Hope you didn't make any plans for today. Headers of 4 different CERT
advisories attached.

Crosspost from cf-talk, please have any relevant followup in cf-talk.

Jochem
-- 
Checking buffers is *not* rocket science.



===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : Jan Meijer                                  Index  :
S-02-67
Distribution  : World                                       Page   :
        1
Classification: External                                    Version:
        1
Subject       : IIS: Heap Overrun in HTR Chunked Encoding
                  Could Enable Web Server Compromise          Date
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-028 reports a buffer-overrunvulnerability in one of the scripting
engines used in the IIS.

This vulnerability allows for an attacker to execute code of the attackers
choice.

This advisory provides patches and pointers to useful IIS-hardening tools.

CERT-NL recommends to patch your IIS, and according to the advisory it
would be wise to disable HTR altogether as it is superceeded by ASP.

==============================================================================
- - ----------------------------------------------------------------------
Title:      Heap Overrun in HTR Chunked Encoding Could Enable Web
              Server Compromise (Q321599)
Date:       12 June 2002
Software:   Internet Information Server
Impact:     Run Code of Attacker's Choice
Max Risk:   Moderate
Bulletin:   MS02-028

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-028.asp.
- - ----------------------------------------------------------------------




===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : J.J. Meijer                                 Index  :
S-02-69
Distribution  : World                                       Page   :
        1
Classification: External                                    Version:
        1
Subject       : MS SQL Server 2000: Unchecked Buffer in
                  SQLXML Could Lead to Code Execution         Date
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-030 reports 2 vulnerabilities in the Microsoft SQL server 2000.

One of these vulnerabilities can lead to a root compromise, the other can
lead to the execution of scripts in the wrong Internet zone.

This advisory provides a patch.

CERT-NL recommends to apply the patch.

==============================================================================
- - ----------------------------------------------------------------------
Title:      Unchecked Buffer in SQLXML Could Lead to Code Execution
              (Q321911)
Date:       12 June 2002
Software:   Microsoft SQLXML
Impact:     Two vulnerabilities, the most serious of which could run
              code of attacker's choice.
Max Risk:   Moderate
Bulletin:   MS02-030

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-030.asp.
- - ----------------------------------------------------------------------



===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : Jan Meijer                                  Index  :
S-02-66
Distribution  : World                                       Page   :
        1
Classification: External                                    Version:
        1
Subject       : IE, ISA and MS-Proxy-server: Unchecked
                  Buffer in Gopher Protocol Handler           Date
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-027 reports a buffer-overrunvulnerability in the Internet Explorer,
Proxy Server and the Internet Security and Acceleration Server (ISA).

This vulnerability allows to run code of the attackers choice. The
vulnerability is known, but no patch is available yet.

This advisory provides a workaround.  Keep an eye out for the patch!

CERT-NL recommends to apply the workaround.  Beware, it takes a bit of
careful reading.  In short the workaround for IE is to establish a fake
gopher proxy, the workaround for Proxy and ISA is to disable gopher.

==============================================================================

- - ----------------------------------------------------------------------
Title:      Unchecked Buffer in Gopher Protocol Handler Can Run Code
              of Attacker's Choice (Q323889)
Date:       11 June 2002
Software:   Internet Explorer, Proxy Server, Internet Security and
              Acceleration Server
Impact:     Run Code of Attacker's Choice
Max Risk:   Critical
Bulletin:   MS02-027

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-027.asp.
- - ----------------------------------------------------------------------



===============================================================================
Security Advisory
CERT-NL
===============================================================================
Author/Source : Jan Meijer                                  Index  :
S-02-68
Distribution  : World                                       Page   :
        1
Classification: External                                    Version:
        1
Subject       : Microsoft Remote Access Service: Unchecked
                  Buffer in Remote Access Service Phonebook   Date
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-29 reports a bufferoverrunvulnerability the Remote Access service of
Windows NT 4.0, Windows 2000 and Windows XP.

This vulnerability allows for a root compromise.

This advisory provides a patch.

CERT-NL recommends to apply the patch.

==============================================================================


- - ----------------------------------------------------------------------
Title:      Unchecked Buffer in Remote Access Service Phonebook Could
              Lead to Code Execution (Q318138)
Date:       12 June 2002
Software:   Windows NT 4.0, NT 4.0 Terminal Server Edition, 2000, XP,
              Routing and Remote Access Server (RRAS)
Impact:     Local Privilege Escalation
Max Risk:   Critical
Bulletin:   MS02-029

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-029.asp.
- - ----------------------------------------------------------------------


______________________________________________________________________
This list and all House of Fusion resources hosted by CFHosting.com. The place for 
dependable ColdFusion Hosting.
------------------------------------------------------------------------------
To unsubscribe, send a message to [EMAIL PROTECTED] with 
'unsubscribe' in the body or visit the list page at www.houseoffusion.com

Reply via email to