News

Wednesday, January 07, 2009

SecurityFocus Microsoft Newsletter #426

SecurityFocus Microsoft Newsletter #426
----------------------------------------

This issue is sponsored by the Computer Forensics Show

THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL LITIGATION, ACCOUNTING AND IT PROFESSIONALS

April 27-29, 2009
Washington DC Convention Center
Washington, DC

August 3-5, 2009
San Jose Convention Center
San Jose, CA

www.computerforensicshow.com


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.MD5 Hack Interesting, But Not Threatening
2.Time to Exclude Bad ISPs
II. MICROSOFT VULNERABILITY SUMMARY
1. Microsoft Internet Explorer 'screen[""]' Remote Denial of Service Vulnerability
2. Microsoft MSN Messenger IP Address Information Disclosure Vulnerability
3. Destiny Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
4. Elecard MPEG Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
5. Apple Safari WebKit 'alink' Property Memory Leak Remote Denial of Service Vulnerability
6. SaschArt SasCam Webcam Server ActiveX Control 'Get' Method Buffer Overflow Vulnerability
7. Winace Malformed Filename Remote Denial of Service Vulnerability
8. Microsoft Windows Media Player WAV File Parsing Code Execution Vulnerability
9. BulletProof FTP Client '.bps' File Stack Buffer Overflow Vulnerability
10. BreakPoint Software Hex Workshop CMAP File Handling Buffer Overflow Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #425
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.MD5 Hack Interesting, But Not Threatening
By Tim Callan
A few days ago at the Chaos Communication Congress in Berlin, researchers presented a paper in which they had used an MD5 collision attack and substantial computing firepower to create a false SSL certificate using the RapidSSL brand of SSL certificate. In the intervening time we have seen a great deal of confusion and misinformation in the press and blogosphere about the specifics of this attack and what it means to the online ecosystem.
http://www.securityfocus.com/columnists/488

2.Time to Exclude Bad ISPs
By Oliver Day
In recent months, three questionable Internet service providers - EstDomains, Atrivo, and McColo - were effectively taken offline resulting in noticeable drops of malware and spam.
http://www.securityfocus.com/columnists/487


II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Microsoft Internet Explorer 'screen[""]' Remote Denial of Service Vulnerability
BugTraq ID: 33149
Remote: Yes
Date Published: 2009-01-07
Relevant URL: http://www.securityfocus.com/bid/33149
Summary:
Microsoft Internet Explorer is prone to a remote denial-of-service vulnerability.

Attackers can exploit this issue by enticing an unsuspecting victim to view a malicious web page.

Successfully exploiting this issue will cause the application to crash, denying service to legitimate users.

Microsoft Internet Explorer 6, 7 and 8 Beta are vulnerable; other versions may also be affected.

2. Microsoft MSN Messenger IP Address Information Disclosure Vulnerability
BugTraq ID: 33125
Remote: Yes
Date Published: 2008-12-30
Relevant URL: http://www.securityfocus.com/bid/33125
Summary:
Microsoft MSN Messenger is prone to an information-disclosure vulnerability.

Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.

Microsoft MSN Messenger 8.5.1 is vulnerable; other versions may also be affected.

3. Destiny Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 33091
Remote: Yes
Date Published: 2009-01-03
Relevant URL: http://www.securityfocus.com/bid/33091
Summary:
Destiny Media Player is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Destiny Media Player 1.61.0 is vulnerable; other versions may also be affected.

4. Elecard MPEG Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 33089
Remote: Yes
Date Published: 2009-01-02
Relevant URL: http://www.securityfocus.com/bid/33089
Summary:
Elecard MPEG Player is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Elecard MPEG Player 5.5 is vulnerable; other versions may also be affected.

5. Apple Safari WebKit 'alink' Property Memory Leak Remote Denial of Service Vulnerability
BugTraq ID: 33080
Remote: Yes
Date Published: 2009-01-01
Relevant URL: http://www.securityfocus.com/bid/33080
Summary:
Apple Safari is prone to a denial-of-service vulnerability that resides in the WebKit library.

Remote attackers can exploit this issue to crash the affected browser, denial-of-service condition.

Apple Safari 3.2 running on Microsoft Windows Vista is vulnerable; other versions running on different platforms may also be affected.

6. SaschArt SasCam Webcam Server ActiveX Control 'Get' Method Buffer Overflow Vulnerability
BugTraq ID: 33053
Remote: Yes
Date Published: 2008-12-29
Relevant URL: http://www.securityfocus.com/bid/33053
Summary:
SasCam Webcam Server ActiveX control is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

An attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions.

SasCam Webcam Server 2.6.5 is vulnerable; other versions may also be affected.

7. Winace Malformed Filename Remote Denial of Service Vulnerability
BugTraq ID: 33049
Remote: Yes
Date Published: 2008-12-29
Relevant URL: http://www.securityfocus.com/bid/33049
Summary:
Winace is prone to a denial-of-service vulnerability.

Attackers can exploit this issue to crash Windows Explorer, denying service to legitimate users. Given the nature of this issue, attackers may also be able to run arbitrary code, but this has not been confirmed.

Winace 2.2 is vulnerable; other versions may also be affected.

8. Microsoft Windows Media Player WAV File Parsing Code Execution Vulnerability
BugTraq ID: 33042
Remote: Yes
Date Published: 2008-12-29
Relevant URL: http://www.securityfocus.com/bid/33042
Summary:
Microsoft Windows Media Player is prone to a code-execution vulnerability.

An attacker can exploit this issue by tricking an unsuspecting victim into opening a malicious file with the vulnerable application. A successful exploit will allow arbitrary code to run in the context of the user running the application.

9. BulletProof FTP Client '.bps' File Stack Buffer Overflow Vulnerability
BugTraq ID: 33024
Remote: Yes
Date Published: 2008-12-28
Relevant URL: http://www.securityfocus.com/bid/33024
Summary:
BulletProof FTP Client is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition.

10. BreakPoint Software Hex Workshop CMAP File Handling Buffer Overflow Vulnerability
BugTraq ID: 33023
Remote: Yes
Date Published: 2008-12-28
Relevant URL: http://www.securityfocus.com/bid/33023
Summary:
Hex Workshop is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

Hex Workshop 5.1.4 is vulnerable; other versions may also be affected.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #425
http://www.securityfocus.com/archive/88/499701

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by the Computer Forensics Show

THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL LITIGATION, ACCOUNTING AND IT PROFESSIONALS

April 27-29, 2009
Washington DC Convention Center
Washington, DC

August 3-5, 2009
San Jose Convention Center
San Jose, CA

www.computerforensicshow.com

No comments:

Blog Archive