SecurityFocus Microsoft Newsletter #270
----------------------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: Learn to Think Like a Hacker- Simulate a Hacker Breaking into Your Web
Apps
The speed with which Web Applications are developed make them prime targets for
attackers, often these applications were developed so quickly that they are not
coded properly or subjected to any security testing. Hackers know this and use
it as their weapon. Download this *FREE* test guide from SPI Dynamics to check
for Web application vulnerabilities.
https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=701300000003P6V
------------------------------------------------------------------
I. FRONT AND CENTER
1. OpenSSH cutting edge
2. Demystifying Denial-Of-Service attacks, part one
II. MICROSOFT VULNERABILITY SUMMARY
1. My Album Online Unspecified Directory Traversal Vulnerability
2. LogiSphere Multiple Directory Traversal Vulnerabilities
3. Sights 'N Sounds Streaming Media Server SWS.EXE Buffer Overflow
Vulnerability
4. Opera Web Browser Long Title Element Bookmark Denial of Service
Vulnerability
5. Microsoft Internet Explorer Dialog Manipulation Vulnerability
6. Microsoft Internet Explorer HTTPS Proxy Information Disclosure
Vulnerability
7. Microsoft Windows Asynchronous Procedure Call Local Privilege
Escalation Vulnerability
8. Microsoft Internet Explorer COM Object Instantiation Memory Corruption
Vulnerability
9. Opera Web Browser Download Dialog Manipulation File Execution
Vulnerability
10. AppServ Open Project Remote Denial of Service Vulnerability
11. Trend Micro ServerProtect ISANVWRequest Heap Overflow Vulnerability
12. Trend Micro ServerProtect Relay Heap Overflow Vulnerability
13. Trend Micro ServerProtect EarthAgent Daemon Denial of Service
Vulnerability
14. Trend Micro PC-Cillin Internet Security Local Insecure Permissions
Vulnerability
15. Watchfire AppScan QA Remote Buffer Overflow Vulnerability
16. Soft4e ECW-Cart Multiple Cross-Site Scripting Vulnerabilities
17. SSH Tectia Server Host Authentication Authorization Bypass
Vulnerability
18. Macromedia Cold Fusion MX Multiple Vulnerabilities
19. Macromedia JRun Multiple Vulnerabilities
20. Microsoft Internet Information Server 5.1 DLL Request Denial of
Service Vulnerability
21. Microsoft Excel Unspecified Memory Corruption Vulnerabilities
22. Acuity CMS ASP Search Module Cross-Site Scripting Vulnerability
23. Allinta CMS Multiple Cross-Site Scripting Vulnerabilities
24. Symantec Antivirus Library RAR Decompression Heap Overflow
Vulnerabilities
25. Pegasus Mail Multiple Remote Code Execution Vulnerabilities
26. Extensis Portfolio Netpublish Server Server.NP Directory Traversal
Vulnerability
27. Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
28. Blender BlenLoader File Processing Integer Overflow Vulnerability
29. McAfee VirusScan Security Center ActiveX Control Arbitrary File Overwrite
Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. sober resurfacing
2. SecurityFocus Microsoft Newsletter #269
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. OpenSSH cutting edge
By Federico Biancuzzi
Federico Biancuzzi interviews OpenSSH developer Damien Miller to discuss
features included in the upcoming version 4.3, public key crypto protocols
details, timing based attacks and anti-worm measures.
http://www.securityfocus.com/columnists/375
2. Demystifying Denial-Of-Service attacks, part one
By Abhishek Singh, CISSP
This paper provides an introduction to Denial of Service (DoS) attacks, their
methodologies, common prevention techniques, and how they differ from
Distributed Denial of Service (DDoS) Attacks. This article is intended to be a
broad overview for the beginner or intermediate-level administrator on the
different types of DoS attacks.
http://www.securityfocus.com/infocus/1853
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. My Album Online Unspecified Directory Traversal Vulnerability
BugTraq ID: 15800
Remote: Yes
Date Published: 2005-12-12
Relevant URL: http://www.securityfocus.com/bid/15800
Summary:
My Album Online is prone to an unspecified directory traversal vulnerability.
This issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the
vulnerable system in the context of the Web server process. Information
obtained may aid in further attacks; other attacks are also possible.
