SecurityFocus Microsoft Newsletter #369
----------------------------------------

This issue is Sponsored by: Insight24

Are There Holes in Your Network? View this on-demand webcast hosted by Dr. 
Chenxi Wang,
Principal Analyst, Security & Risk Management, Forrester Research, as she 
discusses the steps you can follow
to ensure your network isn't vulnerable. She will also outline key metrics 
organizations can use to measure the
maturity of their vulnerability management programs. Click on the link below to 
view this on-demand webcast today!
http://showcase.insight24.com/?ForresterSecurityMicrosoft


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying 
topics of interest for our community. We are proud to offer content from 
Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I.   FRONT AND CENTER
       1.Aye, Robot, or Can Computers Contract?
       2.Don't blame the IDS
II.  MICROSOFT VULNERABILITY SUMMARY
       1. SMF Private Forum Messages Information Disclosure Vulnerability
       2. Microsoft Windows 2000 Insecure Random Number Generator Information 
Disclosure Weakness
       3. Microsoft Jet DataBase Engine MDB File Parsing Remote Buffer Overflow 
Vulnerability
       4. Citrix Presentation Server Remote Unauthorized Code Execution 
Vulnerability
       5. IBM DB2 Multiple Privilege Escalation Vulnerabilities
       6. Apple QuickTime Movie Atom Remote Stack Buffer Overflow Vulnerability
       7. WebEx GPCContainer Memory Access Violation Multiple Denial of Service 
Vulnerabilities
       8. Microsoft Forms 2.0 ActiveX Control Memory Access Violation Denial of 
Service Vulnerabilities
       9. Microsoft Office Web Component Memory Access Violation Denial of 
Service Vulnerability
       10. Microsoft Windows Recursive DNS Spoofing Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
       1. Setting up IPSEC with servers in and out of a domain
       2. Security and Implications of Hosted Exchange
       3. SecurityFocus Microsoft Newsletter #368
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1.Aye, Robot, or Can Computers Contract?
By Mark Rasch
A contract is usually described as a "meeting of the minds." One person makes 
an offer for goods or services; another person sees the offer and negotiates terms; the 
parties enter into an agreement of the offer; and some form of consideration is given in 
return for the provision of something of value. At least that's what I remember from 
first year law school contracts class.
http://www.securityfocus.com/columnists/458

2.Don't blame the IDS
By Don Parker
Some years ago, I remember reading a press release from the Gartner Group. It 
was about intrusion detection systems (IDS) offering little return for the 
monetary investment in them and furthermore, that this very same security 
technology would be obsolete by the year 2005. A rather bold statement and an 
even bolder prediction on their part.
http://www.securityfocus.com/columnists/457



II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. SMF Private Forum Messages Information Disclosure Vulnerability
BugTraq ID: 26508
Remote: Yes
Date Published: 2007-11-20
Relevant URL: http://www.securityfocus.com/bid/26508
Summary:
SMF is prone to an information-disclosure vulnerability.

An attacker can exploit this issue to access sensitive information that may 
lead to further attacks.

SMF 1.1.4 is vulnerable; other versions may also be affected.

2. Microsoft Windows 2000 Insecure Random Number Generator Information 
Disclosure Weakness
BugTraq ID: 26495
Remote: No
Date Published: 2007-11-19
Relevant URL: http://www.securityfocus.com/bid/26495
Summary:
Microsoft Windows 2000 is prone to an information-disclosure weakness.

An attacker can exploit this issue to weaken encryption and other 
security-related algorithms, which may aid in further attacks.

3. Microsoft Jet DataBase Engine MDB File Parsing Remote Buffer Overflow 
Vulnerability
BugTraq ID: 26468
Remote: Yes
Date Published: 2007-11-16
Relevant URL: http://www.securityfocus.com/bid/26468
Summary:
Microsoft Jet DataBase Engine is prone to a buffer-overflow vulnerability 
because it fails to properly bounds-check user-supplied data.

Remote attackers can exploit this issue to execute arbitrary machine code in 
the context of a user running the application. Successful exploits will 
compromise the affected application and possibly the underlying computer. 
Failed attacks will likely cause denial-of-service conditions.

4. Citrix Presentation Server Remote Unauthorized Code Execution Vulnerability
BugTraq ID: 26451
Remote: Yes
Date Published: 2007-11-15
Relevant URL: http://www.securityfocus.com/bid/26451
Summary:
Citrix Presentation Server is prone to a vulnerability that may allow remote 
attackers to execute unauthorized code on the server in the context of the 
authorized user. The issue stems from a design error.

