SecurityFocus Microsoft Newsletter #434 ----------------------------------------
This issue is sponsored by Qualys Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. http://dinclinx.com/Redirect.aspx?36;4164;35;189;0;6;259;456696438e431ea1 SECURITY BLOGS SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks. http://www.securityfocus.com/blogs ------------------------------------------------------------------ I. FRONT AND CENTER 1. Free Market Filtering 2. Don't Blame the Browser II. MICROSOFT VULNERABILITY SUMMARY 1. Easy File Sharing Web Server 'thumbnail.php' File Disclosure Vulnerability 2. EFS Software Easy Chat Server 'registresult.htm' Authentication Bypass Vulnerability 3. VUPlayer '.CUE' File Buffer Overflow Vulnerability 4. Media Commands Multiple Media File Multiple Heap Buffer Overflow Vulnerabilities 5. Internet Download Manager Language File Parsing Buffer Overflow Vulnerability 6. BreakPoint Software Hex Workshop '.hex' File Handling Buffer Overflow Vulnerability 7. POP Peeper UIDL Remote Buffer Overflow Vulnerability 8. BitDefender Internet Security 2009 File Name Cross Site Scripting Vulnerability 9. HP Virtual Rooms Client ActiveX Control Insecure Method Remote Code Execution Vulnerability 10. Drupal Theme System Template File Local File Include Vulnerability 11. SHOUTcast Server DNAS Relay Remote Buffer Overflow Vulnerability 12. Adobe Flash Player Unspecified Remote Denial of Service Vulnerability 13. Adobe Flash Player Unspecified Information Disclosure Vulnerability 14. Adobe Flash Player Invalid Object Reference Remote Code Execution Vulnerability 15. Microsoft Excel Invalid Object Remote Code Execution Vulnerability III. MICROSOFT FOCUS LIST SUMMARY 1. SecurityFocus Microsoft Newsletter #433 IV. UNSUBSCRIBE INSTRUCTIONS V. SPONSOR INFORMATION I. FRONT AND CENTER --------------------- 1.Free Market Filtering By Mark Rasch The Australian government is considering requiring that Internet service providers in that country install filters which would prevent citizens from accessing tens of thousands of sites that contain "objectionable" material. http://www.securityfocus.com/columnists/493 2.Don't Blame the Browser Melih Abdulhayoglu There was a time when most diseases were fatal for humans. Intense study and research helped doctors manage diseases better, and subsequently even prevent them altogether. http://www.securityfocus.com/columnists/492 II. MICROSOFT VULNERABILITY SUMMARY ------------------------------------ 1. Easy File Sharing Web Server 'thumbnail.php' File Disclosure Vulnerability BugTraq ID: 33973 Remote: Yes Date Published: 2009-03-04 Relevant URL: http://www.securityfocus.com/bid/33973 Summary: Easy File Sharing Web Server is prone to a vulnerability that lets attackers obtain potentially sensitive information because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files with the privileges of the webserver process. Information obtained may aid in further attacks. Easy File Sharing Web Server 4.8 is vulnerable; other versions may also be affected. 2. EFS Software Easy Chat Server 'registresult.htm' Authentication Bypass Vulnerability BugTraq ID: 33967 Remote: Yes Date Published: 2009-03-03 Relevant URL: http://www.securityfocus.com/bid/33967 Summary: EFS Software Easy Chat Server is prone to an authentication-bypass vulnerability because it fails to perform adequate authentication checks. Attackers can exploit this vulnerability to gain unauthorized access to the affected application, which may aid in further attacks. Easy Chat Server 2.2 is vulnerable; other versions may also be affected. 3. VUPlayer '.CUE' File Buffer Overflow Vulnerability BugTraq ID: 33960 Remote: Yes Date Published: 2009-03-02 Relevant URL: http://www.securityfocus.com/bid/33960 Summary: VUPlayer is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. VUPlayer 2.49 is vulnerable; other versions may also be affected. 4. Media Commands Multiple Media File Multiple Heap Buffer Overflow Vulnerabilities BugTraq ID: 33958 Remote: Yes Date Published: 2009-03-02 Relevant URL: http://www.securityfocus.com/bid/33958 Summary: Media Commands is prone to multiple heap-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied input. Successfully exploiting these issues may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will cause denial-of-service conditions. Media Commands 1.0 is vulnerable; other versions may also be affected. 5. Internet Download Manager Language File Parsing Buffer Overflow Vulnerability BugTraq ID: 33934 Remote: Yes Date Published: 2009-02-27 Relevant URL: http://www.securityfocus.com/bid/33934 Summary: Internet Download Manager (IDM) is prone to a remote buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects IDM 5.15 Build 3; other versions may also be vulnerable. 6. BreakPoint Software Hex Workshop '.hex' File Handling Buffer Overflow Vulnerability BugTraq ID: 33932 Remote: Yes Date Published: 2009-02-27 Relevant URL: http://www.securityfocus.com/bid/33932 Summary: Hex Workshop is prone to a buffer-overflow vulnerability because it fails to adequately validate user-supplied data before copying it into an insufficiently sized buffer. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Hex Workshop 6 is vulnerable; other versions may also be affected. 7. POP Peeper UIDL Remote Buffer Overflow Vulnerability BugTraq ID: 33926 Remote: Yes Date Published: 2009-02-27 Relevant URL: http://www.securityfocus.com/bid/33926 Summary: POP Peeper is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. POP Peeper 3.4.0.0 is vulnerable; other versions may also be affected. 8. BitDefender Internet Security 2009 File Name Cross Site Scripting Vulnerability BugTraq ID: 33921 Remote: Yes Date Published: 2009-02-26 Relevant URL: http://www.securityfocus.com/bid/33921 Summary: BitDefender Internet Security 2009 is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. 9. HP Virtual Rooms Client ActiveX Control Insecure Method Remote Code Execution Vulnerability BugTraq ID: 33918 Remote: Yes Date Published: 2009-02-26 Relevant URL: http://www.securityfocus.com/bid/33918 Summary: HP Virtual Rooms client ActiveX control is prone to a remote code-execution vulnerability. Successfully exploiting this issue allows an attacker to execute arbitrary code in the context of the application running the affected control (typically Internet Explorer). This issue affects Virtual Rooms 7.0 and earlier running on Microsoft Windows. 10. Drupal Theme System Template File Local File Include Vulnerability BugTraq ID: 33910 Remote: Yes Date Published: 2009-02-25 Relevant URL: http://www.securityfocus.com/bid/33910 Summary: Drupal is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. This issue affects Drupal running under Microsoft Windows. An attacker can exploit this vulnerability to view files and execute local scripts in the context of the webserver process. This may aid in further attacks. The following are vulnerable: Drupal 5.x prior to 5.16 Drupal 6.x prior to 6.10 11. SHOUTcast Server DNAS Relay Remote Buffer Overflow Vulnerability BugTraq ID: 33904 Remote: Yes Date Published: 2009-02-25 Relevant URL: http://www.securityfocus.com/bid/33904 Summary: SHOUTcast Server is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers may exploit this issue to overwrite the application's web administration password and possibly to execute arbitrary code within the context of the application, but this has not been confirmed. Failed exploit attempts will cause a denial-of-service condition. SHOUTcast Server 1.9.8 for Windows is vulnerable; other versions may also be affected. 12. Adobe Flash Player Unspecified Remote Denial of Service Vulnerability BugTraq ID: 33890 Remote: Yes Date Published: 2009-02-24 Relevant URL: http://www.securityfocus.com/bid/33890 Summary: Adobe Flash Player is prone to a remote denial-of-service vulnerability because it fails to properly validate user-supplied input. Exploiting this issue allows remote attackers to crash the application and possibly to execute code, but this has not been confirmed. Versions prior to Flash Player 10.0.22.87 are vulnerable. 13. Adobe Flash Player Unspecified Information Disclosure Vulnerability BugTraq ID: 33889 Remote: Yes Date Published: 2009-02-24 Relevant URL: http://www.securityfocus.com/bid/33889 Summary: Adobe Flash Player is prone to an information-disclosure vulnerability. Successful exploits will allow an attacker to obtain potentially sensitive information that may be used to elevate privileges. This issue affects Flash Player on Linux-based operating systems only. 14. Adobe Flash Player Invalid Object Reference Remote Code Execution Vulnerability BugTraq ID: 33880 Remote: Yes Date Published: 2009-02-24 Relevant URL: http://www.securityfocus.com/bid/33880 Summary: Adobe Flash Player is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will likely crash the application, denying service to legitimate users. Versions prior to Flash Player 10.0.12.36 are vulnerable. 15. Microsoft Excel Invalid Object Remote Code Execution Vulnerability BugTraq ID: 33870 Remote: Yes Date Published: 2009-02-23 Relevant URL: http://www.securityfocus.com/bid/33870 Summary: Microsoft Excel is prone to a remote code-execution vulnerability. Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file. Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition. III. MICROSOFT FOCUS LIST SUMMARY --------------------------------- 1. SecurityFocus Microsoft Newsletter #433 http://www.securityfocus.com/archive/88/501284 IV. UNSUBSCRIBE INSTRUCTIONS ----------------------------- To unsubscribe send an e-mail message to [email protected] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website. If your email address has changed email [email protected] and ask to be manually removed. V. SPONSOR INFORMATION ------------------------ This issue is sponsored by Qualys Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. http://dinclinx.com/Redirect.aspx?36;4164;35;189;0;6;259;456696438e431ea1