2. LogiSphere Multiple Directory Traversal Vulnerabilities
BugTraq ID: 15807
Remote: Yes
Date Published: 2005-12-12
Relevant URL: http://www.securityfocus.com/bid/15807
Summary:
LogiSphere is prone to multiple directory traversal vulnerabilities. These
issues are due to a failure in the application to properly sanitize
user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the
vulnerable system in the context of the Web server process. Information
obtained may aid in further attacks; other attacks are also possible.
3. Sights 'N Sounds Streaming Media Server SWS.EXE Buffer Overflow
Vulnerability
BugTraq ID: 15809
Remote: Yes
Date Published: 2005-12-12
Relevant URL: http://www.securityfocus.com/bid/15809
Summary:
Sights 'n Sounds Streaming Media Server is prone to a buffer overflow
vulnerability. This issue is due to a failure in the application to properly
sanitize user-supplied input.
Successful exploitation will likely result in a crash of the 'SWS.exe'
application, denying service to legitimate users. Arbitrary code execution may
also be possible, this may facilitate privilege escalation to SYSTEM level.
Sights 'n Sounds Streaming Media Server version 2.0.3.b is affected.
4. Opera Web Browser Long Title Element Bookmark Denial of Service
Vulnerability
BugTraq ID: 15813
Remote: Yes
Date Published: 2005-12-12
Relevant URL: http://www.securityfocus.com/bid/15813
Summary:
Opera Web browser is prone to a denial of service vulnerability when a Web page
with a long title element is bookmarked. If this occurs, the browser will not
be able to restart after it is closed.
This issue affects Opera running on Windows and Mac OS X. It also affects
Japanese users and any users utilizing IME for text input.
5. Microsoft Internet Explorer Dialog Manipulation Vulnerability
BugTraq ID: 15823
Remote: Yes
Date Published: 2005-12-13
Relevant URL: http://www.securityfocus.com/bid/15823
Summary:
Internet Explorer is prone to a remote code execution vulnerability through
manipulation of custom dialog boxes. Keystrokes entered while one of these
dialogs is displayed may be buffered and passed to a download dialog, allowing
attacker-supplied code to be executed.
6. Microsoft Internet Explorer HTTPS Proxy Information Disclosure Vulnerability
BugTraq ID: 15825
Remote: Yes
Date Published: 2005-12-13
Relevant URL: http://www.securityfocus.com/bid/15825
Summary:
Microsoft Internet Explorer is prone to an information disclosure vulnerability
when using an authenticating proxy server for HTTPS communications.
Exploitation of this issue could result in an attacker gaining a user's
authentication credentials.
This issue only exists when the authenticating proxy uses Basic Authentication.
7. Microsoft Windows Asynchronous Procedure Call Local Privilege Escalation
Vulnerability
BugTraq ID: 15826
Remote: No
Date Published: 2005-12-13
Relevant URL: http://www.securityfocus.com/bid/15826
Summary:
Microsoft Windows is susceptible to a local privilege escalation vulnerability.
This issue is due to a flaw in the Asynchronous Procedure Calls implementation
in Microsoft Windows.
This issue allows local attackers to gain elevated privileges, facilitating the
complete compromise of affected computers.
8. Microsoft Internet Explorer COM Object Instantiation Memory Corruption
Vulnerability
BugTraq ID: 15827
Remote: Yes
Date Published: 2005-12-13
Relevant URL: http://www.securityfocus.com/bid/15827
Summary:
Microsoft Internet Explorer is prone to a memory corruption vulnerability that
is related to the instantiation of COM objects.
COM objects may corrupt system memory and facilitate arbitrary code execution
in the context of the currently logged in user on the affected computer.
9. Opera Web Browser Download Dialog Manipulation File Execution Vulnerability
BugTraq ID: 15835
Remote: Yes
Date Published: 2005-12-13
Relevant URL: http://www.securityfocus.com/bid/15835
Summary:
Opera Web Browser is prone to a remote code execution vulnerability through
manipulation of dialog boxes.
An attacker can hide a 'File Download' dialog box underneath a new browser
window and entice a user into double clicking a specific area in the window.
This may result in the execution of arbitrary files.
10. AppServ Open Project Remote Denial of Service Vulnerability
BugTraq ID: 15851
Remote: Yes
Date Published: 2005-12-14
Relevant URL: http://www.securityfocus.com/bid/15851
Summary:
AppServ Open Project is reportedly affected by a remote denial of service
vulnerability.
