SecurityFocus Microsoft Newsletter #352 ----------------------------------------
ALERT: Web 2.0 Hacking - Attack Scenarios and Examples - SPI Dynamics White Paper Web 2.0 applications are just as vulnerable to exploitation by hackers as their predecessors. When Web 2.0 applications push functionality and even code down to the client, it provides hackers with a wealth of information they can use to formulate attacks. Cross-Site Scripting, Web Application Worms and Feed Injection are attacks that have become even more dangerous when enacted against a Web 2.0 application. Learn how to secure your web apps against exploitation, download this SPI Dynamics white paper. https://download.spidynamics.com/1/ad/XP.asp?Campaign_ID=70160000000Cwmw SECURITY BLOGS SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks. http://www.securityfocus.com/blogs ------------------------------------------------------------------ I. FRONT AND CENTER 1. Security conferences versus practical knowledge 2. Achtung! New German Laws on Cybercrime II. MICROSOFT VULNERABILITY SUMMARY 1. UltraDefrag FindFiles Function Buffer Overflow Vulnerability 2. Guidance Software EnCase Forensic Unspecified Denial Of Service Vulnerability 3. Guidance Software EnCase Forensic Multiple Denial Of Service Vulnerabilities 4. Drupal Multiple Cross-Site Scripting Vulnerabilities 5. CrystalPlayer Playlist File Buffer Overflow Vulnerability 6. Microsoft Windows ARP Request Denial of Service Vulnerability 7. Sun Java System Application Server JSP Source Code Disclosure Vulnerability 8. Computer Associates Multiple Products Message Queuing Remote Stack Buffer Overflow Vulnerability 9. Kerio MailServer Attachment Filter Unspecified Vulnerability 10. Ipswitch Instant Messaging Remote Denial of Service Vulnerability 11. Zenturi ProgramChecker SASATL.DLL ActiveX Control Scan Method Buffer Overflow Vulnerability 12. Microsoft Internet Explorer SeaMonkey Browser URI Handler Command Injection Vulnerability 13. Microsoft Windows Explorer GIF File Denial of Service Vulnerability 14. Data Dynamics ActiveReports Actrpt2.DLL ActiveX Control Arbitrary File Overwrite Vulnerability 15. ESET NOD32 Antivirus Multiple Remote Vulnerabilities 16. DokuWiki Spell_UTF8Test Function HTML Injection Vulnerability 17. Opera Web Browser Dangling Pointer Remote Code Execution Vulnerability 18. Microsoft DirectX RLE Compressed Targa Image File Heap Overflow Overflow Vulnerability 19. Ipswitch IMail Server Multiple Buffer Overflow Vulnerabilities 20. Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Multiple Insecure Methods Vulnerabilities 21. QuickerSite Default.ASP Cross-Site Scripting Vulnerability III. MICROSOFT FOCUS LIST SUMMARY 1. User Access Control 2. win2k3 active directory - firewall ports IV. UNSUBSCRIBE INSTRUCTIONS V. SPONSOR INFORMATION I. FRONT AND CENTER --------------------- 1. Security conferences versus practical knowledge By Don Parker While the training industry as a whole has evolved rather well to suit the needs of their clients, the computer conference - specifically the computer security conference - has declined in relevance to the everyday sys-admin and network security practitioners. http://www.securityfocus.com/columnists/449 2. Achtung! New German Laws on Cybercrime By Federico Biancuzzi Germany is passing some new laws regarding cybercrime that might affect security professionals. Federico Biancuzzi interviewed Marco Gercke, one of the experts that was invited to the parliamentary hearing, to learn more about this delicate subject. They discussed what is covered by the new laws, which areas remain in the dark, and how they might affect vulnerability disclosure and the use of common tools, such as nmap. http://www.securityfocus.com/columnists/448 II. MICROSOFT VULNERABILITY SUMMARY ------------------------------------ 1. UltraDefrag FindFiles Function Buffer Overflow Vulnerability BugTraq ID: 25102 Remote: Yes Date Published: 2007-07-27 Relevant URL: http://www.securityfocus.com/bid/25102 Summary: UltraDefrag is prone to a buffer-overflow vulnerability. This issue is due to a failure of the application to perform adequate bounds checks on user-supplied data. Successfully exploiting this issue allows attackers to execute arbitrary machine code with SYSTEM-level privileges, facilitating the complete compromise of affected computers. UltraDefrag versions prior to 1.0.4 are vulnerable to this issue. 