected application.

This issue affects client and server versions of the affected products.

10. Symantec AntiVirus IOCTL Kernel Privilege Escalation Vulnerability
BugTraq ID: 20360
Remote: No
Date Published: 2006-10-05
Relevant URL: http://www.securityfocus.com/bid/20360
Summary:
Symantec AntiVirus is prone to a privilege-escalation vulnerability.

Local attackers can exploit this issue to corrupt memory and execute arbitrary code with kernel-level privileges. Successful exploits may facilitate a complete system compromise.

This issue affects only Symantec and Norton antivirus products running on Microsoft Windows NT, Windows 2000, and Windows XP.

11. Microsoft Word Mail Merge Remote Code Execution Vulnerability
BugTraq ID: 20358
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20358
Summary:
Microsoft Word is prone to a remote code-execution vulnerability.

An attacker could exploit this issue by enticing a victim to load a malicious Word file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

12. Microsoft October Advance Notification Multiple Vulnerabilities
BugTraq ID: 20357
Remote: Yes
Date Published: 2006-10-05
Relevant URL: http://www.securityfocus.com/bid/20357
Summary:
Microsoft has released advance notification that the vendor will be releasing 11 security bulletins for Windows, Office, and .NET Framework on October 10, 2006. The highest severity rating for these issues is 'Critical'.

Further details about these issues are not currently available. Individual BIDs will be created for each issue and this record will be removed when the security bulletins are released.

13. Microsoft Excel Lotus 1-2-3 File Handling Remote Code Execution Vulnerability
BugTraq ID: 20345
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20345
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.

A remote attacker may exploit this issue to execute arbitrary machine code in the context of the user running the application.

This issue was originally described in BID 18989 and has now been assigned its own BID.

14. Microsoft Word Malformed String Remote Code Execution Vulnerability
BugTraq ID: 20341
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20341
Summary:
Microsoft Word is prone to a remote code-execution vulnerability.

An attacker could exploit this issue by enticing a victim to load a malicious Word file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

15. Microsoft XML Core Services Information Disclosure Vulnerability
BugTraq ID: 20339
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20339
Summary:
Microsoft XML Core Services is prone to an information disclosure vulnerability. This vulnerability is caused by an error in how server re-directs are handled by the affected component.

This vulnerability could be exploited by enticing a victim user into visiting a malicious web page.

16. Microsoft Windows XML Core Services XSLT Buffer Overrun Vulnerability
BugTraq ID: 20338
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20338
Summary:
Microsoft Windows is prone to a remotely exploitable buffer-overrun condition in the XSLT implementation of XML core services.

An attacker can exploit this issue to execute arbitrary code on an unsuspecting victim's computer. This may facilitate a remote compromise.

17. Microsoft ASP.NET AutoPostBack Variable Cross-Site Scripting Vulnerability
BugTraq ID: 20337
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20337
Summary:
Microsoft ASP.NET is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before it is rendered in the browser of an unsuspecting user in the context of the affected site.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user, with the privileges of the victim userĂ¢??s account. This may help the attacker steal cookie-based authentication credentials, disclose sensitive information, and launch other attacks.

18. Invision Gallery Index.PHP Directory Traversal Vulnerability
BugTraq ID: 20328
Remote: Yes
Date Published: 2006-10-03
Relevant URL: http://www.securityfocus.com/bid/20328
Summary:
Invision Gallery is prone to a directory-traversal vulnerability because the application fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.

19. Invision Gallery Index.PHP SQL Injection Vulnerability
BugTraq ID: 20327
Remote: Yes
Date Published: 2006-10-03
Relevant URL: http://www.securityfocus.com/bid/20327
Summary:
Invision Gallery is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

20. Microsoft PowerPoint Record Improper Memory Access Remote Code Execution Vulnerability
BugTraq ID: 20325
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20325
Summary:
Microsoft PowerPoint is prone to a remote code-execution vulnerability.

Exploiting this issue can allow remote attackers to execute arbitrary code on a vulnerable computer by supplying a malicious PowerPoint (.ppt) document to a user.

21. Microsoft PowerPoint Data Record Remote Code Execution Vulnerability
BugTraq ID: 20322
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20322
Summary:
Microsoft PowerPoint is prone to a remote code-execution vulnerability.