AppServ 2.5.3 running on Microsoft Windows platforms was reported to be
vulnerable. Other versions may be affected as well.
11. Trend Micro ServerProtect ISANVWRequest Heap Overflow Vulnerability
BugTraq ID: 15865
Remote: Yes
Date Published: 2005-12-14
Relevant URL: http://www.securityfocus.com/bid/15865
Summary:
A remotely exploitable heap-based buffer overflow vulnerability is present in
the Trend Micro ServerProtect 'isaNVWRequest.dll' ISAPI component of the
Management Console.
An attacker could exploit this issue to execute arbitrary code in the context
of the underlying Web server.
This issue is reported to affected ServerProtect 5.58 for Windows running with
Trend Micro Control Manager 2.5/3.0 and Trend Micro Damage Cleanup Server 1.1.
Other versions and platforms may be affected as well. It is also possible that
other Trend Micro products such as InterScan eManager, InterScan Web Protect,
OfficeScan, and Control Manager could be impacted as well.
It is noted that the vulnerability may actually be present in the MFC
(Microsoft Foundation Class) ISAPI libraries. This issue may be related to BID
9963 "Microsoft Visual C++ MFC ISAPI Extension Denial Of Service
Vulnerability".
12. Trend Micro ServerProtect Relay Heap Overflow Vulnerability
BugTraq ID: 15866
Remote: Yes
Date Published: 2005-12-14
Relevant URL: http://www.securityfocus.com/bid/15866
Summary:
A remotely exploitable heap-based buffer overflow vulnerability is present in
the Trend Micro ServerProtect 'relay.dll' component in the Management Console.
An attacker could exploit this issue to execute arbitrary code in the context
of the underlying Web server.
This issue is reported to affect ServerProtect 5.58 for Windows running with
Trend Micro Control Manager 2.5/3.0 and Trend Micro Damage Cleanup Server 1.1.
Other versions and platforms may be affected as well. It is also possible that
other Trend Micro products such as InterScan eManager, InterScan Web Protect,
OfficeScan, and Control Manager could be impacted as well.
It is noted that the vulnerability may actually be present in the MFC
(Microsoft Foundation Class) ISAPI libraries. This issue may be related to BID
9963 "Microsoft Visual C++ MFC ISAPI Extension Denial Of Service
Vulnerability".
13. Trend Micro ServerProtect EarthAgent Daemon Denial of Service Vulnerability
BugTraq ID: 15868
Remote: Yes
Date Published: 2005-12-14
Relevant URL: http://www.securityfocus.com/bid/15868
Summary:
Trend Micro ServerProtect is prone to a remote denial of service vulnerability
when the EarthAgent Daemon processes a malicious packet. This causes the
process to consume a large amount of CPU and memory resources, potentially
causing the underlying operating system to fail.
This issue affects Trend Micro ServerProtect version 5.58, however, earlier
versions may also be affected.
14. Trend Micro PC-Cillin Internet Security Local Insecure Permissions
Vulnerability
BugTraq ID: 15872
Remote: No
Date Published: 2005-12-14
Relevant URL: http://www.securityfocus.com/bid/15872
Summary:
Trend Micro PC-Cillin Internet Security is a commercial antivirus and network
security package for Microsoft Windows operating systems.
Trend Micro PC-Cillin Internet Security is susceptible to a local insecure
permissions vulnerability. This issue is due to a failure of the application to
ensure that secure permissions are applied to its application and data files.
This issue allows local unprivileged attackers to disable the security features
of the affected application, aiding them in further attacks. They may also
overwrite arbitrary binaries that will subsequently be executed with SYSTEM
level privileges facilitating the complete compromise of affected computers.
Trend Micro PC-Cillin Internet Security 2005 version 12.00 build 1244 is
vulnerable to this issue. Other versions may also be affected.
15. Watchfire AppScan QA Remote Buffer Overflow Vulnerability
BugTraq ID: 15873
Remote: Yes
Date Published: 2005-12-15
Relevant URL: http://www.securityfocus.com/bid/15873
Summary:
AppScan QA is prone to a buffer overflow vulnerability.
The vulnerability presents itself when the application handles a malformed HTTP
401 (Unauthorized) response.
A successful attack may facilitate arbitrary code execution. Exploitation of
this vulnerability may allow an attacker to gain unauthorized access to the
computer in the context of the application.
