SecurityFocus Microsoft Newsletter #442 ----------------------------------------
This issue is sponsored by Thawte Securing Your Online Data Transfer with SSL. A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe. http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194 SECURITY BLOGS SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks. http://www.securityfocus.com/blogs ------------------------------------------------------------------ I. FRONT AND CENTER 1. Projecting Borders into Cyberspace 2. Celebrity Viruses Improve Security II. MICROSOFT VULNERABILITY SUMMARY 1. Mercury Audio Player '.m3u' File Remote Stack Buffer Overflow Vulnerability 2. McAfee Products RAR/ZIP Files Scan Evasion Vulnerability 3. Baby Web Server URL File Disclosure Vulnerability 4. Symantec WinFax Pro 'DCCFAXVW.DLL' Heap Buffer Overflow Vulnerability 5. Multiple Trend Micro Products RAR/ZIP/CAB Files Scan Evasion Vulnerability 6. Pablo Software Solutions Quick 'n Easy Web Server Directory Traversal Vulnerability 7. DWebPro Directory Traversal Vulnerability and Arbitrary File Disclosure Vulnerability 8. SDP Downloader 'ASX' File Heap Buffer Overflow Vulnerability 9. Popcorn POP3 Response Remote Heap Buffer Overflow Vulnerability 10. Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability 11. Symantec Norton Ghost 'EasySetupInt.dll' ActiveX Multiple Remote Denial of Service Vulnerabilities 12. Acritum Femitter Server Remote File Disclosure Vulnerability 13. Xitami HTTP Server Multiple Socket HEAD Request Remote Denial Of Service Vulnerability 14. Sun Java Runtime Environment Unspecified Remote Code Execution Vulnerability 15. Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability 16. Groovy Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability 17. 1by1 '.m3u' File Remote Stack Buffer Overflow Vulnerability III. MICROSOFT FOCUS LIST SUMMARY 1. SecurityFocus Microsoft Newsletter #441 IV. UNSUBSCRIBE INSTRUCTIONS V. SPONSOR INFORMATION I. FRONT AND CENTER --------------------- 1. Projecting Borders into Cyberspace By Jeffrey Carr Two recent stories of significant cyber attacks come close to blaming the Chinese for the intrusions but stop short. http://www.securityfocus.com/columnists/500 2. Celebrity Viruses Improve Security By Adam O'Donnell Every so often, a computer virus becomes more than just a novelty for anti-virus researchers and moves into the consciousness of the mass media, even if it's not a grave threat. http://www.securityfocus.com/columnists/499 II. MICROSOFT VULNERABILITY SUMMARY ------------------------------------ 1. Mercury Audio Player '.m3u' File Remote Stack Buffer Overflow Vulnerability BugTraq ID: 34788 Remote: Yes Date Published: 2009-04-30 Relevant URL: http://www.securityfocus.com/bid/34788 Summary: Mercury Audio Player is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Mercury Audio Player 1.21 is vulnerable; other versions may also be affected. 2. McAfee Products RAR/ZIP Files Scan Evasion Vulnerability BugTraq ID: 34780 Remote: Yes Date Published: 2009-04-30 Relevant URL: http://www.securityfocus.com/bid/34780 Summary: Multiple McAfee products are prone to a vulnerability that may allow certain compressed archives to bypass the scan engine. Successful exploits will allow attackers to distribute files containing malicious code that the antivirus application will fail to detect. The issue affects all McAfee software that uses DAT files. 3. Baby Web Server URL File Disclosure Vulnerability BugTraq ID: 34772 Remote: Yes Date Published: 2009-04-29 Relevant URL: http://www.securityfocus.com/bid/34772 Summary: Baby Web Server is prone to a vulnerability that lets attackers obtain potentially sensitive information because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files with the privileges of the webserver process. Information obtained may aid in further attacks. Baby Web Server 2.7.2 is vulnerable; other versions may also be affected. 4. Symantec WinFax Pro 'DCCFAXVW.DLL' Heap Buffer Overflow Vulnerability BugTraq ID: 34766 Remote: Yes Date Published: 2009-04-29 Relevant URL: http://www.securityfocus.com/bid/34766 Summary: Symantec WinFax Pro ActiveX control is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions. Symantec WinFax Pro 10.03 is vulnerable; other versions may also be affected. 5. Multiple Trend Micro Products RAR/ZIP/CAB Files Scan Evasion Vulnerability BugTraq ID: 34763 Remote: Yes Date Published: 2009-04-29 Relevant URL: http://www.securityfocus.com/bid/34763 Summary: Multiple Trend Micro products are prone to a vulnerability that may allow certain compressed archives to bypass the scan engine. Successful exploits will allow attackers to distribute files containing malicious code that the antivirus application will fail to detect. ServerProtect for Microsoft Windows/Novell NetWare ServerProtect for EMC Celerra ServerProtect for NetApp ServerProtect for Linux ServerProtect for Network Appliance Filers Internet Security Pro Internet Security OfficeScan Component Worry Free Business Security - Standard Worry Free Business Security - Advanced Worry Free Business Security Hosted Housecall InterScan Web Security Suite InterScan Web Protect for ISA InterScan Messaging Security Appliance Neatsuite Advanced ScanMail for Exchange ScanMail for Domino Suites 6. Pablo Software Solutions Quick 'n Easy Web Server Directory Traversal Vulnerability BugTraq ID: 34758 Remote: Yes Date Published: 2009-04-28 Relevant URL: http://www.securityfocus.com/bid/34758 Summary: Quick 'n Easy Web Server is prone to a directory-traversal vulnerability. An attacker can exploit this issue to obtain sensitive information that may lead to other attacks. Quick 'n Easy Web Server 3.3.5 is vulnerable; other versions may also be affected. 