SecurityFocus Microsoft Newsletter #352
----------------------------------------

ALERT: Web 2.0 Hacking - Attack Scenarios and Examples - SPI Dynamics White 
Paper
Web 2.0 applications are just as vulnerable to exploitation by hackers as their 
predecessors. When Web 2.0 applications push functionality and even code down 
to the client, it provides hackers with a wealth of information they can use to 
formulate attacks. Cross-Site Scripting, Web Application Worms and Feed 
Injection are attacks that have become even more dangerous when enacted against 
a Web 2.0 application. Learn how to secure your web apps against exploitation, 
download this SPI Dynamics white paper.

https://download.spidynamics.com/1/ad/XP.asp?Campaign_ID=70160000000Cwmw


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying 
topics of interest for our community. We are proud to offer content from 
Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Security conferences versus practical knowledge
       2. Achtung! New German Laws on Cybercrime
II.  MICROSOFT VULNERABILITY SUMMARY
       1. UltraDefrag FindFiles Function Buffer Overflow Vulnerability
       2. Guidance Software EnCase Forensic Unspecified Denial Of Service 
Vulnerability
       3. Guidance Software EnCase Forensic Multiple Denial Of Service 
Vulnerabilities
       4. Drupal Multiple Cross-Site Scripting Vulnerabilities
       5. CrystalPlayer Playlist File Buffer Overflow Vulnerability
       6. Microsoft Windows ARP Request Denial of Service Vulnerability
       7. Sun Java System Application Server JSP Source Code Disclosure 
Vulnerability
       8. Computer Associates Multiple Products Message Queuing Remote Stack 
Buffer Overflow Vulnerability
       9. Kerio MailServer Attachment Filter Unspecified Vulnerability
       10. Ipswitch Instant Messaging Remote Denial of Service Vulnerability
       11. Zenturi ProgramChecker SASATL.DLL ActiveX Control Scan Method Buffer 
Overflow Vulnerability
       12. Microsoft Internet Explorer SeaMonkey Browser URI Handler Command 
Injection Vulnerability
       13. Microsoft Windows Explorer GIF File Denial of Service Vulnerability
       14. Data Dynamics ActiveReports Actrpt2.DLL ActiveX Control Arbitrary 
File Overwrite Vulnerability
       15. ESET NOD32 Antivirus Multiple Remote Vulnerabilities
       16. DokuWiki Spell_UTF8Test Function HTML Injection Vulnerability
       17. Opera Web Browser Dangling Pointer Remote Code Execution 
Vulnerability
       18. Microsoft DirectX RLE Compressed Targa Image File Heap Overflow 
Overflow Vulnerability
       19. Ipswitch IMail Server Multiple Buffer Overflow Vulnerabilities
       20. Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Multiple 
Insecure Methods Vulnerabilities
       21. QuickerSite Default.ASP Cross-Site Scripting Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. User Access Control
       2. win2k3 active directory - firewall ports
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Security conferences versus practical knowledge
By Don Parker
While the training industry as a whole has evolved rather well to suit the 
needs of their clients, the computer conference - specifically the computer 
security conference - has declined in relevance to the everyday sys-admin and 
network security practitioners.
http://www.securityfocus.com/columnists/449

2. Achtung! New German Laws on Cybercrime
By Federico Biancuzzi
Germany is passing some new laws regarding cybercrime that might affect 
security professionals. Federico Biancuzzi interviewed Marco Gercke, one of the 
experts that was invited to the parliamentary hearing, to learn more about this 
delicate subject. They discussed what is covered by the new laws, which areas 
remain in the dark, and how they might affect vulnerability disclosure and the 
use of common tools, such as nmap.
http://www.securityfocus.com/columnists/448


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. UltraDefrag FindFiles Function Buffer Overflow Vulnerability
BugTraq ID: 25102
Remote: Yes
Date Published: 2007-07-27
Relevant URL: http://www.securityfocus.com/bid/25102
Summary:
UltraDefrag is prone to a buffer-overflow vulnerability. This issue is due to a 
failure of the application to perform adequate bounds checks on user-supplied 
data.

Successfully exploiting this issue allows attackers to execute arbitrary 
machine code with SYSTEM-level privileges, facilitating the complete compromise 
of affected computers.

UltraDefrag versions prior to 1.0.4 are vulnerable to this issue.

2. Guidance Software EnCase Forensic Unspecified Denial Of Service Vulnerability
BugTraq ID: 25101
Remote: Yes
Date Published: 2007-07-27
Relevant URL: http://www.securityfocus.com/bid/25101
Summary:
Guidance Software EnCase Forensic is prone to an unspecified denial-of-service 
vulnerability because it fails to handle specially-crafted file systems.

