SecurityFocus Microsoft Newsletter #439 ----------------------------------------
This issue is sponsored by Red Hat Putting open source to the test:The making of JBoss Enterprise Middleware Through a rigorous productization process, JBoss Enterprise Middleware teams continually harden and transform cutting-edge open source technology into well-tempered enterprise software products with unsurpassed quality, performance, and stability - then deliver it with top-notch support and mission-critical SLAs. Here's how it's done. http://dinclinx.com/Redirect.aspx?36;4756;20;189;0;1;259;ac28cb88c17443b5 SECURITY BLOGS SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks. http://www.securityfocus.com/blogs ------------------------------------------------------------------ I. FRONT AND CENTER 1. Facebook, Privacy and Contracts 2. Act Locally, Pwn Globally II. MICROSOFT VULNERABILITY SUMMARY 1. SWF Opener Buffer Overflow Vulnerability 2. Wireshark Prior to 1.0.7 Multiple Denial Of Service Vulnerabilities 3. HP ProCurve Manager and ProCurve Manager Plus Unauthorized Access Vulnerability 4. Microsoft April 2009 Advance Notification Multiple Vulnerabilities 5. EMC RepliStor Multiple Remote Heap Based Buffer Overflow Vulnerabilities 6. OpenAFS Unix Cache Manager Heap-Based Buffer Overflow Vulnerability 7. OpenAFS Error Codes Remote Denial of Service Vulnerabiliy 8. JustSystems Ichitaro RTF File Buffer Overflow Vulnerability 9. Novell NetIdentity Agent 'XTIERRPCPIPE' Remote Code Execution Vulnerability 10. UltraISO '.ui' ISO Project File Buffer Overflow Vulnerability 11. Unsniff Network Analyzer '.usnf' File Heap-Based Buffer Overflow Vulnerability 12. UltraISO CCD and IMG File Buffer Overflow Vulnerability 13. Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability 14. Fortinet FortiClient VPN Connection Name Local Format String Vulnerability 15. SAP Business Objects Crystal Reports 'viewreport.asp' Cross Site Scripting Vulnerability 16. OpenX Prior to 2.8 Multiple Input Validation Vulnerabilities 17. XBMC Multiple Remote Buffer Overflow Vulnerabilities 18. IBM DB2 Content Manager eClient Unspecified Security Vulnerability 19. Apple Safari XML Parser Nested XML Tag Remote Denial of Service Vulnerability 20. Bugzilla 'attachment.cgi' Cross Site Request Forgery Vulnerability 21. Trend Micro Internet Security 2008/9 IOCTL Request Local Privilege Escalation Vulnerability 22. Wireshark PN-DCP Data Format String Vulnerability 23. AtomixMP3 Malformed 'm3u' Playlist File Buffer Overflow Vulnerability 24. RETIRED: Check Point FireWall-1 PKI Web Service Remote Buffer Overflow Vulnerabilities III. MICROSOFT FOCUS LIST SUMMARY 1. SecurityFocus Microsoft Newsletter #438 IV. UNSUBSCRIBE INSTRUCTIONS V. SPONSOR INFORMATION I. FRONT AND CENTER --------------------- 1. Facebook, Privacy and Contracts On February 4, the social networking site Facebook made a minor change to its terms of service - the online contract that every user must agree to when they create an account. Facebook was trying to solve a legitimate problem: People who deleted their accounts did not realize that information that they shared with other users would persist on their Facebook friends' accounts. Thus, they needed some way of telling users that the information might remain. http://www.securityfocus.com/columnists/497 2. Act Locally, Pwn Globally By Jeffrey Carr On December 24, 2008, the Pakistani Whackerz Cr3w defaced a part of India's critical infrastructure, the Eastern Railway system Web site. The defacement appeared on a scroll feed which read: "Cyber war has been declared on Indian cyberspace by Whackerz- Pakistan (24 Dec-2008)." http://www.securityfocus.com/columnists/496 II. MICROSOFT VULNERABILITY SUMMARY ------------------------------------ 1. SWF Opener Buffer Overflow Vulnerability BugTraq ID: 34459 Remote: Yes Date Published: 2009-04-09 Relevant URL: http://www.securityfocus.com/bid/34459 Summary: SWF Opener is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. SWF Opener 1.3 is vulnerable; other versions may also be affected. 