SecurityFocus Microsoft Newsletter #267
----------------------------------------

Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130

------------------------------------------------------------------
I.   FRONT AND CENTER
      1. Tenable discusses the Nessus 3 release
      2. Regaining control
II.  MICROSOFT VULNERABILITY SUMMARY
      1. Opera Web Browser Arbitrary Command Execution Vulnerability
2. SpeedProject Multiple Products File Extraction Remote Buffer Overflow Vulnerabilities
      3. MailEnable IMAP Rename Request Remote Denial of Service Vulnerability
      4. FreeFTPD Multiple Denial Of Service Vulnerabilities
5. Microsoft Windows SynAttackProtect Predictable Hash Remote Denial of Service Vulnerability 6. Sun Java Runtime Environment Multiple Privilege Escalation Vulnerabilities 7. Cisco Security Agent Unspecified Local Privilege Escalation Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
      1. ANN: Free endpoint security software released (Core FORCE 070.105)
      2. SecurityFocus Microsoft Newsletter #266
      3. Windows XP Security Guide - Laptop Policy
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Tenable discusses the Nessus 3 release
By Federico Biancuzzi
SecurityFocus interviews Ron Gula to get a glimpse of Tenable's upcoming free (but closed-source) Nessus 3 vulnerability scanner. The discussion looks at license changes, community involvement, daemon security, new features, GPL open-source versus free, NASL, and more.
http://www.securityfocus.com/columnists/371

2. Regaining control
By Kelly Martin
Securing endpoint systems by locking them down using complex software brings back memories of another era, where business computers were once used for business applications only - and businesses retained control over their assets and data.
http://www.securityfocus.com/columnists/372


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Opera Web Browser Arbitrary Command Execution Vulnerability
BugTraq ID: 15521
Remote: Yes
Date Published: 2005-11-22
Relevant URL: http://www.securityfocus.com/bid/15521
Summary:
Opera Web Browser is affected by an arbitrary command execution vulnerability.

User-supplied data passed through a URI is not properly sanitized, allowing an attacker to use a specially crafted URI and enticing a user to follow it to execute arbitrary commands through the shell. This attack may facilitate unauthorized remote access.

Opera 8.50 and prior versions running on Unix and Linux platforms are vulnerable to this issue. This vulnerability is identical to BID 14888 (Mozilla Browser/Firefox Arbitrary Command Execution Vulnerability).

2. SpeedProject Multiple Products File Extraction Remote Buffer Overflow Vulnerabilities
BugTraq ID: 15554
Remote: Yes
Date Published: 2005-11-24
Relevant URL: http://www.securityfocus.com/bid/15554
Summary:
Multiple products by SpeedProject are affected by remote buffer overflow vulnerabilities.

These issues arise when the applications handle malformed ZIP and UUE files.

Successful exploitation may result in arbitrary code execution in the context of the user who is running the application. 3. MailEnable IMAP Rename Request Remote Denial of Service Vulnerability
BugTraq ID: 15556
Remote: Yes
Date Published: 2005-11-24
Relevant URL: http://www.securityfocus.com/bid/15556
Summary:
MailEnable is prone to a remote denial of service vulnerability. The vulnerability presents itself when a user issues a malicious rename request following authentication.

Remote attackers can exploit this issue to trigger a denial of service condition.

4. FreeFTPD Multiple Denial Of Service Vulnerabilities
BugTraq ID: 15557
Remote: Yes
Date Published: 2005-11-24
Relevant URL: http://www.securityfocus.com/bid/15557
Summary:
freeFTPd is prone to multiple remote denial of service vulnerabilities. These issues are due to a failure in the application to properly handle user-supplied input.

An attacker can exploit these vulnerabilities to crash an affected server, effectively denying service to legitimate users.

5. Microsoft Windows SynAttackProtect Predictable Hash Remote Denial of Service Vulnerability
BugTraq ID: 15613
Remote: Yes
Date Published: 2005-11-28
Relevant URL: http://www.securityfocus.com/bid/15613
Summary:
Microsoft Windows is prone to a denial of service vulnerability.

The vulnerability arises due to a design error in the function responsible for the hash table management for 'SynAttackProtect'. Reports indicate that the affected function used by the TCP/IP stack creates a predictable hash, allowing an attacker to send a large number of SYN packets with an identical hash value.

A successful attack can eventually lead to a denial of service condition due to the lookup algorithm becoming very inefficient at performing searches.


6. Sun Java Runtime Environment Multiple Privilege Escalation Vulnerabilities
BugTraq ID: 15615
Remote: Yes
Date Published: 2005-11-28
Relevant URL: http://www.securityfocus.com/bid/15615
Summary:
Sun JRE is susceptible to various privilege escalation vulnerabilities.

These issues can allow remote Java applications to read/write local files and execute arbitrary applications in the context of an affected user.

Further details are not available at this time. This BID will be updated as further information is disclosed. 7. Cisco Security Agent Unspecified Local Privilege Escalation Vulnerability
BugTraq ID: 15618
Remote: No
Date Published: 2005-11-29
Relevant URL: http://www.securityfocus.com/bid/15618
Summary:
Cisco Security Agent is susceptible to an unspecified local privilege escalation vulnerability. This issue only affects computers running affected versions of Cisco Security Agent on the Microsoft Windows platform.

Further details are not currently available, this BID will be updated as information becomes available.

This issue allows local attackers to gain SYSTEM level privileges on computers running the affected software.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. ANN: Free endpoint security software released (Core FORCE 070.105)
http://www.securityfocus.com/archive/88/418028

2. SecurityFocus Microsoft Newsletter #266
http://www.securityfocus.com/archive/88/417574

3. Windows XP Security Guide - Laptop Policy
http://www.securityfocus.com/archive/88/417573

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
Need to know what's happening on YOUR network? Symantec DeepSight Analyzer
is a free service that gives you the ability to track and manage attacks.
Analyzer automatically correlates attacks from various Firewall and network
based Intrusion Detection Systems, giving you a comprehensive view of your
computer or general network. Sign up today!

http://www.securityfocus.com/sponsor/Symantec_sf-news_041130





---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to