SecurityFocus Microsoft Newsletter #452
----------------------------------------

This issue is sponsored by Entrust

Entrust SSL Certificates - UCC certificates
Secure MS Exchange '07 - up to 10 host names included
Now from only $387/year

http://www.entrust.net/securityfocus-ucc


------------------------------------------------------------------
I.   FRONT AND CENTER
       1.Lazy Workers May Be Deemed Hackers
       2.The Scale of Security
II.  MICROSOFT VULNERABILITY SUMMARY
       1. Code-Crafters Ability Mail Server IMAP FETCH Request Remote Denial Of 
Service Vulnerability
       2. Apple iTunes '.pls' File Buffer Overflow Vulnerability
       3. Snort Unified1 Output Remote Denial Of Service Vulnerability
       4. HP ProCurve Identity Driven Manager (IDM) Unspecified Privilege 
Escalation Vulnerability
       5. Adobe Shockwave Player ActiveX Control 'PlayerVersion' Property 
Remote Buffer Overflow
Vulnerability
       6. Notepad++ 'C' and 'CPP' File Handling Remote Stack Buffer Overflow 
Vulnerability
       7. Wireshark 1.2.1 Multiple Vulnerabilities
       8. BRS WebWeaver 'Scripts' Security Bypass Vulnerability
       9. FileCOPA FTP Server 'NOOP' Command Denial Of Service Vulnerability
       10. Proland Protector Plus Insecure Program File Permissions Local 
Privilege Escalation
Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1.Lazy Workers May Be Deemed Hackers
By Mark Rasch
>From his office job at the Shelby City (Ohio) Wastewater Treatment plant, he 
>was browsing adult Web sites, including one called Adult Friend Finder to meet 
>women. When some of the women asked Wolf for nude pictures, he bought a 
>digital camera, took pictures, and e-mailed them using his work computer.
http://www.securityfocus.com/columnists/504

2.The Scale of Security
By Adam O'Donnell
Human beings do not naturally understand scale. While we speak of financial 
transactions in the
hundreds of billions of dollars as being something as routine as brushing our 
teeth, we question the
value of programs that cost in the single-digit millions and quibble with 
friends over dollars.
Similarly, there are many problems in our industry that, when explained to an 
outsider, sound like
they should have been solved decades ago. It is only when we relate the number 
of systems that need
to be considered in the repair that we truly communicate the difficulty of the 
problem.
http://www.securityfocus.com/columnists/503


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Code-Crafters Ability Mail Server IMAP FETCH Request Remote Denial Of 
Service Vulnerability
BugTraq ID: 36519
Remote: Yes
Date Published: 2009-09-25
Relevant URL: http://www.securityfocus.com/bid/36519
Summary:
Ability Mail Server is prone to a denial-of-service vulnerability because it 
fails to adequately
handle IMAP requests.

Attackers can exploit this issue to cause the affected application to crash, 
denying service to
legitimate users.

 Versions prior to Ability Mail Server 2.70 are affected.

2. Apple iTunes '.pls' File Buffer Overflow Vulnerability
BugTraq ID: 36478
Remote: Yes
Date Published: 2009-09-22
Relevant URL: http://www.securityfocus.com/bid/36478
Summary:
Apple iTunes is prone to a buffer-overflow  vulnerability because the software 
fails to bounds-check
user-supplied data before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code within the context 
of the affected
application. Failed exploit attempts will result in a denial-of-service 
condition.

Versions prior to Apple iTunes 9.0.1 are vulnerable.

3. Snort Unified1 Output Remote Denial Of Service Vulnerability
BugTraq ID: 36473
Remote: Yes
Date Published: 2009-09-21
Relevant URL: http://www.securityfocus.com/bid/36473
Summary:
Snort is affected by a denial-of-service vulnerability because the application 
fails to properly
process unified1 output.

Attackers can leverage this issue by sending malformed network packets that 
will produce corrupted
logs and alerts, causing denial-of-service conditions.

Snort 2.8.1 through 2.8.4 are affected.