2. Wireshark Prior to 1.0.7 Multiple Denial Of Service Vulnerabilities BugTraq ID: 34457 Remote: Yes Date Published: 2009-04-06 Relevant URL: http://www.securityfocus.com/bid/34457 Summary: Wireshark is prone to multiple denial-of-service vulnerabilities. Exploiting these issues may allow attackers to crash the application, denying service to legitimate users. Attackers may be able to leverage some of these vulnerabilities to execute arbitrary code, but this has not been confirmed. Versions prior to Wireshark 1.0.7 are vulnerable. 3. HP ProCurve Manager and ProCurve Manager Plus Unauthorized Access Vulnerability BugTraq ID: 34451 Remote: Yes Date Published: 2009-04-09 Relevant URL: http://www.securityfocus.com/bid/34451 Summary: HP ProCurve Manager and ProCurve Manager Plus are prone to an unspecified unauthorized-access vulnerability. Remote attackers may exploit this issue to gain unauthorized access to data. The following are vulnerable: ProCurve Manager 3.2 and earlier ProCurve Manager Plus 3.2 and eariler 4. Microsoft April 2009 Advance Notification Multiple Vulnerabilities BugTraq ID: 34450 Remote: Yes Date Published: 2009-04-09 Relevant URL: http://www.securityfocus.com/bid/34450 Summary: Microsoft has released advance notification that the vendor will be releasing eight security bulletins on April 14, 2009. The highest severity rating for these issues is 'Critical'. These issues affect Windows, Internet Explorer, Office, Excel, and ISA Server. Successfully exploiting these issues may allow remote or local attackers to compromise affected computers. Individual records will be created to document these issues when the bulletins are released. 5. EMC RepliStor Multiple Remote Heap Based Buffer Overflow Vulnerabilities BugTraq ID: 34449 Remote: Yes Date Published: 2009-04-09 Relevant URL: http://www.securityfocus.com/bid/34449 Summary: EMC RepliStor is prone to multiple remote heap-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied input. A remote attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. Versions prior to RepliStor 6.2 SP5 and RepliStor 6.3 SP2 are vulnerable. 6. OpenAFS Unix Cache Manager Heap-Based Buffer Overflow Vulnerability BugTraq ID: 34407 Remote: Yes Date Published: 2009-04-07 Relevant URL: http://www.securityfocus.com/bid/34407 Summary: OpenAFS is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer in the Unix cache manager. The issue occurs when the application processes RX packets in a client context. An attacker can exploit this issue to execute arbitrary code in the context of the Unix cache manager, resulting in a complete compromise of the affected computer. Failed exploit attempts will likely result in a denial of service. The issue affects these versions: OpenAFS Unix clients 1.0 through 1.4.8 OpenAFS Unix clients 1.5.0 through 1.5.58 Note that Mac OS X clients are not affected. 7. OpenAFS Error Codes Remote Denial of Service Vulnerabiliy BugTraq ID: 34404 Remote: Yes Date Published: 2009-04-07 Relevant URL: http://www.securityfocus.com/bid/34404 Summary: OpenAFS file server is prone to a denial-of-service vulnerability that occurs on computers running the Linux kernel. Successfully exploiting this issue allows attackers to cause a kernel panic, denying service to legitimate users. The issue affects these versions: OpenAFS 1.0 through 1.4.8 OpenAFS 1.5.0 through 1.5.58 8. JustSystems Ichitaro RTF File Buffer Overflow Vulnerability BugTraq ID: 34403 Remote: Yes Date Published: 2009-04-07 Relevant URL: http://www.securityfocus.com/bid/34403 Summary: Ichitaro is prone to a remote buffer-overflow vulnerability. Attackers may exploit this issue to execute arbitrary code within the context of the vulnerable application. Failed attempts will result in a denial-of-service condition. Ichitaro 2009 and prior versions are vulnerable. 