AppScan QA 5.0.609 Subscription 7 and 5.0.134 were reported to be vulnerable.
Other versions may be affected as well.
16. Soft4e ECW-Cart Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 15890
Remote: Yes
Date Published: 2005-12-15
Relevant URL: http://www.securityfocus.com/bid/15890
Summary:
ECW-Cart is prone to multiple cross-site scripting vulnerabilities. These
issues are due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site. This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.
17. SSH Tectia Server Host Authentication Authorization Bypass Vulnerability
BugTraq ID: 15903
Remote: Yes
Date Published: 2005-12-15
Relevant URL: http://www.securityfocus.com/bid/15903
Summary:
SSH Tectia Server is susceptible to an authorization bypass vulnerability. This
issue is due to a failure of the application to properly validate login
credentials when using host-based authentication. Successful host-based
authentication is required to exploit this issue, limiting the sources of
attack to computers already configured to connect to the server. Host-based
authentication is disabled by default in vulnerable servers.
This issue allows remote attackers to logon to computers using the vulnerable
application with illegitimate credentials. Privilege escalation and
unauthorized access may be possible.
18. Macromedia Cold Fusion MX Multiple Vulnerabilities
BugTraq ID: 15904
Remote: Yes
Date Published: 2005-12-15
Relevant URL: http://www.securityfocus.com/bid/15904
Summary:
Macromedia ColdFusion MX is affect by multiple vulnerabilities.
The following four issues were reported:
- A security vulnerabilty related to the JRun clustered sandbox. This issue
affects Macromedia ColdFusion MX 6.0, 6.1. 6.1 with JRun, and 7.0.
- An input validation vulnerability related to the CFMAIL tag. This issue
affects Macromedia ColdFusion MX 6.0, 6.1. 6.1 with JRun, and 7.0.
- A security vulnerability related to the CFOBJECT/CreateObject sandbox
security setting. This issue affects ColdFusion MX 7.0.
- A security vulnerability that could expose the ColdFusion Administrator
password hash to unauthorized parties. This issue affects ColdFusion MX 7.0.
19. Macromedia JRun Multiple Vulnerabilities
BugTraq ID: 15905
Remote: Yes
Date Published: 2005-12-15
Relevant URL: http://www.securityfocus.com/bid/15905
Summary:
Macromedia JRun is affected by multiple security vulnerabilities.
The following issues were reported:
- Multiple vulnerabilities that let remote users gain unauthorized access to
Web application source code.
- A denial of service vulnerability in the JRun Web Server component.
20. Microsoft Internet Information Server 5.1 DLL Request Denial of Service
Vulnerability
BugTraq ID: 15921
Remote: Yes
Date Published: 2005-12-17
Relevant URL: http://www.securityfocus.com/bid/15921
Summary:
It has been reported that a remotely exploitable denial of service
vulnerability exists in Microsoft Internet Information Server 5.1. According
to the author, versions 5.0 and 6.0 are not affected.
21. Microsoft Excel Unspecified Memory Corruption Vulnerabilities
BugTraq ID: 15926
Remote: Yes
Date Published: 2005-12-19
Relevant URL: http://www.securityfocus.com/bid/15926
Summary:
Microsoft Excel is susceptible to two unspecified memory corruption
vulnerabilities. The issues present themselves when Microsoft Excel attempts to
process malformed or corrupted XLS files.
Attackers may exploit these issues to crash the affected application. The
possibility to execute arbitrary machine code through these issues has not
currently been ruled out.
This BID will be updated, and potentially split into separate records as
further information is disclosed.
22. Acuity CMS ASP Search Module Cross-Site Scripting Vulnerability
BugTraq ID: 15934
Remote: Yes
Date Published: 2005-12-19
Relevant URL: http://www.securityfocus.com/bid/15934
Summary:
Acuity CMS ASP is prone to a cross-site scripting vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site. This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.
Acuity CMS ASP 2.6.2 is affected by this issue. Other versions may also be
vulnerable.
23. Allinta CMS Multiple Cross-Site Scripting Vulnerabilities
BugTraq ID: 15935
Remote: Yes
Date Published: 2005-12-19
Relevant URL: http://www.securityfocus.com/bid/15935
Summary:
Allinta CMS is prone to a cross-site scripting vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in
the browser of an unsuspecting user in the context of the affected site. This
may facilitate the theft of cookie-based authentication credentials as well as
other attacks.
