----------------------------------------
This issue is Sponsored by: The Computer Forensics Show
Imangine the ability to view anything that ever appeared on almost any computer. The Computer Forensics Show is the "DON"T MISS" event of the year for IT professionals
The Computer Forensics Show
February 4-6, 2008
Washington Convention Center
Washington D.C.
www.computerforensicshow.com
SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs
------------------------------------------------------------------
I. FRONT AND CENTER
1.Copyrights and Wrongs
2.The Man in the Machine
II. MICROSOFT VULNERABILITY SUMMARY
1. Adobe Flash Player ActiveX Control 'navigateToURL' API Cross Domain Scripting Vulnerability
2. Adobe Flash Player 'asfunction' Cross Site Scripting Vulnerability
3. WFTPD Explorer Remote Buffer Overflow Vulnerability
4. Adobe Flash Player DNS Rebinding Vulnerability
5. Adobe Flash Player Multiple Security Vulnerabilities
6. ClamAV 'libclamav/pe.c' MEW Packed PE File Integer Overflow Vulnerability
7. iMesh 'IMWebControl' ActiveX Control Code Execution Vulnerability
8. Apple Safari Subframe Same Origin Policy Violation Vulnerability
9. RaidenHTTPD 'workspace.php' Directory Traversal Vulnerability
10. SurgeMail Malformed Host Header Denial of Service Vulnerability
11. Apple QuickTime QTL File Handling Remote Heap Buffer Overflow Vulnerability
12. Apple QuickTime Flash Media Player Multiple Unspecified Vulnerabilities
13. Microsoft Office Hyperlink Signing Weakness
14. QK SMTP Server Malformed Commands Multiple Remote Denial of Service Vulnerabilities
15. JustSystems Ichitaro JSGCI.DLL Unspecified Stack Buffer Overflow Vulnerability
16. Symantec Backup Exec for Windows Unspecified Remote Vulnerability
17. Microsoft Office Insecure Document Signing Weakness
18. BitDefender Antivirus 2008 bdelev.dll ActiveX Control Double Free Vulnerability
19. BitDefender Antivirus bdevel.dll ActiveX Control Multiple Arbitrary Code Execution Vulnerabilities
20. Intuit QuickBooks Online Edition ActiveX Controls Multiple Unspecified Vulnerabilities
21. Microsoft Internet Explorer Element Tags Remote Memory Corruption Vulnerability
22. Microsoft Internet Explorer cloneNode() and nodeValue() Remote Memory Corruption Vulnerability
23. Perforce P4Web Content-Length Header Remote Denial Of Service Vulnerability
24. Microsoft DirectX WAV and AVI File Parsing Remote Code Execution Vulnerability
25. Microsoft Message Queuing Service Stack Buffer Overflow Vulnerability
26. Microsoft DirectX SAMI File Parsing Stack Buffer Overflow Vulnerability
27. Microsoft Windows SMBv2 Code Signing Remote Code Execution Vulnerability
28. Microsoft Windows Media Format Runtime ASF File Remote Code Execution Vulnerability
29. Microsoft Windows Vista Kernel ALPC Local Privilege Escalation Vulnerability
30. Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability
31. Microsoft Internet Explorer DHTML Object Memory Corruption Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1.Copyrights and Wrongs
By Mark Rasch
On October 1, 2007, Jammie Thomas -- a single mother living in Brainerd, Minnesota -- was sued in civil court for copyright infringement by the Recording Industry Association of America. Three days later, the jury returned the verdict; Ms. Thomas was liable for willfully infringing the copyrights on 24 songs. The fine: $222,000.
http://www.securityfocus.com/columnists/460
2.The Man in the Machine
By Federico Biancuzzi
In April 2007, when two security researchers demonstrated a flaw in the next-generation IPv6 routing scheme that would allow attackers to significantly amplify any denial-of-service attack by a factor of at least 80, networking expert Jun-ichiro "Itojun" Hagino worked to get Internet engineers to take the threat seriously.
http://www.securityfocus.com/columnists/459
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Adobe Flash Player ActiveX Control 'navigateToURL' API Cross Domain Scripting Vulnerability
BugTraq ID: 26960
Remote: Yes
Date Published: 2007-12-18
Relevant URL: http://www.securityfocus.com/bid/26960
Summary:
The Adobe Flash Player ActiveX control is prone to a cross-domain scripting vulnerability.
An attacker may leverage this issue to execute arbitrary JavaScript in the context of another domain.
This issue affects Adobe Flash Player 9.0.48.0, 8.0.35.0. 7.0.70.0 and prior.
Note: This issue was previously disclosed in BID 26929 (Adobe Flash Player Multiple Security Vulnerabilities). However new technical details are available, therefore the issue has been assigned to this BID.