7. DWebPro Directory Traversal Vulnerability and Arbitrary File Disclosure Vulnerability BugTraq ID: 34721 Remote: Yes Date Published: 2009-04-27 Relevant URL: http://www.securityfocus.com/bid/34721 Summary: DWebPro is prone to a directory-traversal vulnerability and a vulnerability that allows attackers to view arbitrary files. An attacker can exploit these issues to obtain sensitive information that may lead to other attacks. DWebPro 6.8.26 is vulnerable; other versions may also be affected. 8. SDP Downloader 'ASX' File Heap Buffer Overflow Vulnerability BugTraq ID: 34712 Remote: Yes Date Published: 2009-04-24 Relevant URL: http://www.securityfocus.com/bid/34712 Summary: SDP Downloader is prone to a heap-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. SDP Downloader 2.3.0 is vulnerable; other versions may also be affected. 9. Popcorn POP3 Response Remote Heap Buffer Overflow Vulnerability BugTraq ID: 34699 Remote: Yes Date Published: 2009-04-23 Relevant URL: http://www.securityfocus.com/bid/34699 Summary: Popcorn is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly sanitize user-supplied input. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition. Popcorn 1.87 is vulnerable; other versions may also be affected. 10. Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability BugTraq ID: 34698 Remote: Yes Date Published: 2009-04-23 Relevant URL: http://www.securityfocus.com/bid/34698 Summary: Home Web Server is prone to a denial-of-service vulnerability because it fails to adequately handle malformed HTTP requests. Attackers can exploit this issue to cause the server's graphical interface to stop responding, denying service to the administrator. Home Web Server 1.7.1.147 is vulnerable; other versions may also be affected. 11. Symantec Norton Ghost 'EasySetupInt.dll' ActiveX Multiple Remote Denial of Service Vulnerabilities BugTraq ID: 34696 Remote: Yes Date Published: 2009-04-23 Relevant URL: http://www.securityfocus.com/bid/34696 Summary: Symantec Norton Ghost EasySetup Wizard ActiveX control is prone to multiple denial-of-service vulnerabilities. A successful attack allows an attacker to crash the application using the affected control (typically Internet Explorer), causing denial-of-service conditions. The attacker may also be able to run arbitrary code, but this has not been confirmed. These issues are reported to affect 'EasySetupInt.dll' 14.0.4.30167; other versions may also be affected. 12. Acritum Femitter Server Remote File Disclosure Vulnerability BugTraq ID: 34689 Remote: Yes Date Published: 2009-04-22 Relevant URL: http://www.securityfocus.com/bid/34689 Summary: Acritum Femitter Server is prone to a remote file-disclosure vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to view local files in the context of the server process. This may aid in further attacks. Acritum Femitter Server 0.96 and 1.03 are affected; other versions may be vulnerable as well. 13. Xitami HTTP Server Multiple Socket HEAD Request Remote Denial Of Service Vulnerability BugTraq ID: 34681 Remote: Yes Date Published: 2009-04-22 Relevant URL: http://www.securityfocus.com/bid/34681 Summary: Xitami HTTP server is prone to a denial-of-service vulnerability because it fails to adequately handle multiple socket requests. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Xitami 5.0a0 (Alpha 0) is vulnerable. 14. Sun Java Runtime Environment Unspecified Remote Code Execution Vulnerability BugTraq ID: 34667 Remote: Yes Date Published: 2009-04-22 Relevant URL: http://www.securityfocus.com/bid/34667 Summary: Sun Java Runtime Environment (JRE) is prone to an unspecified security vulnerability that allows attackers to execute arbitrary code. Attackers can exploit this issue to execute arbitrary code in the context of the application, JRE 6 Update 1 and 2 are vulnerable. 15. Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability BugTraq ID: 34637 Remote: Yes Date Published: 2009-04-21 Relevant URL: http://www.securityfocus.com/bid/34637 Summary: Zervit HTTP server is prone to a denial-of-service vulnerability because it fails to adequately sanitize user-supplied input. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Zervit 0.3 is vulnerable; other versions may also be affected. 16. Groovy Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability BugTraq ID: 34621 Remote: Yes Date Published: 2009-04-20 Relevant URL: http://www.securityfocus.com/bid/34621 Summary: Groovy Media Player is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Groovy Media Player 1.1.0 is vulnerable; other versions may also be affected. 17. 1by1 '.m3u' File Remote Stack Buffer Overflow Vulnerability BugTraq ID: 34618 Remote: Yes Date Published: 2009-04-20 Relevant URL: http://www.securityfocus.com/bid/34618 Summary: The '1by1' program is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. This issue affects 1by1 1.67; other versions may also be affected. III. MICROSOFT FOCUS LIST SUMMARY --------------------------------- 1. SecurityFocus Microsoft Newsletter #441 http://www.securityfocus.com/archive/88/503001 IV. UNSUBSCRIBE INSTRUCTIONS ----------------------------- To unsubscribe send an e-mail message to [email protected] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website. If your email address has changed email [email protected] and ask to be manually removed. V. SPONSOR INFORMATION ------------------------ This issue is sponsored by Thawte Securing Your Online Data Transfer with SSL. A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe. http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194
