News

Tuesday, October 24, 2006

SecurityFocus Microsoft Newsletter #314

SecurityFocus Microsoft Newsletter #314
----------------------------------------

This Issue is Sponsored by: Lancope

"Revolutionize the way you view your network security"
How do you protect what you can't see? Stop protecting while blind. Gain network visibility now. Learn how Cisco NetFlow gives visibility and enables cost-effective security across distributed enterprise networks. StealthWatch, the veteran Network Behavior Analysis (NBA) and Response solution, leverages Cisco NetFlow to provide scalable, internal network security.
ALERT: Download FREE White Paper "Network Behavior Analysis (NBA) in the Enterprise."

http://www.lancope.com/resource/

------------------------------------------------------------------
I. FRONT AND CENTER
1. Viruses, Phishing, and Trojans For Profit
II. MICROSOFT VULNERABILITY SUMMARY
1. Microsoft Internet Explorer ADODB.Connection Execute Denial of Service Vulnerability
2. QK SMTP Remote Buffer Overflow Vulnerability
3. RETIRED: Microsoft Windows CMD.EXE Buffer Overflow Vulnerability
4. Kaspersky Labs Anti-Virus NDIS-TDI Hooking Engine Local Privilege Escalation Vulnerability
5. Drupal Multiple HTML-Injection Vulnerabilities
6. JustSystem Ichitaro Unspecified Buffer Overflow Vulnerability
7. Airmagnet Enterprise Management Multiple Vulnerabilities
8. PassGo Defender Local Insecure Default Directory Permissions Vulnerability
9. RETIRED: Adobe Flash Player Plugin Multiple HTTP Response Splitting Vulnerabilities
10. Microsoft Class Package Export Tool Clspack.exe Local Buffer Overflow Vulnerability
11. XFire Packet Handling Denial Of Service Vulnerability
12. Internet Security Systems ZWDeleteFile Function Arbitrary File Deletion Vulnerability
13. Mozilla Bugzilla Multiple Input Validation and Information disclosure Vulnerabilities
III. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #313
2. Hacker Defender v0.84-1.0.0 backdoor -wath Vulnerabiliti it uses to get in
3. Set dialup password from cmdline
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Viruses, Phishing, and Trojans For Profit
By Kelly Martin
Following the 2006 International Virus Bulletin Conference, Kelly Martin takes a look at the profit motives of the cyber criminals behind modern viruses, targeted trojans, phishing scams and botnet attacks that are stealing millions from organizations and individuals.
http://www.securityfocus.com/columnists/419


II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft Internet Explorer ADODB.Connection Execute Denial of Service Vulnerability
BugTraq ID: 20704
Remote: Yes
Date Published: 2006-10-24
Relevant URL: http://www.securityfocus.com/bid/20704
Summary:
Microsoft Internet Explorer is prone to a denial-of-service condition when processing a specific method from the 'ADODB.Connection.2.7' instantiated ActiveX Object.

Successful exploits may allow attackers to crash the application, denying further service to users.

2. QK SMTP Remote Buffer Overflow Vulnerability
BugTraq ID: 20681
Remote: Yes
Date Published: 2006-10-23
Relevant URL: http://www.securityfocus.com/bid/20681
Summary:
QK SMTP is prone to a remote buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code in the context of the affected application. This may facilitate a remote-compromise of affected computers. Failed exploit attempts will likely crash the server, effectively denying service to legitimate users.

QK SMTP 3.01 and prior versions are vulnerable to this issue.

3. RETIRED: Microsoft Windows CMD.EXE Buffer Overflow Vulnerability
BugTraq ID: 20652
Remote: No
Date Published: 2006-10-20
Relevant URL: http://www.securityfocus.com/bid/20652
Summary:
Microsoft Windows is prone to a buffer-overflow vulnerability because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Arbitrary code execution may be possible, but this has not been confirmed.

This issue affects Microsoft Windows XP SP2.

Note: Further analysis reveals that this is not a vulnerability; this BID is now retired.

4. Kaspersky Labs Anti-Virus NDIS-TDI Hooking Engine Local Privilege Escalation Vulnerability
BugTraq ID: 20635
Remote: No
Date Published: 2006-10-19
Relevant URL: http://www.securityfocus.com/bid/20635
Summary:
Kaspersky Labs Anti-Virus is prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. This may facilitate a complete compromise of the affected computer.

5. Drupal Multiple HTML-Injection Vulnerabilities
BugTraq ID: 20628
Remote: Yes
Date Published: 2006-10-19
Relevant URL: http://www.securityfocus.com/bid/20628
Summary:
Drupal is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input data before using it in dynamically generated content.

An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may allow an attacker to steal cookie-based authentication credentials, control how the site is rendered, and launch other attacks.

6. JustSystem Ichitaro Unspecified Buffer Overflow Vulnerability
BugTraq ID: 20610
Remote: Yes
Date Published: 2006-10-18
Relevant URL: http://www.securityfocus.com/bid/20610
Summary:
Ichitaro is prone to an unspecified buffer-overflow vulnerability.