2. Guidance Software EnCase Forensic Unspecified Denial Of Service Vulnerability BugTraq ID: 25101 Remote: Yes Date Published: 2007-07-27 Relevant URL: http://www.securityfocus.com/bid/25101 Summary: Guidance Software EnCase Forensic is prone to an unspecified denial-of-service vulnerability because it fails to handle specially-crafted file systems. Attackers can exploit this issue to cause denial-of-service conditions. This can delay and complicate forensic investigations. NOTE: This issue may be related to the issues described in BID: 25100. EnCase Forensics version 5.0 is vulnerable; other versions may also be affected. 3. Guidance Software EnCase Forensic Multiple Denial Of Service Vulnerabilities BugTraq ID: 25100 Remote: Yes Date Published: 2007-07-27 Relevant URL: http://www.securityfocus.com/bid/25100 Summary: Guidance Software EnCase Forensic is prone to multiple denial-of-service vulnerabilities because it fails to handle specially-crafted and malformed NTFS file systems. Attackers can exploit this issue to crash the application or cause it to hang. This can delay and complicate forensic investigations. 4. Drupal Multiple Cross-Site Scripting Vulnerabilities BugTraq ID: 25097 Remote: Yes Date Published: 2007-07-27 Relevant URL: http://www.securityfocus.com/bid/25097 Summary: Drupal is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Versions prior to 4.7.7 and prior to 5.2 are vulnerable to these issues. 5. CrystalPlayer Playlist File Buffer Overflow Vulnerability BugTraq ID: 25083 Remote: Yes Date Published: 2007-07-26 Relevant URL: http://www.securityfocus.com/bid/25083 Summary: CrystalPlayer is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with the privileges of the application. Successfully exploiting this issue will result in a compromise of affected computers. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects CrystalPlayer 1.98; other versions may also be vulnerable. 6. Microsoft Windows ARP Request Denial of Service Vulnerability BugTraq ID: 25066 Remote: Yes Date Published: 2007-07-25 Relevant URL: http://www.securityfocus.com/bid/25066 Summary: Microsoft Windows is prone to a denial-of-service vulnerability due to its inefficient handling of malicious ARP requests. Attackers can exploit this issue to consume excessive CPU resources, denying service to legitimate users for the duration of the attack. Microsoft Windows XP SP2 and Vista are vulnerable to this issue; other Microsoft operating systems and versions may also be affected. 7. Sun Java System Application Server JSP Source Code Disclosure Vulnerability BugTraq ID: 25058 Remote: Yes Date Published: 2007-07-25 Relevant URL: http://www.securityfocus.com/bid/25058 Summary: Sun Java System Application Server on Microsoft Windows is prone to a vulnerability that may allow remote attackers to obtain sensitive JSP source code, which may aid them in further attacks. 8. Computer Associates Multiple Products Message Queuing Remote Stack Buffer Overflow Vulnerability BugTraq ID: 25051 Remote: Yes Date Published: 2007-07-24 Relevant URL: http://www.securityfocus.com/bid/25051 Summary: Multiple Computer Associates products are prone to a remote stack-based buffer-overflow vulnerability. This issue affects the Message Queuing (CAM/CAFT) component. The application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer. A successful exploit will allow an attacker to execute arbitrary code with SYSTEM-level privileges. This issue affects all versions of the CA Message Queuing software prior to v1.11 Build 54_4 on Windows and NetWare. 9. Kerio MailServer Attachment Filter Unspecified Vulnerability BugTraq ID: 25038 Remote: Yes Date Published: 2007-07-24 Relevant URL: http://www.securityfocus.com/bid/25038 Summary: Kerio MailServer is prone to an unspecified vulnerability due to an error in the attachment filter. Very few details are currently available regarding this issue. We will update this BID as more information emerges. Versions prior to Kerio MailServer 6.4.1 are considered vulnerable. 