2. Adobe Flash Player 'asfunction' Cross Site Scripting Vulnerability
BugTraq ID: 26949
Remote: Yes
Date Published: 2007-12-18
Relevant URL: http://www.securityfocus.com/bid/26949
Summary:
Adobe Flash Player is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
3. WFTPD Explorer Remote Buffer Overflow Vulnerability
BugTraq ID: 26935
Remote: Yes
Date Published: 2007-12-18
Relevant URL: http://www.securityfocus.com/bid/26935
Summary:
WFTPD Explorer is prone to a remote heap-based buffer-overflow vulnerability.
The issue arises when the client handles excessive string data. By exploiting this issue, a remote attacker may gain unauthorized access in the context of the user running the application.
WFTPD Explorer 1.0 is reported vulnerable; other versions may be affected as well.
4. Adobe Flash Player DNS Rebinding Vulnerability
BugTraq ID: 26930
Remote: Yes
Date Published: 2007-12-18
Relevant URL: http://www.securityfocus.com/bid/26930
Summary:
Adobe Flash Player is prone to a DNS rebinding vulnerability that allows remote attackers to establish arbitrary TCP sessions.
An attacker can exploit this issue by enticing an unsuspecting victim to view a malicious SWF file.
Successfully exploiting this issue allows the attacker to bypass the application's same-origin policy and set up connections to services on arbitrary computers. This may lead to other attacks.
5. Adobe Flash Player Multiple Security Vulnerabilities
BugTraq ID: 26929
Remote: Yes
Date Published: 2007-12-18
Relevant URL: http://www.securityfocus.com/bid/26929
Summary:
Adobe Flash Player is prone to multiple security vulnerabilities, including:
- A privilege-escalation issue
- A cross-domain security-bypass issue
- An HTTP request-splitting issue
Attackers can exploit these vulnerabilities to compromise affected computers, execute arbitrary code and misrepresent how web content is served, cached, or interpreted. Other attacks are also possible.
These issues affect Adobe Flash Player 9.0.48.0, 8.0.35.0, and 7.0.70.0 and prior.
Notes:
- The issues described in CVE-2007-6244 have been reassigned to BID 26949 and BID 26960.
- The issue described in CVE-2007-6242 has been reassigned to BID 26951.
6. ClamAV 'libclamav/pe.c' MEW Packed PE File Integer Overflow Vulnerability
BugTraq ID: 26927
Remote: Yes
Date Published: 2007-12-18
Relevant URL: http://www.securityfocus.com/bid/26927
Summary:
ClamAV is prone to an integer-overflow vulnerability because it fails to properly verify user-supplied data.
Successful exploits of this vulnerability can allow remote attackers to execute arbitrary machine code in the context of applications using the 'libclamav' library. Failed exploits may crash the application.
ClamAV 0.91.2 is vulnerable to this issue; other versions may also be affected.
7. iMesh 'IMWebControl' ActiveX Control Code Execution Vulnerability
BugTraq ID: 26916
Remote: Yes
Date Published: 2007-12-17
Relevant URL: http://www.securityfocus.com/bid/26916
Summary:
iMesh is prone to a code-execution vulnerability because the application fails to sanitize user-supplied data, which can lead to memory corruption.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using an affected ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
iMesh 7.1.0.37263 and prior versions are reported affected by this issue.
8. Apple Safari Subframe Same Origin Policy Violation Vulnerability
BugTraq ID: 26911
Remote: Yes
Date Published: 2007-12-17
Relevant URL: http://www.securityfocus.com/bid/26911
Summary:
Apple Safari is prone to a vulnerability that allows attackers to violate the same-origin policy. This issue occurs because the application fails to properly enforce the same-origin policy for subframe access.
An attacker may create a malicious webpage that can access the properties of another domain. This may allow the attacker to obtain sensitive information or launch other attacks against a user of the browser.
Safari 3 for both Microsoft Windows and Apple Mac OS X platforms is vulnerable to this issue.
9. RaidenHTTPD 'workspace.php' Directory Traversal Vulnerability
BugTraq ID: 26903
Remote: Yes
Date Published: 2007-12-17
Relevant URL: http://www.securityfocus.com/bid/26903
Summary:
RaidenHTTPD is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.
Exploiting this issue may allow an attacker to access sensitive information that could aid in further attacks.
RaidenHTTPD 2.0.19 is vulnerable; other versions may also be affected.
10. SurgeMail Malformed Host Header Denial of Service Vulnerability
BugTraq ID: 26901
Remote: Yes
Date Published: 2007-12-17
Relevant URL: http://www.securityfocus.com/bid/26901
Summary:
SurgeMail is prone to a remote denial-of-service vulnerability because the application fails to handle specially crafted HTTP POST requests
An attacker can exploit this issue to crash the affected application, denying service to legitimate users.