9. Novell NetIdentity Agent 'XTIERRPCPIPE' Remote Code Execution Vulnerability BugTraq ID: 34400 Remote: Yes Date Published: 2009-04-06 Relevant URL: http://www.securityfocus.com/bid/34400 Summary: Novell NetIdentity Agent is prone to a remote code-execution vulnerability. Attackers could exploit this issue to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will likely cause denial-of-service conditions. Novell NetIdentity Agent 1.2.3 is vulnerable; other versions may be affected as well. 10. UltraISO '.ui' ISO Project File Buffer Overflow Vulnerability BugTraq ID: 34398 Remote: Yes Date Published: 2009-04-06 Relevant URL: http://www.securityfocus.com/bid/34398 Summary: UltraISO is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. UltraISO 9.3.3.2685 is vulnerable; other versions may also be affected. 11. Unsniff Network Analyzer '.usnf' File Heap-Based Buffer Overflow Vulnerability BugTraq ID: 34396 Remote: Yes Date Published: 2009-04-06 Relevant URL: http://www.securityfocus.com/bid/34396 Summary: Unsniff Network Analyzer is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Unsniff Network Analyzer 1.0 is vulnerable; other versions may also be affected. 12. UltraISO CCD and IMG File Buffer Overflow Vulnerability BugTraq ID: 34363 Remote: Yes Date Published: 2009-04-03 Relevant URL: http://www.securityfocus.com/bid/34363 Summary: UltraISO is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. UltraISO 9.3.3.2685 is vulnerable; other versions may also be affected. 13. Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability BugTraq ID: 34351 Remote: Yes Date Published: 2009-04-02 Relevant URL: http://www.securityfocus.com/bid/34351 Summary: Microsoft PowerPoint is prone to a remote code-execution vulnerability. An attacker could exploit this issue by enticing a victim to open a malicious PowerPoint file. Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user. 14. Fortinet FortiClient VPN Connection Name Local Format String Vulnerability BugTraq ID: 34343 Remote: No Date Published: 2009-04-02 Relevant URL: http://www.securityfocus.com/bid/34343 Summary: Fortinet FortiClient is prone to a local format-string vulnerability because it fails to adequately sanitize user-supplied input before passing it to a formatted-printing function. Successfully exploiting this issue will allow local attackers to execute arbitrary code with SYSTEM-level privileges, completely compromising the computer. Failed exploit attempts will likely result in a denial of service. FortiClient 3.0.614 is vulnerable; other versions may also be affected. 15. SAP Business Objects Crystal Reports 'viewreport.asp' Cross Site Scripting Vulnerability BugTraq ID: 34341 Remote: Yes Date Published: 2009-04-02 Relevant URL: http://www.securityfocus.com/bid/34341 Summary: SAP Business Objects Crystal Reports is prone to a cross-site scripting vulnerability. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials. NOTE: This issue may be related to the one described in BID 12107 (Business Objects Crystal Enterprise Report File Cross-Site Scripting Vulnerability). We will update or retire this BID when more information emerges. 16. OpenX Prior to 2.8 Multiple Input Validation Vulnerabilities BugTraq ID: 34336 Remote: Yes Date Published: 2009-04-01 Relevant URL: http://www.securityfocus.com/bid/34336 Summary: OpenX is prone to multiple input-validation vulnerabilities: - Multiple SQL-Injection vulnerabilities - A cross-site-scripting vulnerability - An arbitrary-file-deletion vulnerability - A HTTP-header-injection vulnerability Attackers can exploit these issues to steal cookie-based authentication credentials from legitimate users of the site, modify the way the site is rendered, access or modify data, exploit latent vulnerabilities in the underlying database, or delete arbitrary files on the affected computer. Other attacks are also possible. Versions prior to OpenX 2.8 are vulnerable. 17. XBMC Multiple Remote Buffer Overflow Vulnerabilities BugTraq ID: 34334 Remote: Yes Date Published: 2009-04-01 Relevant URL: http://www.securityfocus.com/bid/34334 Summary: XBMC is prone to multiple buffer-overflow vulnerabilities that occur because the application fails to perform adequate boundary checks on user-supplied data. Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. XBMC 8.10 Atlantis is vulnerable; other versions may also be affected. 