SecurityFocus Microsoft Newsletter #386
----------------------------------------
This issue is sponsored by GlobalSCAPE
Learn how GlobalSCAPE's Enhanced File Transfer (EFT) Server helped Aon's Human
Capital division increase productivity and security by streamlining data
transfers and data automation processes while making savings of almost
$300,000. By using EFT Server they ensured the security and integrity of their
file transfers and made it possible not only for Aon to control their own
customizations but also to provide secure automatic data translation in real
time which benefited employees and customers.
Download the AON case study - http://www.globalscape.com/files/case_AON.pdf
SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying
topics of interest for our community. We are proud to offer content from
Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs
------------------------------------------------------------------
I. FRONT AND CENTER
1.Catch Them if You can
2.Integrating More Intelligence into Your IDS, Part 2
II. MICROSOFT VULNERABILITY SUMMARY
1. Check Point VPN-1 IP Address Collision Denial of Service Vulnerability
2. Microsoft Internet Explorer CreateTextRange.text Denial of Service
Vulnerability
3. Apple Safari Prior to 3.1 Multiple Security Vulnerabilities
4. Home FTP Server Remote Denial of Service Vulnerability
5. Alt-N MDaemon IMAP Server FETCH Command Remote Buffer Overflow
Vulnerability
6. Cisco User-Changeable Password (UCP) 'CSuserCGI.exe' Multiple Remote
Vulnerabilities
7. RETIRED: Microsoft Internet Explorer FTP Cross-Site Command Injection
Vulnerability
8. ManageEngine ServiceDesk Plus 'SolutionSearch.do' Cross-Site Scripting
Vulnerability
9. ASG-Sentry 7.0.0 Multiple Remote Vulnerabilities
10. Motorola Timbuktu Pro Multiple Denial of Service Vulnerabilities
11. SAP MaxDB sdbstarter Environment Variable Local Privilege Escalation
Vulnerability
12. Acronis Snap Deploy PXE Server TFTP Directory Traversal and Denial of
Service Vulnerabilities
13. Microsoft Excel Conditional Formatting Values Remote Code Execution
Vulnerability
14. Microsoft Excel Rich Text Value Heap Buffer Overflow Vulnerability
15. Microsoft Excel Formula Parsing Remote Code Execution Vulnerability
16. Microsoft Excel Style Record Remote Code Execution Vulnerability
17. MailEnable SMTP EXPN/VRFY Commands Denial of Service Vulnerability
18. Microsoft Outlook Mailto URI Remote Code Execution Vulnerability
19. Microsoft Office File Memory Corruption Vulnerability
20. Microsoft Office Web Components ActiveX Control DataSource Remote
Code Execution Vulnerability
21. Microsoft Office Web Components ActiveX Control URL Parsing Remote
Code Execution Vulnerability
22. Microsoft Excel Import Remote Code Execution Vulnerability
23. Microsoft Excel Data Validation Record Heap Memory Corruption
Vulnerability
24. Timbuktu Pro File Upload and Log Input Manipulation Vulnerabilities
III. MICROSOFT FOCUS LIST SUMMARY
1. More along the lines of malware disinfection
2. Compromised WinXP box prob
3. SecurityFocus Microsoft Newsletter #385
4. Temp directory is odd
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1.Catch Them if You Can
By Don Parker
High-profile network security breaches have proliferated over the past few years. While
many "breaches" consist of lost data or a stolen laptop, true breaches -- where
a online attacker compromises a network and removes data -- have become very common
http://www.securityfocus.com/columnists/468
2.Integrating More Intelligence into Your IDS, Part 2
By Don Parker and Ryan Wegner
The more an intrusion detection system (IDS) knows about the network it is trying to protect, the better it will be able to protect the network. This is the fundamental principle behind target-based intrusion detection, where an IDS knows about the hosts on the network.
http://www.securityfocus.com/infocus/1899
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Check Point VPN-1 IP Address Collision Denial of Service Vulnerability
BugTraq ID: 28299
Remote: Yes
Date Published: 2008-03-18
Relevant URL: http://www.securityfocus.com/bid/28299
Summary:
Check Point VPN-1 is prone to a denial-of-service vulnerability that can allow
attackers to obtain sensitive information. The issue occurs because the
application fails to adequately handle IP address collisions.