SurgeMail 38k4 for Microsoft Windows is vulnerable; other versions running on different platforms may also be affected.
11. Apple QuickTime QTL File Handling Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 26868
Remote: Yes
Date Published: 2007-12-13
Relevant URL: http://www.securityfocus.com/bid/26868
Summary:
Apple QuickTime is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted QTL file.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.
This issue affects Apple QuickTime running on Microsoft Windows Vista, Microsoft Windows XP SP2, and Mac OS X.
12. Apple QuickTime Flash Media Player Multiple Unspecified Vulnerabilities
BugTraq ID: 26866
Remote: Yes
Date Published: 2007-12-13
Relevant URL: http://www.securityfocus.com/bid/26866
Summary:
Apple QuickTime is prone to multiple unspecified vulnerabilities. The most serious issue will allow remote attackers to execute code.
The remote-code execution issues involve processing '.swf' files. The 'Quicktime.qts' module uses the 'BitMapFormat' attribute of the 'Parser' object without validating its contents.
An attacker can exploit some of these issues to execute arbitrary code with the privileges of the user running the affected application. The impact of the other issues has not been specified.
These issues affect versions prior to QuickTime 7.3.1 for these platforms:
Mac OS X v10.3.9
Mac OS X v10.4.9 or later
Mac OS X v10.5 or later
Microsoft Windows Vista
Microsoft Windows XP SP2
13. Microsoft Office Hyperlink Signing Weakness
BugTraq ID: 26857
Remote: Yes
Date Published: 2007-12-13
Relevant URL: http://www.securityfocus.com/bid/26857
Summary:
Microsoft Office fails to securely sign Office documents properly.
Attackers can leverage this weakness to manipulate signed documents in a manner such that the signature remains intact.
The weakness will result in a false sense of security and could help attackers exploit other latent vulnerabilities.
Microsoft Office 2007 is vulnerable; other versions may also be affected.
14. QK SMTP Server Malformed Commands Multiple Remote Denial of Service Vulnerabilities
BugTraq ID: 26856
Remote: Yes
Date Published: 2007-12-13
Relevant URL: http://www.securityfocus.com/bid/26856
Summary:
QK SMTP Server is prone to multiple remote denial-of-service vulnerabilities that occur when handling malformed SMTP commands.
An attacker can exploit these issues to crash the affected application, denying service to legitimate users.
These issues affects QK SMTP Server 3; other versions may also be affected.
15. JustSystems Ichitaro JSGCI.DLL Unspecified Stack Buffer Overflow Vulnerability
BugTraq ID: 26846
Remote: Yes
Date Published: 2007-12-13
Relevant URL: http://www.securityfocus.com/bid/26846
Summary:
Ichitaro is prone to an unspecified stack-based buffer-overflow vulnerability.
Successful exploits may allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed attempts will likely cause denial-of-service conditions.
The issue affects Ichitaro 2005, 2006 and 2007; other versions may also be vulnerable.
This issue is being exploited in the wild by Trojan.Tarodrop.F.
Few details are available regarding this issue. We will update this BID as more information emerges.
16. Symantec Backup Exec for Windows Unspecified Remote Vulnerability
BugTraq ID: 26837
Remote: Yes
Date Published: 2007-12-12
Relevant URL: http://www.securityfocus.com/bid/26837
Summary:
Symantec Backup Exec for Windows is prone to an unspecified remote vulnerability.
Very few technical details are currently available. We will update this BID as more information emerges.
This issue affects Backup Exec 11d for Windows Servers.
17. Microsoft Office Insecure Document Signing Weakness
BugTraq ID: 26833
Remote: Yes
Date Published: 2007-12-12
Relevant URL: http://www.securityfocus.com/bid/26833
Summary:
Microsoft Office fails to securely sign XML-based documents. Attackers can leverage this weakness to manipulate signed documents to contain malicious data in a manner such that the signature remains intact.
This weakness results in a false sense of security and could help the attacker exploit latent vulnerabilities.
Microsoft Office 2007 is vulnerable; other versions may also be affected.