18. IBM DB2 Content Manager eClient Unspecified Security Vulnerability BugTraq ID: 34326 Remote: Yes Date Published: 2009-03-31 Relevant URL: http://www.securityfocus.com/bid/34326 Summary: IBM DB2 Content Manager is prone to an unspecified vulnerability. Very few details are available regarding this issue. We will update this BID as more information emerges. IBM DB2 Content Manager 8.4.1 is vulnerable; other versions may be affected as well. 19. Apple Safari XML Parser Nested XML Tag Remote Denial of Service Vulnerability BugTraq ID: 34318 Remote: Yes Date Published: 2009-03-31 Relevant URL: http://www.securityfocus.com/bid/34318 Summary: Apple Safari is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Given the nature of this issue, attackers may also be able to run arbitrary code, but this has not been confirmed. Apple Safari 3.2.2 and 4 Beta are vulnerable; other versions may also be affected. 20. Bugzilla 'attachment.cgi' Cross Site Request Forgery Vulnerability BugTraq ID: 34308 Remote: Yes Date Published: 2009-03-30 Relevant URL: http://www.securityfocus.com/bid/34308 Summary: Bugzilla is prone to a cross-site request-forgery vulnerability. An attacker can exploit this issue to submit attachments in the context of the logged-in user. This issue affects versions prior to Bugzilla 3.2.3 and 3.3.4. 21. Trend Micro Internet Security 2008/9 IOCTL Request Local Privilege Escalation Vulnerability BugTraq ID: 34304 Remote: No Date Published: 2009-03-30 Relevant URL: http://www.securityfocus.com/bid/34304 Summary: Trend Micro Internet Security 2008 and 2009 are prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code with elevated privileges, which may allow a complete compromise of the affected computer. This issue affects Internet Security and Internet Security Pro 2008 and 2009. 22. Wireshark PN-DCP Data Format String Vulnerability BugTraq ID: 34291 Remote: Yes Date Published: 2009-03-30 Relevant URL: http://www.securityfocus.com/bid/34291 Summary: Wireshark is prone to a format-string vulnerability. Attackers can leverage this issue to execute arbitrary code within the context of the vulnerable application. Failed attacks will likely cause denial-of-service conditions. Wireshark 1.0.6 is vulnerable; other versions may also be affected. 23. AtomixMP3 Malformed 'm3u' Playlist File Buffer Overflow Vulnerability BugTraq ID: 34290 Remote: Yes Date Published: 2009-03-30 Relevant URL: http://www.securityfocus.com/bid/34290 Summary: AtomixMP3 is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. AtomixMP3 2.3 is vulnerable; other versions may also be affected. 24. RETIRED: Check Point FireWall-1 PKI Web Service Remote Buffer Overflow Vulnerabilities BugTraq ID: 34286 Remote: Yes Date Published: 2009-03-30 Relevant URL: http://www.securityfocus.com/bid/34286 Summary: Check Point FireWall-1 PKI web service is prone to multiple remote buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition. NOTE: This BID is being retired because the application is not vulnerable as described. III. MICROSOFT FOCUS LIST SUMMARY --------------------------------- 1. SecurityFocus Microsoft Newsletter #438 http://www.securityfocus.com/archive/88/502488 IV. UNSUBSCRIBE INSTRUCTIONS ----------------------------- To unsubscribe send an e-mail message to [email protected] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website. If your email address has changed email [email protected] and ask to be manually removed. V. SPONSOR INFORMATION ------------------------ This issue is sponsored by Red Hat Putting open source to the test:The making of JBoss Enterprise Middleware Through a rigorous productization process, JBoss Enterprise Middleware teams continually harden and transform cutting-edge open source technology into well-tempered enterprise software products with unsurpassed quality, performance, and stability - then deliver it with top-notch support and mission-critical SLAs. Here's how it's done. http://dinclinx.com/Redirect.aspx?36;4756;20;189;0;1;259;ac28cb88c17443b5