4. HP ProCurve Identity Driven Manager (IDM) Unspecified Privilege Escalation 
Vulnerability
BugTraq ID: 36462
Remote: No
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36462
Summary:
HP ProCurve Identity Driven Manager (IDM) is prone to an unspecified 
privilege-escalation scripting
vulnerability.

 Few technical details are available at this time; we will update this BID as 
more information emerges.

HP ProCurve Identity Driven Manager (IDM) A.02.03 and A.03.00 running on 
Microsoft Windows 2003 with
Internet Authentication Service (IAS) or Microsoft Windows 2008 with Network 
Policy Server (NPS) are
vulnerable.

5. Adobe Shockwave Player ActiveX Control 'PlayerVersion' Property Remote 
Buffer Overflow Vulnerability
BugTraq ID: 36434
Remote: Yes
Date Published: 2009-09-16
Relevant URL: http://www.securityfocus.com/bid/36434
Summary:
Adobe Shockwave Player ActiveX control is prone to a remote buffer-overflow 
vulnerability because
the application fails to perform adequate boundary checks on user-supplied data.

Successful exploits allow remote attackers to execute arbitrary code in the 
context of the
application using the ActiveX control (typically Internet Explorer). Failed 
exploit attempts likely
result in denial-of-service conditions.

Shockwave Player 11.5.1.601 is vulnerable; other versions may also be affected.

6. Notepad++ 'C' and 'CPP' File Handling Remote Stack Buffer Overflow 
Vulnerability
BugTraq ID: 36426
Remote: Yes
Date Published: 2009-09-16
Relevant URL: http://www.securityfocus.com/bid/36426
Summary:
Notepad++ is prone to a stack-based buffer-overflow vulnerability because it 
fails to perform
adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of 
the application.
Failed attacks will cause denial-of-service conditions.

Notepad++ 5.4.5 is vulnerable; other versions may also be affected.

7. Wireshark 1.2.1 Multiple Vulnerabilities
BugTraq ID: 36408
Remote: Yes
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36408
Summary:
Wireshark is prone to multiple denial-of-service vulnerabilities.

Exploiting these issues may allow attackers to crash the application and deny 
service to legitimate
users.

These issues affect Wireshark 0.99.6 through 1.2.1.

8. BRS WebWeaver 'Scripts' Security Bypass Vulnerability
BugTraq ID: 36399
Remote: Yes
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36399
Summary:
BRS WebWeaver is prone to a security-bypass vulnerability because it fails to 
properly validate
user-supplied input.

Attackers can exploit this issue to access scripts or perform actions without 
proper authorization.

 BRS WebWeaver 1.33 is vulnerable; other versions may also be affected.

9. FileCOPA FTP Server 'NOOP' Command Denial Of Service Vulnerability
BugTraq ID: 36397
Remote: Yes
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36397
Summary:
FileCOPA FTP Server is prone to a denial-of-service vulnerability.

A successful exploit may allow attackers to halt the server process, resulting 
in a
denial-of-service condition.

FileCOPA FTP Server 5.01 is vulnerable; other versions may also be affected.

10. Proland Protector Plus Insecure Program File Permissions Local Privilege 
Escalation Vulnerability
BugTraq ID: 36396
Remote: No
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36396
Summary:
Proland Protector Plus is prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to execute arbitrary code with 
SYSTEM-level privileges,
resulting in a complete compromise of the affected computer.

The following versions are affected:

Protector Plus 2009 8.0.E03 for Windows Desktops
Protector Plus 2009  8.0.E03 for Windows Server
Protector Plus Professional 9.1.001

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to 
[email protected] from the
subscribed address. The contents of the subject or message body do not matter. 
You will receive a
confirmation request message to which you will have to answer. Alternatively 
you can also visit
http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [email protected] and ask to 
be manually removed.

V.   SPONSOR INFORMATION
------------------------
This issue is sponsored by Entrust

Entrust SSL Certificates - UCC certificates
Secure MS Exchange '07 - up to 10 host names included
Now from only $387/year

http://www.entrust.net/securityfocus-ucc

Reply via email to