Attackers can exploit this issue to break site-to-site VPN connectivity between
a VPN-1 gateway and a third party, denying access to legitimate users. If
SecuRemote back-connections are enabled, the attacker can leverage this issue
to re-route site-to-site VPN traffic from the VPN gateway to their SecuRemote
client. Under certain conditions, this will cause data that was destined for
the third party to be sent to the attacker's client instead. This could contain
sensitive information that would aid in further attacks.
2. Microsoft Internet Explorer CreateTextRange.text Denial of Service
Vulnerability
BugTraq ID: 28295
Remote: Yes
Date Published: 2008-03-18
Relevant URL: http://www.securityfocus.com/bid/28295
Summary:
Microsoft Internet Explorer is prone to a denial-of-service vulnerability
because the application fails to handle certain JavaScript code.
This issue is triggered when a remote attacker entices a victim to visit a
malicious site.
Attackers may exploit this issue to crash Internet Explorer, effectively
denying service to legitimate users.
3. Apple Safari Prior to 3.1 Multiple Security Vulnerabilities
BugTraq ID: 28290
Remote: Yes
Date Published: 2008-03-18
Relevant URL: http://www.securityfocus.com/bid/28290
Summary:
Apple Safari is prone to 12 security vulnerabilities.
Attackers may exploit these issues to execute arbitrary code, steal
cookie-based authentication credentials, spoof secure websites, obtain
sensitive information, and crash the affected application. Other attacks are
also possible.
These issues affect versions prior to Apple Safari 3.1 running on Apple Mac OS
X 10.4.1 and 10.5.2, Microsoft Windows XP, and Windows Vista.
4. Home FTP Server Remote Denial of Service Vulnerability
BugTraq ID: 28283
Remote: Yes
Date Published: 2008-03-17
Relevant URL: http://www.securityfocus.com/bid/28283
Summary:
Home FTP Server is prone to a remote denial-of-service vulnerability because it
fails to handle user-supplied input.
Successfully exploiting this issue allows remote attackers to crash the
affected application, denying service to legitimate users.
5. Alt-N MDaemon IMAP Server FETCH Command Remote Buffer Overflow Vulnerability
BugTraq ID: 28245
Remote: Yes
Date Published: 2008-03-13
Relevant URL: http://www.securityfocus.com/bid/28245
Summary:
Alt-N MDaemon IMAP Server is affected by a remote buffer-overflow vulnerability
because the application fails to perform adequate boundary checks on
user-supplied data before copying it into an insufficiently sized buffer.
Attackers may leverage this issue to execute arbitrary code with SYSTEM-level
privileges. Successful exploits will completely compromise affected computers.
Alt-N MDaemon 9.6.4 is vulnerable; other versions may also be affected.
6. Cisco User-Changeable Password (UCP) 'CSuserCGI.exe' Multiple Remote
Vulnerabilities
BugTraq ID: 28222
Remote: Yes
Date Published: 2008-03-12
Relevant URL: http://www.securityfocus.com/bid/28222
Summary:
Cisco User-Changeable Password (UCP) is prone to multiple remote
vulnerabilities, including cross-site scripting and buffer-overflow
vulnerabilities.
Exploiting the cross-site scripting issues may help the attacker steal
cookie-based authentication credentials and launch other attacks. Exploiting
the buffer-overflow vulnerabilities allows attackers to execute code in the
context of the affected application, facilitating the remote compromise of
affected computers.
The buffer-overflow issues are tracked by Cisco Bug ID CSCsl49180. The
cross-site scripting issues are tracked by Cisco Bug ID CSCsl49205.
These issues affect versions prior to UCP 4.2 when running on Microsoft Windows.
7. RETIRED: Microsoft Internet Explorer FTP Cross-Site Command Injection
Vulnerability
BugTraq ID: 28208
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28208
Summary:
Microsoft Internet Explorer is prone to a vulnerability that occurs because the
application fails to adequately sanitize user-supplied data in FTP URI requests.
An attacker can leverage this issue by enticing an unsuspecting user to follow
a maliciously crafted URI. Successful exploits will allow attackers to submit
arbitrary commands to arbitrary FTP servers on behalf of unsuspecting users.
This issue affects Internet Explorer 5 and 6; prior versions may also be
affected.
Note that access to some FTP servers may require valid authentication
credentials.
NOTE: This issue is being retired because the issue is already covered in BID
11826 (Microsoft Internet Explorer FTP URI Arbitrary FTP Server Command
Execution Vulnerability).
8. ManageEngine ServiceDesk Plus 'SolutionSearch.do' Cross-Site Scripting
Vulnerability
BugTraq ID: 28191
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28191
Summary:
ManageEngine ServiceDesk Plus is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the
browser of an unsuspecting user in the context of the affected site. This may
help the attacker steal cookie-based authentication credentials and launch
other attacks.