Attackers can exploit this issue to cause denial-of-service conditions. This 
can delay and complicate forensic investigations.

NOTE: This issue may be related to the issues described in BID: 25100.

EnCase Forensics version 5.0 is vulnerable; other versions may also be affected.

3. Guidance Software EnCase Forensic Multiple Denial Of Service Vulnerabilities
BugTraq ID: 25100
Remote: Yes
Date Published: 2007-07-27
Relevant URL: http://www.securityfocus.com/bid/25100
Summary:
Guidance Software EnCase Forensic is prone to multiple denial-of-service 
vulnerabilities because it fails to handle specially-crafted and malformed NTFS 
file systems.

Attackers can exploit this issue to crash the application or cause it to hang. 
This can delay and complicate forensic investigations.

4. Drupal Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 25097
Remote: Yes
Date Published: 2007-07-27
Relevant URL: http://www.securityfocus.com/bid/25097
Summary:
Drupal is prone to multiple cross-site scripting vulnerabilities because it 
fails to properly sanitize user-supplied input before using it in dynamically 
generated content.

An attacker may leverage these issues to have arbitrary script code execute in 
the browser of an unsuspecting user in the context of the affected site. This 
may help the attacker steal cookie-based authentication credentials and launch 
other attacks.

Versions prior to 4.7.7 and prior to 5.2 are vulnerable to these issues.

5. CrystalPlayer Playlist File Buffer Overflow Vulnerability
BugTraq ID: 25083
Remote: Yes
Date Published: 2007-07-26
Relevant URL: http://www.securityfocus.com/bid/25083
Summary:
CrystalPlayer is prone to a buffer-overflow vulnerability because the 
application fails to properly bounds-check user-supplied data before copying it 
into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code with the 
privileges of the application. Successfully exploiting this issue will result 
in a compromise of affected computers. Failed exploit attempts will likely 
result in denial-of-service conditions.

This issue affects CrystalPlayer 1.98; other versions may also be vulnerable.

6. Microsoft Windows ARP Request Denial of Service Vulnerability
BugTraq ID: 25066
Remote: Yes
Date Published: 2007-07-25
Relevant URL: http://www.securityfocus.com/bid/25066
Summary:
Microsoft Windows is prone to a denial-of-service vulnerability due to its 
inefficient handling of malicious ARP requests.

Attackers can exploit this issue to consume excessive CPU resources, denying 
service to legitimate users for the duration of the attack.

Microsoft Windows XP SP2 and Vista are vulnerable to this issue; other 
Microsoft operating systems and versions may also be affected.

7. Sun Java System Application Server JSP Source Code Disclosure Vulnerability
BugTraq ID: 25058
Remote: Yes
Date Published: 2007-07-25
Relevant URL: http://www.securityfocus.com/bid/25058
Summary:
Sun Java System Application Server on Microsoft Windows is prone to a 
vulnerability that may allow remote attackers to obtain sensitive JSP source 
code, which may aid them in further attacks.

8. Computer Associates Multiple Products Message Queuing Remote Stack Buffer 
Overflow Vulnerability
BugTraq ID: 25051
Remote: Yes
Date Published: 2007-07-24
Relevant URL: http://www.securityfocus.com/bid/25051
Summary:
Multiple Computer Associates products are prone to a remote stack-based 
buffer-overflow vulnerability.  This issue affects the Message Queuing 
(CAM/CAFT) component. The application fails to properly bounds-check 
user-supplied data before copying it to an insufficiently sized buffer.

A successful exploit will allow an attacker to execute arbitrary code with 
SYSTEM-level privileges.

This issue affects all versions of the CA Message Queuing software prior to 
v1.11 Build 54_4 on Windows and NetWare.

9. Kerio MailServer Attachment Filter Unspecified Vulnerability
BugTraq ID: 25038
Remote: Yes
Date Published: 2007-07-24
Relevant URL: http://www.securityfocus.com/bid/25038
Summary:
Kerio MailServer is prone to an unspecified vulnerability due to an error in 
the attachment filter.

Very few details are currently available regarding this issue. We will update 
this BID as more information emerges.

Versions prior to Kerio MailServer 6.4.1 are considered vulnerable.

10. Ipswitch Instant Messaging Remote Denial of Service Vulnerability
BugTraq ID: 25031
Remote: Yes
Date Published: 2007-07-23
Relevant URL: http://www.securityfocus.com/bid/25031
Summary:
Ipswitch Instant Messaging Server is prone to a remote denial-of-service 
vulnerability because the application fails to properly handle unexpected 
network data.

