Hope you didn't make any plans for today. Headers of 4 different CERT 
advisories attached.

Jochem
-- 
Checking buffers is *not* rocket science.



===============================================================================
Security Advisory 
CERT-NL
===============================================================================
Author/Source : Jan Meijer                                  Index  : 
S-02-67
Distribution  : World                                       Page   : 
       1
Classification: External                                    Version: 
       1
Subject       : IIS: Heap Overrun in HTR Chunked Encoding
                 Could Enable Web Server Compromise          Date 
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-028 reports a buffer-overrunvulnerability in one of the scripting
engines used in the IIS.

This vulnerability allows for an attacker to execute code of the attackers
choice.

This advisory provides patches and pointers to useful IIS-hardening tools.

CERT-NL recommends to patch your IIS, and according to the advisory it
would be wise to disable HTR altogether as it is superceeded by ASP.

==============================================================================
- - ----------------------------------------------------------------------
Title:      Heap Overrun in HTR Chunked Encoding Could Enable Web
             Server Compromise (Q321599)
Date:       12 June 2002
Software:   Internet Information Server
Impact:     Run Code of Attacker's Choice
Max Risk:   Moderate
Bulletin:   MS02-028

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-028.asp.
- - ----------------------------------------------------------------------




===============================================================================
Security Advisory 
CERT-NL
===============================================================================
Author/Source : J.J. Meijer                                 Index  : 
S-02-69
Distribution  : World                                       Page   : 
       1
Classification: External                                    Version: 
       1
Subject       : MS SQL Server 2000: Unchecked Buffer in
                 SQLXML Could Lead to Code Execution         Date 
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-030 reports 2 vulnerabilities in the Microsoft SQL server 2000.

One of these vulnerabilities can lead to a root compromise, the other can
lead to the execution of scripts in the wrong Internet zone.

This advisory provides a patch.

CERT-NL recommends to apply the patch.

==============================================================================
- - ----------------------------------------------------------------------
Title:      Unchecked Buffer in SQLXML Could Lead to Code Execution
             (Q321911)
Date:       12 June 2002
Software:   Microsoft SQLXML
Impact:     Two vulnerabilities, the most serious of which could run
             code of attacker's choice.
Max Risk:   Moderate
Bulletin:   MS02-030

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-030.asp.
- - ----------------------------------------------------------------------



===============================================================================
Security Advisory 
CERT-NL
===============================================================================
Author/Source : Jan Meijer                                  Index  : 
S-02-66
Distribution  : World                                       Page   : 
       1
Classification: External                                    Version: 
       1
Subject       : IE, ISA and MS-Proxy-server: Unchecked
                 Buffer in Gopher Protocol Handler           Date 
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-027 reports a buffer-overrunvulnerability in the Internet Explorer,
Proxy Server and the Internet Security and Acceleration Server (ISA).

This vulnerability allows to run code of the attackers choice. The
vulnerability is known, but no patch is available yet.

This advisory provides a workaround.  Keep an eye out for the patch!

CERT-NL recommends to apply the workaround.  Beware, it takes a bit of
careful reading.  In short the workaround for IE is to establish a fake
gopher proxy, the workaround for Proxy and ISA is to disable gopher.

==============================================================================

- - ----------------------------------------------------------------------
Title:      Unchecked Buffer in Gopher Protocol Handler Can Run Code
             of Attacker's Choice (Q323889)
Date:       11 June 2002
Software:   Internet Explorer, Proxy Server, Internet Security and
             Acceleration Server
Impact:     Run Code of Attacker's Choice
Max Risk:   Critical
Bulletin:   MS02-027

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-027.asp.
- - ----------------------------------------------------------------------



===============================================================================
Security Advisory 
CERT-NL
===============================================================================
Author/Source : Jan Meijer                                  Index  : 
S-02-68
Distribution  : World                                       Page   : 
       1
Classification: External                                    Version: 
       1
Subject       : Microsoft Remote Access Service: Unchecked
                 Buffer in Remote Access Service Phonebook   Date 
:13-JUN-2002
===============================================================================

By courtesy of Microsoft Security Response Center we received the following
information.

MS02-29 reports a bufferoverrunvulnerability the Remote Access service of
Windows NT 4.0, Windows 2000 and Windows XP.

This vulnerability allows for a root compromise.

This advisory provides a patch.

CERT-NL recommends to apply the patch.

==============================================================================


- - ----------------------------------------------------------------------
Title:      Unchecked Buffer in Remote Access Service Phonebook Could
             Lead to Code Execution (Q318138)
Date:       12 June 2002
Software:   Windows NT 4.0, NT 4.0 Terminal Server Edition, 2000, XP,
             Routing and Remote Access Server (RRAS)
Impact:     Local Privilege Escalation
Max Risk:   Critical
Bulletin:   MS02-029

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-029.asp.
- - ----------------------------------------------------------------------

______________________________________________________________________
Signup for the Fusion Authority news alert and keep up with the latest news in 
ColdFusion and related topics. http://www.fusionauthority.com/signup.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to