Hope you didn't make any plans for today. Headers of 4 different CERT
advisories attached.
Crosspost from cf-talk, please have any relevant followup in cf-talk.
Jochem
--
Checking buffers is *not* rocket science.
===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : Jan Meijer Index :
S-02-67
Distribution : World Page :
1
Classification: External Version:
1
Subject : IIS: Heap Overrun in HTR Chunked Encoding
Could Enable Web Server Compromise Date
:13-JUN-2002
===============================================================================
By courtesy of Microsoft Security Response Center we received the following
information.
MS02-028 reports a buffer-overrunvulnerability in one of the scripting
engines used in the IIS.
This vulnerability allows for an attacker to execute code of the attackers
choice.
This advisory provides patches and pointers to useful IIS-hardening tools.
CERT-NL recommends to patch your IIS, and according to the advisory it
would be wise to disable HTR altogether as it is superceeded by ASP.
==============================================================================
- - ----------------------------------------------------------------------
Title: Heap Overrun in HTR Chunked Encoding Could Enable Web
Server Compromise (Q321599)
Date: 12 June 2002
Software: Internet Information Server
Impact: Run Code of Attacker's Choice
Max Risk: Moderate
Bulletin: MS02-028
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-028.asp.
- - ----------------------------------------------------------------------
===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : J.J. Meijer Index :
S-02-69
Distribution : World Page :
1
Classification: External Version:
1
Subject : MS SQL Server 2000: Unchecked Buffer in
SQLXML Could Lead to Code Execution Date
:13-JUN-2002
===============================================================================
By courtesy of Microsoft Security Response Center we received the following
information.
MS02-030 reports 2 vulnerabilities in the Microsoft SQL server 2000.
One of these vulnerabilities can lead to a root compromise, the other can
lead to the execution of scripts in the wrong Internet zone.
This advisory provides a patch.
CERT-NL recommends to apply the patch.
==============================================================================
- - ----------------------------------------------------------------------
Title: Unchecked Buffer in SQLXML Could Lead to Code Execution
(Q321911)
Date: 12 June 2002
Software: Microsoft SQLXML
Impact: Two vulnerabilities, the most serious of which could run
code of attacker's choice.
Max Risk: Moderate
Bulletin: MS02-030
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-030.asp.
- - ----------------------------------------------------------------------
===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : Jan Meijer Index :
S-02-66
Distribution : World Page :
1
Classification: External Version:
1
Subject : IE, ISA and MS-Proxy-server: Unchecked
Buffer in Gopher Protocol Handler Date
:13-JUN-2002
===============================================================================
By courtesy of Microsoft Security Response Center we received the following
information.
MS02-027 reports a buffer-overrunvulnerability in the Internet Explorer,
Proxy Server and the Internet Security and Acceleration Server (ISA).
This vulnerability allows to run code of the attackers choice. The
vulnerability is known, but no patch is available yet.
This advisory provides a workaround. Keep an eye out for the patch!
CERT-NL recommends to apply the workaround. Beware, it takes a bit of
careful reading. In short the workaround for IE is to establish a fake
gopher proxy, the workaround for Proxy and ISA is to disable gopher.
==============================================================================
- - ----------------------------------------------------------------------
Title: Unchecked Buffer in Gopher Protocol Handler Can Run Code
of Attacker's Choice (Q323889)
Date: 11 June 2002
Software: Internet Explorer, Proxy Server, Internet Security and
Acceleration Server
Impact: Run Code of Attacker's Choice
Max Risk: Critical
Bulletin: MS02-027
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-027.asp.
- - ----------------------------------------------------------------------
===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : Jan Meijer Index :
S-02-68
Distribution : World Page :
1
Classification: External Version:
1
Subject : Microsoft Remote Access Service: Unchecked
Buffer in Remote Access Service Phonebook Date
:13-JUN-2002
===============================================================================
By courtesy of Microsoft Security Response Center we received the following
information.
MS02-29 reports a bufferoverrunvulnerability the Remote Access service of
Windows NT 4.0, Windows 2000 and Windows XP.
This vulnerability allows for a root compromise.
This advisory provides a patch.
CERT-NL recommends to apply the patch.
==============================================================================
- - ----------------------------------------------------------------------
Title: Unchecked Buffer in Remote Access Service Phonebook Could
Lead to Code Execution (Q318138)
Date: 12 June 2002
Software: Windows NT 4.0, NT 4.0 Terminal Server Edition, 2000, XP,
Routing and Remote Access Server (RRAS)
Impact: Local Privilege Escalation
Max Risk: Critical
Bulletin: MS02-029
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-029.asp.
- - ----------------------------------------------------------------------
______________________________________________________________________
This list and all House of Fusion resources hosted by CFHosting.com. The place for
dependable ColdFusion Hosting.
------------------------------------------------------------------------------
To unsubscribe, send a message to [EMAIL PROTECTED] with
'unsubscribe' in the body or visit the list page at www.houseoffusion.com