Exploiting this issue can allow remote attackers to execute arbitrary code on a vulnerable computer by supplying a malicious PowerPoint (.ppt) document to a user.

22. Microsoft Office Smart Tag Remote Code Execution Vulnerability
BugTraq ID: 20320
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20320
Summary:
Microsoft Office is prone to a remote code-execution vulnerability. This issue occurs when Office attempts to process malformed files.

An attacker could exploit this issue by enticing a victim to load a malicious Office file. If the vulnerability is successfully exploited, this could result in the execution of arbitrary code in the context of the currently logged-in user.

23. Microsoft Windows Object Packager Remote Code Execution Vulnerability
BugTraq ID: 20318
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20318
Summary:
The Microsoft Windows Object Packager is prone to a remote code-execution vulnerability. This issue is due to how the affected component handles file extensions.

This vulnerability could let an attacker spoof dialogues, enticing a victim into installing a file that has been misrepresented. A successful attack that exploits this vulnerability could result in execution of arbitrary code. An exploit could completely compromise the affected computer.

24. Microsoft PowerPoint Object Pointer Remote Code Execution Vulnerability
BugTraq ID: 20304
Remote: Yes
Date Published: 2006-10-10
Relevant URL: http://www.securityfocus.com/bid/20304
Summary:
Microsoft PowerPoint is prone to a remote code-execution vulnerability.

Exploiting this issue can allow remote attackers to execute arbitrary code on a vulnerable computer by supplying a malicious PowerPoint (.ppt) document to a user.

25. Sunbelt Kerio Personal Firewall Multiple Local Denial of Service Vulnerabilities
BugTraq ID: 20299
Remote: No
Date Published: 2006-10-02
Relevant URL: http://www.securityfocus.com/bid/20299
Summary:
Sunbelt Kerio Personal Firewall is prone to multiple local denial-of-service vulnerabilities because the application fails to properly sanitize user-supplied input.

These vulnerabilities allow local attackers to crash affected systems, facilitating a denial-of-service condition on the local computer. Code execution may also be possible, but this has not been confirmed.

26. ProRat Remote Login Authentication Bypass Vulnerability
BugTraq ID: 20293
Remote: Yes
Date Published: 2006-10-02
Relevant URL: http://www.securityfocus.com/bid/20293
Summary:
ProRat is prone to an authentication-bypass vulnerability.

An attacker can exploit this issue to gain remote access to computers running this application. A successful exploit will lead to the complete compromise of affected computers.

27. MailEnable SMTP NTLM Authentication Multiple Vulnerabilities
BugTraq ID: 20290
Remote: Yes
Date Published: 2006-10-02
Relevant URL: http://www.securityfocus.com/bid/20290
Summary:
MailEnable is prone to multiple remote vulnerabilities.

These issues arise in the SMTP server during NTLM authentication and may facilitate arbitrary code execution or denial-of-service conditions.

MailEnable Professional 2.0 and MailEnable Enterprise 2.0 are reported vulnerable to these issues.

28. Trend Micro OfficeScan ATXCONSOLE.OCX ActiveX Control Format String Vulnerability
BugTraq ID: 20284
Remote: Yes
Date Published: 2006-10-01
Relevant URL: http://www.securityfocus.com/bid/20284
Summary:
Trend Micro OfficeScan is prone to a remote format-string vulnerability. This vulnerability requires a certain amount of user-interaction for an attack to occur, such as visiting a malicious website. A successful exploit would let a remote attacker execute code with the privileges of the currently logged-in user.

Trend Micro OfficeScan Corporate Edition 7.3 is reported vulnerable. Other versions may be affected as well.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. security implications of disabling WMI service
http://www.securityfocus.com/archive/88/448141

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: SPI Dynamics

ALERT: "How A Hacker Launches A Cross-Site Scripting Attack" - White Paper
Cross-site scripting vulnerabilities in web apps allow hackers to compromise confidential information, steal cookies and create requests that can be mistaken
https://download.spidynamics.com/1/ad/xss.asp?Campaign_ID=70160000000Cc5Y


---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to