Successfully exploiting this issue allows remote attackers to crash the IM 
service, denying further instant messages for legitimate users.

Ipswitch IM Server 2.0.5.30 is vulnerable; other versions may also be affected.

11. Zenturi ProgramChecker SASATL.DLL ActiveX Control Scan Method Buffer 
Overflow Vulnerability
BugTraq ID: 25025
Remote: Yes
Date Published: 2007-07-23
Relevant URL: http://www.securityfocus.com/bid/25025
Summary:
The Zenturi ProgramChecker 'sasatl.dll' ActiveX control is prone to a 
buffer-overflow vulnerability because it fails to bounds-check user-supplied 
data before copying it into an insufficiently sized buffer.

Successfully exploiting this issue allows remote attackers to execute arbitrary 
code in the context of the application using the ActiveX control (typically 
Internet Explorer). Failed exploit attempts likely result in denial-of-service 
conditions.

12. Microsoft Internet Explorer SeaMonkey Browser URI Handler Command Injection 
Vulnerability
BugTraq ID: 25021
Remote: Yes
Date Published: 2007-07-23
Relevant URL: http://www.securityfocus.com/bid/25021
Summary:
Microsoft Internet Explorer is prone to a vulnerability that lets attackers 
inject commands through SeaMonkey's 'mailto' protocol handler.

Exploiting these issues allows remote attackers to pass and execute arbitrary 
commands and arguments through the 'SeaMonkey.exe' process by employing the 
'mailto' handler.

An attacker can also employ these issues to carry out cross-browser scripting 
attacks by using the '-chrome' argument. This can allow the attacker to run 
JavaScript code with the privileges of trusted Chrome context and gain full 
access to SeaMonkey's resources.

Exploiting these issues would permit remote attackers to influence command 
options that can be called through the 'mailto' handles and therefore execute 
commands and script code with the privileges of a user running the 
applications. Successful attacks may result in a variety of consequences, 
including remote unauthorized access.

13. Microsoft Windows Explorer GIF File Denial of Service Vulnerability
BugTraq ID: 25013
Remote: Yes
Date Published: 2007-07-23
Relevant URL: http://www.securityfocus.com/bid/25013
Summary:
Microsoft Windows Explorer is prone to a denial-of-service vulnerability.

An attacker could exploit this issue to cause Explorer to crash, effectively 
denying service. Arbitrary code execution may be possible, but this has not 
been confirmed.

This issue affects Explorer on Microsoft Windows XP SP2; other operating 
systems and versions may also be affected.

14. Data Dynamics ActiveReports Actrpt2.DLL ActiveX Control Arbitrary File 
Overwrite Vulnerability
BugTraq ID: 24994
Remote: Yes
Date Published: 2007-07-21
Relevant URL: http://www.securityfocus.com/bid/24994
Summary:
Data Dynamics ActiveReports ActiveX control is prone to an arbitrary 
file-overwrite vulnerability due to a design error.

An attacker can exploit this issue to overwrite arbitrary files on the victim's 
computer in the context of the vulnerable application using the ActiveX control 
(typically Internet Explorer). Successful exploits will allow attackers to 
cause denial-of-service conditions; other consequences are possible.

This issue affect Data Dynamics ActiveReports 2.5 and prior versions.

15. ESET NOD32 Antivirus Multiple Remote Vulnerabilities
BugTraq ID: 24988
Remote: Yes
Date Published: 2007-07-20
Relevant URL: http://www.securityfocus.com/bid/24988
Summary:
ESET NOD32 Antivirus is prone to multiple remote vulnerabilities. These issues 
include a heap-memory-corruption vulnerability and multiple denial-of-service 
vulnerabilities.

An attacker can exploit these issues to execute arbitrary code with 
administrative privileges or cause the affected application to crash.

These issues affect versions prior to ESET NOD32 2.2289.

16. DokuWiki Spell_UTF8Test Function HTML Injection Vulnerability
BugTraq ID: 24973
Remote: Yes
Date Published: 2007-07-19
Relevant URL: http://www.securityfocus.com/bid/24973
Summary:
DokuWiki is prone to an HTML-injection vulnerability because the application 
fails to properly sanitize user-supplied input before using it in dynamically 
generated content.

Attacker-supplied HTML and script code would execute in the context of the 
affected site, potentially allowing the attacker to steal cookie-based 
authentication credentials or to control how the site is rendered to the user; 
other attacks are also possible.

DokuWiki 2007-06-26 and prior versions are vulnerable.