ManageEngine ServiceDesk Plus 7.0.0 Build 7011 for Microsoft Windows is
vulnerable; other versions may be affected as well.
9. ASG-Sentry 7.0.0 Multiple Remote Vulnerabilities
BugTraq ID: 28188
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28188
Summary:
ASG-Sentry is prone to multiple remote vulnerabilities:
- A heap-based buffer-overflow vulnerability
- A stack-based buffer-overflow vulnerability
- A denial-of-service vulnerability
- An arbitrary-file-deletion vulnerability
An attacker can exploit these issues to execute arbitrary code within the context of the affected application, crash the affected application, consume all CPU resources, and delete data contained in arbitrary files. Other attacks are possible.
These issues affect ASG-Sentry 7.0.0; other versions may also be affected.
10. Motorola Timbuktu Pro Multiple Denial of Service Vulnerabilities
BugTraq ID: 28186
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28186
Summary:
Motorola Timbuktu Pro is prone to multiple denial-of-service vulnerabilities.
Exploiting these issues will allow attackers to crash the affected application,
denying further service to legitimate users.
11. SAP MaxDB sdbstarter Environment Variable Local Privilege Escalation
Vulnerability
BugTraq ID: 28185
Remote: No
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28185
Summary:
SAP MaxDB is prone to a local privilege-escalation vulnerability.
Exploiting this issue allows local attackers to execute arbitrary code with
superuser privileges. This will lead to the complete compromise of an affected
computer.
This issue affects MaxDB 7.6.0.37 on both Linux and Solaris platforms. Other
UNIX variants are most likely affected. Microsoft Windows versions are not
vulnerable to this issue.
12. Acronis Snap Deploy PXE Server TFTP Directory Traversal and Denial of
Service Vulnerabilities
BugTraq ID: 28182
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28182
Summary:
Acronis Snap Deploy is prone to a directory-traversal vulnerability and a denial-of-service vulnerability.
Exploiting these issues will allow attackers to obtain sensitive information or
crash the affected application, denying further service to legitimate users.
13. Microsoft Excel Conditional Formatting Values Remote Code Execution
Vulnerability
BugTraq ID: 28170
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28170
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Attackers may exploit this issue by enticing victims into opening a maliciously
crafted Excel file ('.xls').
Successful exploits may allow attackers to execute arbitrary code with the
privileges of the user running the application. This may facilitate a
compromise of vulnerable computers.
14. Microsoft Excel Rich Text Value Heap Buffer Overflow Vulnerability
BugTraq ID: 28168
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28168
Summary:
Microsoft Excel is prone to a heap-based buffer-overflow vulnerability. This
issue occurs because the application fails to perform adequate boundary-checks
on user-supplied data.
Attackers may exploit this issue by enticing victims into opening a maliciously
crafted Excel file ('.xls').
Successful exploits may allow attackers to execute arbitrary code with the
privileges of the user running the application. This may facilitate a
compromise of vulnerable computers.
15. Microsoft Excel Formula Parsing Remote Code Execution Vulnerability
BugTraq ID: 28167
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28167
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Attackers may exploit this issue by enticing victims into opening a maliciously
crafted Excel file ('.xls').
Successful exploits may allow attackers to execute arbitrary code with the
privileges of the user running the application. This may facilitate a
compromise of vulnerable computers.
16. Microsoft Excel Style Record Remote Code Execution Vulnerability
BugTraq ID: 28166
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28166
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Attackers may exploit this issue by enticing victims into opening a maliciously
crafted Excel file ('.xls').
Successful exploits may allow attackers to execute arbitrary code with the
privileges of the user running the application. This may facilitate a
compromise of vulnerable computers.
17. MailEnable SMTP EXPN/VRFY Commands Denial of Service Vulnerability
BugTraq ID: 28154
Remote: Yes
Date Published: 2008-03-09
Relevant URL: http://www.securityfocus.com/bid/28154
Summary:
MailEnable is prone to a remote denial-of-service vulnerability.
This issue arises in the SMTP server and may result in a crash of the affected service.
This issue affects all versions of MailEnable Standard Edition, Professional
Edition, and Enterprise Edition.
18. Microsoft Outlook Mailto URI Remote Code Execution Vulnerability
BugTraq ID: 28147
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28147
Summary:
Microsoft Outlook is prone to a remote code-execution vulnerability because the
application fails to adequately validate user-supplied data.