18. BitDefender Antivirus 2008 bdelev.dll ActiveX Control Double Free Vulnerability
BugTraq ID: 26824
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26824
Summary:
A BitDefender Antivirus 2008 ActiveX control is prone a double-free vulnerability because of a flaw in the way that the 'bdelev.dll' library handles certain object data prior to returning it.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
19. BitDefender Antivirus bdevel.dll ActiveX Control Multiple Arbitrary Code Execution Vulnerabilities
BugTraq ID: 26820
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26820
Summary:
A BitDefender Antivirus 2008 ActiveX control is prone to multiple vulnerabilities that allow remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
20. Intuit QuickBooks Online Edition ActiveX Controls Multiple Unspecified Vulnerabilities
BugTraq ID: 26819
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26819
Summary:
Multiple Intuit QuickBooks Online Edition ActiveX controls are prone to multiple unspecified vulnerabilities.
Very few technical details are currently available. We will update this BID as more information emerges.
Versions prior to QuickBooks Online Edition 10 are vulnerable.
21. Microsoft Internet Explorer Element Tags Remote Memory Corruption Vulnerability
BugTraq ID: 26817
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26817
Summary:
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the underlying computer. Failed attacks will cause denial-of-service conditions.
22. Microsoft Internet Explorer cloneNode() and nodeValue() Remote Memory Corruption Vulnerability
BugTraq ID: 26816
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26816
Summary:
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the user's account and possibly the underlying computer. Failed attacks will cause denial-of-service conditions.
23. Perforce P4Web Content-Length Header Remote Denial Of Service Vulnerability
BugTraq ID: 26806
Remote: Yes
Date Published: 2007-12-19
Relevant URL: http://www.securityfocus.com/bid/26806
Summary:
Perforce P4Web is prone to a remote denial-of-service vulnerability because it fails to handle specially crafted HTTP requests.
An attacker can exploit this issue to cause the application to consume excessive CPU and memory resources. Successful attacks will deny service to legitimate users.
P4Web 2006.2 and prior versions running on Windows are affected.
24. Microsoft DirectX WAV and AVI File Parsing Remote Code Execution Vulnerability
BugTraq ID: 26804
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26804
Summary:
Microsoft DirectX is prone to a remote code-execution vulnerability.
An attacker could exploit this issue to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts may crash the application.
25. Microsoft Message Queuing Service Stack Buffer Overflow Vulnerability
BugTraq ID: 26797
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26797
Summary:
Microsoft Message Queuing (MSMQ) is prone to a stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges, facilitating the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.
This issue is remotely exploitable on all Windows 2000 systems, and locally exploitable on Windows XP, provided the affected component installed.
26. Microsoft DirectX SAMI File Parsing Stack Buffer Overflow Vulnerability
BugTraq ID: 26789
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26789
Summary:
DirectX is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data
An attacker could exploit this issue to execute arbitrary code within the privileges of the currently logged-in user. Failed exploit attempts may crash the application.
Note: Windows Media Player 6.4 on Windows 2000 was previously stated as not being an attack vector. The vendor has updated this information to state it is a possible attack vector.
27. Microsoft Windows SMBv2 Code Signing Remote Code Execution Vulnerability
BugTraq ID: 26777
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26777
Summary:
Microsoft Windows is prone to a remote code-execution vulnerability because it fails to properly validate digital signatures.
Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of logged-in users. This facilitates the remote compromise of affected computers.
28. Microsoft Windows Media Format Runtime ASF File Remote Code Execution Vulnerability
BugTraq ID: 26776
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26776
Summary:
Windows Media Player is prone to a remote code-execution vulnerability because it fails to properly handle malformed media files.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.
29. Microsoft Windows Vista Kernel ALPC Local Privilege Escalation Vulnerability
BugTraq ID: 26757
Remote: No
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26757
Summary:
Microsoft Windows Vista is prone to a local privilege-escalation vulnerability.
The vulnerability resides in the Windows Kernel. A locally logged-in user can exploit this issue to gain kernel-level access to the operating system.
30. Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability
BugTraq ID: 26506
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26506
Summary:
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the user's account and possibly the underlying computer. Failed attacks will cause denial-of-service conditions.
31. Microsoft Internet Explorer DHTML Object Memory Corruption Vulnerability
BugTraq ID: 26427
Remote: Yes
Date Published: 2007-12-11
Relevant URL: http://www.securityfocus.com/bid/26427
Summary:
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability because it fails to adequately handle user-supplied input to certain DHTML object methods.
Attackers can exploit this issue to execute arbitrary code in the context of a user running the application. Successful attacks would compromise the application and possibly the underlying computer. Failed attacks will cause denial-of-service conditions.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.
If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.
V. SPONSOR INFORMATION
------------------------
This issue is Sponsored by: The Computer Forensics Show
Imangine the ability to view anything that ever appeared on almost any computer. The Computer Forensics Show is the "DON"T MISS" event of the year for IT professionals
The Computer Forensics Show
February 4-6, 2008
Washington Convention Center
Washington D.C.
www.computerforensicshow.com
No comments:
Post a Comment