10. Ipswitch Instant Messaging Remote Denial of Service Vulnerability BugTraq ID: 25031 Remote: Yes Date Published: 2007-07-23 Relevant URL: http://www.securityfocus.com/bid/25031 Summary: Ipswitch Instant Messaging Server is prone to a remote denial-of-service vulnerability because the application fails to properly handle unexpected network data. Successfully exploiting this issue allows remote attackers to crash the IM service, denying further instant messages for legitimate users. Ipswitch IM Server 2.0.5.30 is vulnerable; other versions may also be affected. 11. Zenturi ProgramChecker SASATL.DLL ActiveX Control Scan Method Buffer Overflow Vulnerability BugTraq ID: 25025 Remote: Yes Date Published: 2007-07-23 Relevant URL: http://www.securityfocus.com/bid/25025 Summary: The Zenturi ProgramChecker 'sasatl.dll' ActiveX control is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions. 12. Microsoft Internet Explorer SeaMonkey Browser URI Handler Command Injection Vulnerability BugTraq ID: 25021 Remote: Yes Date Published: 2007-07-23 Relevant URL: http://www.securityfocus.com/bid/25021 Summary: Microsoft Internet Explorer is prone to a vulnerability that lets attackers inject commands through SeaMonkey's 'mailto' protocol handler. Exploiting these issues allows remote attackers to pass and execute arbitrary commands and arguments through the 'SeaMonkey.exe' process by employing the 'mailto' handler. An attacker can also employ these issues to carry out cross-browser scripting attacks by using the '-chrome' argument. This can allow the attacker to run JavaScript code with the privileges of trusted Chrome context and gain full access to SeaMonkey's resources. Exploiting these issues would permit remote attackers to influence command options that can be called through the 'mailto' handles and therefore execute commands and script code with the privileges of a user running the applications. Successful attacks may result in a variety of consequences, including remote unauthorized access. 13. Microsoft Windows Explorer GIF File Denial of Service Vulnerability BugTraq ID: 25013 Remote: Yes Date Published: 2007-07-23 Relevant URL: http://www.securityfocus.com/bid/25013 Summary: Microsoft Windows Explorer is prone to a denial-of-service vulnerability. An attacker could exploit this issue to cause Explorer to crash, effectively denying service. Arbitrary code execution may be possible, but this has not been confirmed. This issue affects Explorer on Microsoft Windows XP SP2; other operating systems and versions may also be affected. 14. Data Dynamics ActiveReports Actrpt2.DLL ActiveX Control Arbitrary File Overwrite Vulnerability BugTraq ID: 24994 Remote: Yes Date Published: 2007-07-21 Relevant URL: http://www.securityfocus.com/bid/24994 Summary: Data Dynamics ActiveReports ActiveX control is prone to an arbitrary file-overwrite vulnerability due to a design error. An attacker can exploit this issue to overwrite arbitrary files on the victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer). Successful exploits will allow attackers to cause denial-of-service conditions; other consequences are possible. This issue affect Data Dynamics ActiveReports 2.5 and prior versions. 15. ESET NOD32 Antivirus Multiple Remote Vulnerabilities BugTraq ID: 24988 Remote: Yes Date Published: 2007-07-20 Relevant URL: http://www.securityfocus.com/bid/24988 Summary: ESET NOD32 Antivirus is prone to multiple remote vulnerabilities. These issues include a heap-memory-corruption vulnerability and multiple denial-of-service vulnerabilities. An attacker can exploit these issues to execute arbitrary code with administrative privileges or cause the affected application to crash. These issues affect versions prior to ESET NOD32 2.2289. 16. DokuWiki Spell_UTF8Test Function HTML Injection Vulnerability BugTraq ID: 24973 Remote: Yes Date Published: 2007-07-19 Relevant URL: http://www.securityfocus.com/bid/24973 Summary: DokuWiki is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. DokuWiki 2007-06-26 and prior versions are vulnerable. 