Successfully exploiting this issue will allow attackers to execute arbitrary
code with the privileges of the currently logged-in user. This will facilitate
the remote compromise of affected computers.
19. Microsoft Office File Memory Corruption Vulnerability
BugTraq ID: 28146
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28146
Summary:
Microsoft Office is prone to a remote memory-corruption vulnerability.
An attacker could exploit this issue by enticing a victim to open a malicious Office file.
Successfully exploiting this issue would allow the attacker to execute
arbitrary code in the context of the currently logged-in user.
20. Microsoft Office Web Components ActiveX Control DataSource Remote Code
Execution Vulnerability
BugTraq ID: 28136
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28136
Summary:
Microsoft Office Web Components is prone to a remote code-execution
vulnerability.
An attacker may exploit this issue by enticing victims into opening a
maliciously crafted HTML document.
Successfully exploiting this issue allows remote attackers to execute arbitrary
code in the context of the application using the ActiveX control (typically
Internet Explorer). Failed exploit attempts will likely result in
denial-of-service conditions.
21. Microsoft Office Web Components ActiveX Control URL Parsing Remote Code
Execution Vulnerability
BugTraq ID: 28135
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28135
Summary:
Microsoft Office Web Components is prone to a remote code-execution
vulnerability.
An attacker may exploit this issue by enticing victims into opening a
maliciously crafted HTML document.
Successfully exploiting this issue allows remote attackers to execute arbitrary
code in the context of the application using the ActiveX control (typically
Internet Explorer). Failed exploit attempts will likely result in
denial-of-service conditions.
22. Microsoft Excel Import Remote Code Execution Vulnerability
BugTraq ID: 28095
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28095
Summary:
Microsoft Excel is prone to a remote code-execution vulnerability.
Attackers may exploit this issue by enticing victims into opening a maliciously
crafted Excel file ('.xls').
Successful exploits may allow attackers to execute arbitrary code with the
privileges of the user running the application. This may facilitate a
compromise of vulnerable computers.
23. Microsoft Excel Data Validation Record Heap Memory Corruption Vulnerability
BugTraq ID: 28094
Remote: Yes
Date Published: 2008-03-11
Relevant URL: http://www.securityfocus.com/bid/28094
Summary:
Microsoft Excel is prone to a heap memory-corruption vulnerability.
Attackers may exploit this issue by enticing victims into opening a maliciously
crafted Excel file ('.xls').
Successful exploits may allow attackers to execute arbitrary code with the
privileges of the user running the application. This may facilitate a
compromise of vulnerable computers.
24. Timbuktu Pro File Upload and Log Input Manipulation Vulnerabilities
BugTraq ID: 28081
Remote: Yes
Date Published: 2008-03-10
Relevant URL: http://www.securityfocus.com/bid/28081
Summary:
Timbuktu Pro is prone to an arbitrary-file-upload vulnerability and a
vulnerability that allows attackers to disrupt the logging of events.
An attacker can exploit these issues to upload arbitrary files and prevent the
logging of events. This may lead to other attacks.
Timbuktu Pro 8.6.5 for Windows is vulnerable; other versions running on
different platforms may also be affected.
The file-upload vulnerability may be related to BID 25453 (Motorola Timbuktu
Pro Directory Traversal Vulnerability).
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. More along the lines of malware disinfection
http://www.securityfocus.com/archive/88/489751
2. Compromised WinXP box prob
http://www.securityfocus.com/archive/88/489695
3. SecurityFocus Microsoft Newsletter #385
http://www.securityfocus.com/archive/88/489513
4. Temp directory is odd
http://www.securityfocus.com/archive/88/489429
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed
address. The contents of the subject or message body do not matter. You will
receive a confirmation request message to which you will have to answer.
Alternatively you can also visit http://www.securityfocus.com/newsletters and
unsubscribe via the website.
If your email address has changed email [EMAIL PROTECTED] and ask to be
manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is sponsored by GlobalSCAPE
Learn how GlobalSCAPE's Enhanced File Transfer (EFT) Server helped Aon's Human
Capital division increase productivity and security by streamlining data
transfers and data automation processes while making savings of almost
$300,000. By using EFT Server they ensured the security and integrity of their
file transfers and made it possible not only for Aon to control their own
customizations but also to provide secure automatic data translation in real
time which benefited employees and customers.
Download the AON case study - http://www.globalscape.com/files/case_AON.pdf