17. Opera Web Browser Dangling Pointer Remote Code Execution Vulnerability
BugTraq ID: 24970
Remote: Yes
Date Published: 2007-07-19
Relevant URL: http://www.securityfocus.com/bid/24970
Summary:
The Opera Web Browser is prone to a remote code-execution vulnerability that 
occurs when parsing a specially crafted BitTorrent header.

Exploiting this issue allows an attacker to execute arbitrary code with the 
privileges of the user running the affected application. Failed exploit 
attempts will result in a denial-of-service condition.

This issue affects Opera 9.21; prior versions may also be affected.

NOTE: This issue is reported to affect only Opera running on Microsoft Windows; 
other platforms running Opera may also be affected.

18. Microsoft DirectX RLE Compressed Targa Image File Heap Overflow Overflow 
Vulnerability
BugTraq ID: 24963
Remote: Yes
Date Published: 2007-07-18
Relevant URL: http://www.securityfocus.com/bid/24963
Summary:
A heap-based buffer-overflow vulnerability occurs in the Microsoft Windows 
DirectX component.  This issue is related to the processing of compressed Targa 
image files.  The specific vulnerability occurs because of the way these files 
are opened.

A successful exploit will permit attackers to execute arbitrary code in the 
context of the user who opens a malicious RLE Targa image file.

An attacker can exploit this issue through any means that will allow the 
attacker to deliver a malicious Targa file to a victim user.  In web-based 
attack scenarios, exploits could occur automatically if the malicious page can 
cause the file to be loaded automatically by Windows Media Player.  Other 
attack vectors such as email or instant messaging may require the victim user 
to manually open the malicious Targa file.

19. Ipswitch IMail Server Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 24962
Remote: Yes
Date Published: 2007-07-18
Relevant URL: http://www.securityfocus.com/bid/24962
Summary:
Ipswitch IMail Server is prone to multiple buffer-overflow vulnerabilities 
because the software fails to properly check boundaries on user-supplied data 
before copying it to an insufficiently sized buffer.

Successful attacks allow arbitrary code to run, facilitating the remote 
compromise of affected computers. Exploit attempts may also cause the 
application to crash.

Ipswitch IMail Server 2006 is vulnerable to these issues; other versions may 
also be affected.

20. Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Multiple Insecure 
Methods Vulnerabilities
BugTraq ID: 24959
Remote: Yes
Date Published: 2007-07-18
Relevant URL: http://www.securityfocus.com/bid/24959
Summary:
Data Dynamics ActiveBar ActiveX control is prone to multiple vulnerabilities 
caused by insecure methods. The problem stems from a design error in the 
affected application.

An attacker can exploit this issue to overwrite arbitrary files on the victim's 
computer in the context of the vulnerable application using the ActiveX control 
(typically Internet Explorer). Failed exploit attempts will likely result in a 
denial-of-service condition.

These issues affect Data Dynamics ActiveBar 3.1; other versions may also be 
affected.

21. QuickerSite Default.ASP Cross-Site Scripting Vulnerability
BugTraq ID: 24948
Remote: Yes
Date Published: 2007-07-18
Relevant URL: http://www.securityfocus.com/bid/24948
Summary:
QuickerSite is prone to a cross-site scripting vulnerability because it fails 
to properly sanitize user-supplied input.

Exploiting this vulnerability may allow an attacker to perform cross-site 
scripting attacks on unsuspecting users in the context of the affected website. 
As a result, the attacker may be able to steal cookie-based authentication 
credentials and to launch other attacks.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. User Access Control
http://www.securityfocus.com/archive/88/474348

2. win2k3 active directory - firewall ports
http://www.securityfocus.com/archive/88/474237

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed 
address. The contents of the subject or message body do not matter. You will 
receive a confirmation request message to which you will have to answer. 
Alternatively you can also visit http://www.securityfocus.com/newsletters and 
unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be 
manually removed.

V.   SPONSOR INFORMATION
------------------------
ALERT: Web 2.0 Hacking - Attack Scenarios and Examples - SPI Dynamics White 
Paper
Web 2.0 applications are just as vulnerable to exploitation by hackers as their 
predecessors. When Web 2.0 applications push functionality and even code down 
to the client, it provides hackers with a wealth of information they can use to 
formulate attacks. Cross-Site Scripting, Web Application Worms and Feed 
Injection are attacks that have become even more dangerous when enacted against 
a Web 2.0 application. Learn how to secure your web apps against exploitation, 
download this SPI Dynamics white paper.

https://download.spidynamics.com/1/ad/XP.asp?Campaign_ID=70160000000Cwmw


Reply via email to