The issue affects the following applications:

Access Essentials 1.0
Citrix Access Essentials 1.5
Citrix Access Essentials 2.0
Citrix MetaFrame Presentation Server 3.0 for Microsoft Windows 2000
Citrix MetaFrame Presentation Server 3.0 for Microsoft Windows 2003
Citrix Presentation Server 4.0 for Microsoft Windows 2000
Citrix Presentation Server 4.0 for Microsoft Windows 2003
Citrix Presentation Server 4.0 x64 Edition
Citrix Presentation Server 4.5 for Windows Server 2003
Citrix Presentation Server 4.5 for Windows Server 2003 Feature Pack 1
Citrix Presentation Server 4.5 for Windows Server 2003 x64 Edition

5. IBM DB2 Multiple Privilege Escalation Vulnerabilities
BugTraq ID: 26450
Remote: Yes
Date Published: 2007-11-14
Relevant URL: http://www.securityfocus.com/bid/26450
Summary:
IBM DB2 is prone to multiple privilege-escalation vulnerabilities.

Attackers can exploit these issues to gain elevated privileges.

Very few details are available regarding these issues. We will update this BID 
as more information emerges.

This issue affects IBM DB2 9.1 and IBM DB2 9.1 with fix pack 1, 2, 3, and 3a.

6. Apple QuickTime Movie Atom Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 26443
Remote: Yes
Date Published: 2007-11-14
Relevant URL: http://www.securityfocus.com/bid/26443
Summary:
Apple QuickTime is prone to a stack-based buffer-overflow issue because it 
fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue by enticing an unsuspecting user to open a 
specially crafted movie file.

Successfully exploiting this issue allows remote attackers to execute arbitrary 
code in the context of the user running the application. Failed exploit 
attempts likely result in denial-of-service conditions.

This issue affects Apple QuickTime running on Microsoft Windows Vista, 
Microsoft Windows XP SP2, and Mac OS X.

7. WebEx GPCContainer Memory Access Violation Multiple Denial of Service 
Vulnerabilities
BugTraq ID: 26430
Remote: Yes
Date Published: 2007-11-13
Relevant URL: http://www.securityfocus.com/bid/26430
Summary:
WebEx is prone to multiple remote denial-of-service vulnerabilities.

Attackers can exploit these issues to crash applications that use the ActiveX 
control, denying service to legitimate users.

8. Microsoft Forms 2.0 ActiveX Control Memory Access Violation Denial of 
Service Vulnerabilities
BugTraq ID: 26414
Remote: Yes
Date Published: 2007-11-12
Relevant URL: http://www.securityfocus.com/bid/26414
Summary:
Microsoft Forms 2.0 ActiveX Control is prone to multiple memory-access 
violation denial-of-service vulnerabilities.

Attackers can exploit these issues to crash Internet Explorer and deny service 
to legitimate users.

Note: Forms 2.0 ActiveX is distributed with any application that includes 
Visual Basic for Applications 5.0.

9. Microsoft Office Web Component Memory Access Violation Denial of Service 
Vulnerability
BugTraq ID: 26405
Remote: Yes
Date Published: 2007-11-12
Relevant URL: http://www.securityfocus.com/bid/26405
Summary:
Microsoft Office Web Component is prone to a denial-of-service vulnerability 
because of a memory access violation.

Attackers can exploit this issue to crash Internet Explorer and deny service to 
legitimate users.

This issue affects OWC11 for Microsoft Office 2003.

10. Microsoft Windows Recursive DNS Spoofing Vulnerability
BugTraq ID: 25919
Remote: Yes
Date Published: 2007-11-13
Relevant URL: http://www.securityfocus.com/bid/25919
Summary:
Microsoft Windows DNS Server is prone to a vulnerability that permits an 
attacker to spoof responses to DNS requests.

A successful attack will corrupt the DNS cache with attacker-specified content. 
This may aid in further attacks such as phishing.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Setting up IPSEC with servers in and out of a domain
http://www.securityfocus.com/archive/88/483912

2. Security and Implications of Hosted Exchange
http://www.securityfocus.com/archive/88/483800

3. SecurityFocus Microsoft Newsletter #368
http://www.securityfocus.com/archive/88/483725

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed 
address. The contents of the subject or message body do not matter. You will 
receive a confirmation request message to which you will have to answer. 
Alternatively you can also visit http://www.securityfocus.com/newsletters and 
unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be 
manually removed.

V.   SPONSOR INFORMATION
------------------------
This issue is Sponsored by: Insight24

Are There Holes in Your Network? View this on-demand webcast hosted by Dr. 
Chenxi Wang,
Principal Analyst, Security & Risk Management, Forrester Research, as she 
discusses the steps you can follow
to ensure your network isn't vulnerable. She will also outline key metrics 
organizations can use to measure the
maturity of their vulnerability management programs. Click on the link below to 
view this on-demand webcast today!
http://showcase.insight24.com/?ForresterSecurityMicrosoft


Reply via email to