17. Opera Web Browser Dangling Pointer Remote Code Execution Vulnerability BugTraq ID: 24970 Remote: Yes Date Published: 2007-07-19 Relevant URL: http://www.securityfocus.com/bid/24970 Summary: The Opera Web Browser is prone to a remote code-execution vulnerability that occurs when parsing a specially crafted BitTorrent header. Exploiting this issue allows an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects Opera 9.21; prior versions may also be affected. NOTE: This issue is reported to affect only Opera running on Microsoft Windows; other platforms running Opera may also be affected. 18. Microsoft DirectX RLE Compressed Targa Image File Heap Overflow Overflow Vulnerability BugTraq ID: 24963 Remote: Yes Date Published: 2007-07-18 Relevant URL: http://www.securityfocus.com/bid/24963 Summary: A heap-based buffer-overflow vulnerability occurs in the Microsoft Windows DirectX component. This issue is related to the processing of compressed Targa image files. The specific vulnerability occurs because of the way these files are opened. A successful exploit will permit attackers to execute arbitrary code in the context of the user who opens a malicious RLE Targa image file. An attacker can exploit this issue through any means that will allow the attacker to deliver a malicious Targa file to a victim user. In web-based attack scenarios, exploits could occur automatically if the malicious page can cause the file to be loaded automatically by Windows Media Player. Other attack vectors such as email or instant messaging may require the victim user to manually open the malicious Targa file. 19. Ipswitch IMail Server Multiple Buffer Overflow Vulnerabilities BugTraq ID: 24962 Remote: Yes Date Published: 2007-07-18 Relevant URL: http://www.securityfocus.com/bid/24962 Summary: Ipswitch IMail Server is prone to multiple buffer-overflow vulnerabilities because the software fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer. Successful attacks allow arbitrary code to run, facilitating the remote compromise of affected computers. Exploit attempts may also cause the application to crash. Ipswitch IMail Server 2006 is vulnerable to these issues; other versions may also be affected. 20. Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Multiple Insecure Methods Vulnerabilities BugTraq ID: 24959 Remote: Yes Date Published: 2007-07-18 Relevant URL: http://www.securityfocus.com/bid/24959 Summary: Data Dynamics ActiveBar ActiveX control is prone to multiple vulnerabilities caused by insecure methods. The problem stems from a design error in the affected application. An attacker can exploit this issue to overwrite arbitrary files on the victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in a denial-of-service condition. These issues affect Data Dynamics ActiveBar 3.1; other versions may also be affected. 21. QuickerSite Default.ASP Cross-Site Scripting Vulnerability BugTraq ID: 24948 Remote: Yes Date Published: 2007-07-18 Relevant URL: http://www.securityfocus.com/bid/24948 Summary: QuickerSite is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks. III. MICROSOFT FOCUS LIST SUMMARY --------------------------------- 1. User Access Control http://www.securityfocus.com/archive/88/474348 2. win2k3 active directory - firewall ports http://www.securityfocus.com/archive/88/474237 IV. UNSUBSCRIBE INSTRUCTIONS ----------------------------- To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website. If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed. V. SPONSOR INFORMATION ------------------------ ALERT: Web 2.0 Hacking - Attack Scenarios and Examples - SPI Dynamics White Paper Web 2.0 applications are just as vulnerable to exploitation by hackers as their predecessors. When Web 2.0 applications push functionality and even code down to the client, it provides hackers with a wealth of information they can use to formulate attacks. Cross-Site Scripting, Web Application Worms and Feed Injection are attacks that have become even more dangerous when enacted against a Web 2.0 application. Learn how to secure your web apps against exploitation, download this SPI Dynamics white paper. https://download.spidynamics.com/1/ad/XP.asp?Campaign_ID=70160000000Cwmw