Remote attackers may exploit this issue to execute arbitrary code within the context of the affected system or to cause a denial of service.

Very little information is available on this issue. This BID will be updated when more information becomes available.

This vulnerability may be related to BID 19550 (Ichitaro Unicode Stack Stack Buffer Overflow Vulnerability).

7. Airmagnet Enterprise Management Multiple Vulnerabilities
BugTraq ID: 20602
Remote: Yes
Date Published: 2006-10-18
Relevant URL: http://www.securityfocus.com/bid/20602
Summary:
Airmagnet enterprise management is prone to multiple vulnerabilities, including multiple HTML-injection issues, a cross-site scripting vulnerability, and a man-in-the-middle attack.

An attacker can exploit these issues to retrieve sensitive information and to execute HTML and script code in the context of the affected site. The attacker may also be able to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

8. PassGo Defender Local Insecure Default Directory Permissions Vulnerability
BugTraq ID: 20600
Remote: No
Date Published: 2006-10-18
Relevant URL: http://www.securityfocus.com/bid/20600
Summary:
PassGo Defender's default settings allow local users to access the application directory and to read or modify the contents.

An attacker could exploit this issue to access and modify files stored in the application directory. This may aid in further attacks.

Version 5.2 is vulnerable; other versions may also be affected.

9. RETIRED: Adobe Flash Player Plugin Multiple HTTP Response Splitting Vulnerabilities
BugTraq ID: 20593
Remote: Yes
Date Published: 2006-10-17
Relevant URL: http://www.securityfocus.com/bid/20593
Summary:
The Adobe Flash Player Plugin is prone to multiple HTTP response-splitting vulnerabilities because the application fails to properly sanitize user-supplied input.

A remote attacker may exploit these vulnerabilities to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

Adobe Flash Player Plugin version 9.0.16 for Windows and version 7.0.63 for Linux are vulnerable; other versions may also be affected.

This BID has been retired.

10. Microsoft Class Package Export Tool Clspack.exe Local Buffer Overflow Vulnerability
BugTraq ID: 20561
Remote: No
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20561
Summary:
Microsoft Class Package Export Tool ('clspack.exe') is prone to a local buffer-overflow vulnerability because the application fails to properly size attacker-supplied data before copying it into an insuficiently sized memory buffer.

Exploiting this issue allows local attackers to execute arbitrary machine code in the context of the user running the application. Failed exploit attempts will likely crash the application, denying service to legitimate users.

11. XFire Packet Handling Denial Of Service Vulnerability
BugTraq ID: 20548
Remote: Yes
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20548
Summary:
Xfire is prone to a denial-of-service vulnerability.

An attacker can exploit this issue to crash the affected client application, denying service to legitimate users. Remote code execution may also be possible; this has not been confirmed.

This issue affects version 1.6.4; earlier versions may also be vulnerable.

12. Internet Security Systems ZWDeleteFile Function Arbitrary File Deletion Vulnerability
BugTraq ID: 20546
Remote: No
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20546
Summary:
Internet Security Systems (ISS) BlackICE PC Protection is prone to a file-deletion vulnerability.

An attacker can exploit this issue to delete arbitrary files within the context of the affected application. This could lead to other attacks.

Versions 3.6.cpu, 3.6.cpj are vulnerable to this issue; other versions may also be affected.

13. Mozilla Bugzilla Multiple Input Validation and Information disclosure Vulnerabilities
BugTraq ID: 20538
Remote: Yes
Date Published: 2006-10-16
Relevant URL: http://www.securityfocus.com/bid/20538
Summary:
Bugzilla is affected by multiple input-validation and information-disclosure vulnerabilities because the application fails to properly sanitize user-supplied input and to protect sensitive information from unauthorized users.

An attacker can leverage these issues to access attachment and deadline information that are marked private or are otherwise protected and to conduct cross-site scripting and HTML-injection attacks. Exploiting these input-validation issues may allow attackers to steal cookie-based authentication credentials and to launch other attacks.

Versions 2.18.5, 2.20.2, 2.22, and 2.23.2 are affected by these vulnerabilities.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #313
http://www.securityfocus.com/archive/88/449080

2. Hacker Defender v0.84-1.0.0 backdoor -wath Vulnerabiliti it uses to get in
http://www.securityfocus.com/archive/88/448826

3. Set dialup password from cmdline
http://www.securityfocus.com/archive/88/448518

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored by: Lancope

"Revolutionize the way you view your network security"
How do you protect what you can't see? Stop protecting while blind. Gain network visibility now. Learn how Cisco NetFlow gives visibility and enables cost-effective security across distributed enterprise networks. StealthWatch, the veteran Network Behavior Analysis (NBA) and Response solution, leverages Cisco NetFlow to provide scalable, internal network security.
ALERT: Download FREE White Paper "Network Behavior Analysis (NBA) in the Enterprise."

http://www.lancope.com/resource/

No comments:

Blog Archive