Allinta versions 2.3.2 and earlier are reportedly affected by this
vulnerability.
24. Symantec Antivirus Library RAR Decompression Heap Overflow Vulnerabilities
BugTraq ID: 15971
Remote: Yes
Date Published: 2005-12-20
Relevant URL: http://www.securityfocus.com/bid/15971
Summary:
The Symantec antivirus library is prone to multiple heap-based buffer overflow
vulnerabilities.
This vulnerability could be exploited to compromise computers running
applications that utilize the affected library. The issue exists in the RAR
archive decompression routines. The issue may affect all platforms running
applications that include the library, including Microsoft Windows and Mac OS X
releases of the applications.
Symantec is currently investigating this issue. A conclusive list of affected
products is not available at this time. This BID will be updated upon further
investigation. It is noted that the issue could affect third-party
applications that include the library.
25. Pegasus Mail Multiple Remote Code Execution Vulnerabilities
BugTraq ID: 15973
Remote: Yes
Date Published: 2005-12-20
Relevant URL: http://www.securityfocus.com/bid/15973
Summary:
Pegasus Mail is prone to multiple remote code execution vulnerabilities.
The following specific vulnerabilities were identified:
A buffer overflow vulnerability arises when the application handles a malformed
POP3 reply from a server.
An off-by-one buffer overflow vulnerability arises when the application handles
a malicious email message.
Pegasus Mail 4.21c and 4.30PB1 are reportedly vulnerable. Other versions may
be affected as well.
26. Extensis Portfolio Netpublish Server Server.NP Directory Traversal
Vulnerability
BugTraq ID: 15974
Remote: Yes
Date Published: 2005-12-20
Relevant URL: http://www.securityfocus.com/bid/15974
Summary:
Portfolio Netpublish Server is prone to a directory traversal vulnerability.
This issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker can exploit this issue to retrieve arbitrary files in the context
of the affected application. Information obtained may aid in further attacks
against the underlying system; other attacks are also possible.
Netpublish Server 7 is vulnerable; other versions may also be affected.
27. Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
BugTraq ID: 15980
Remote: Yes
Date Published: 2005-12-20
Relevant URL: http://www.securityfocus.com/bid/15980
Summary:
WorldMail IMAPd service is prone to a remote buffer overflow vulnerability.
This issue is due to a failure in the application to do proper bounds checking
on user-supplied data before using it in finite sized buffers.
An attacker can exploit this issue to crash the server resulting in a denial of
service to legitimate users. Arbitrary code execution may also be possible;
this may facilitate a compromise of the underlying system.
This issue is reported to affect IMAPd service version 6.1.19.0 of WorldMail
3.0; other versions may also be vulnerable.
28. Blender BlenLoader File Processing Integer Overflow Vulnerability BugTraq
ID: 15981
Remote: Yes
Date Published: 2005-12-20
Relevant URL: http://www.securityfocus.com/bid/15981
Summary:
Blender is susceptible to an integer overflow vulnerability. This issue is due
to a failure of the application to properly sanitize user-supplied input prior
to using it in a memory allocation and copy operation.
This issue allows attackers to execute arbitrary machine code in the context of
the user running the affected application.
29. McAfee VirusScan Security Center ActiveX Control Arbitrary File Overwrite
Vulnerability
BugTraq ID: 15986
Remote: Yes
Date Published: 2005-12-20
Relevant URL: http://www.securityfocus.com/bid/15986
Summary:
McAfee VirusScan Security Center is prone to an arbitrary file overwrite
vulnerability. Attackers are able to create and modify arbitrary files.
Successful exploitation can lead to various attacks including potential
arbitrary code execution and remote unauthorized access.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. sober resurfacing
http://www.securityfocus.com/archive/88/419567
2. SecurityFocus Microsoft Newsletter #269
http://www.securityfocus.com/archive/88/419434
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SpiDynamics
ALERT: Learn to Think Like a Hacker- Simulate a Hacker Breaking into Your Web
Apps
The speed with which Web Applications are developed make them prime targets for
attackers, often these applications were developed so quickly that they are not
coded properly or subjected to any security testing. Hackers know this and use
it as their weapon. Download this *FREE* test guide from SPI Dynamics to check
for Web application vulnerabilities.
https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=701300000003P6V
---------------------------------------------------------------------------
---------------------------------------------------------------------------