SecurityFocus Microsoft Newsletter #288
----------------------------------------
This Issue is Sponsored By: SPI Dynamics
ALERT: "How A Hacker Launches A Blind SQL Injection Attack Step-by-Step!" -
White Paper
Blind SQL Injection can deliver total control of your server to a hacker giving
them the ability to read, write and manipulate all data stored in your backend
systems! Download this *FREE* white paper from SPI Dynamics for a complete
guide to protection!
https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000CGKl
------------------------------------------------------------------
I. FRONT AND CENTER
1. Forensic felonies
2. Lessons learned from Microsoft's MS06-013 patch
II. MICROSOFT VULNERABILITY SUMMARY
1. Invision Power Board Index.PHP CK Parameter SQL Injection
Vulnerability
2. Pablo Software Solutions Quick 'n Easy FTP Server Logging Buffer
Overflow Vulnerability
3. Sybase Pylon Anywhere Unauthorized Access Vulnerability
4. Lotus Domino Unspecified LDAP Denial of Service Vulnerability
5. IZArc Hostile Destination Path Vulnerability
6. Blender BVF File Import Python Code Execution Vulnerability
7. Skulltag Remote Format String Vulnerability
8. Microsoft Internet Explorer Nested OBJECT Tag Memory Corruption
Vulnerability
9. iOpus Secure Email Attachments Encryption Weakness
10. SolarWinds TFTP Server Directory Traversal Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. File/Directory Permission Setting in Windows 2k/2003 Security
Template
2. SecurityFocus Microsoft Newsletter #287
3. Internet security on "hotspots"
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION
I. FRONT AND CENTER
---------------------
1. Forensic felonies
By Mark Rasch
A new law in Georgia on private investigators extends to computer forensics and
computer incident response, meaning that forensics experts who testify in court
without a PI license may be committing a felony.
http://www.securityfocus.com/columnists/399
2. Lessons learned from Microsoft's MS06-013 patch
By Bob Rudis
This article takes a quick look at the functionality changes in MS06-013, and
then discusses the new types of deployment decisions that are being made within
enterprise environments in light of this critical Microsoft security patch.
http://www.securityfocus.com/infocus/1863
II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Invision Power Board Index.PHP CK Parameter SQL Injection Vulnerability
BugTraq ID: 17690
Remote: Yes
Date Published: 2006-04-25
Relevant URL: http://www.securityfocus.com/bid/17690
Summary:
Invision Power Board is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied input
before using it in an SQL query.
A successful exploit could result in a compromise of the application,
disclosure or modification of data, or may permit an attacker to exploit
vulnerabilities in the underlying database implementation.
2. Pablo Software Solutions Quick 'n Easy FTP Server Logging Buffer Overflow
Vulnerability
BugTraq ID: 17681
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17681
Summary:
Quick 'n Easy FTP Server is prone to a buffer-overflow vulnerability. This
issue is due to a failure in the application to do proper bounds checking on
user-supplied data before storing it in a finite-sized buffer.
An attacker can exploit this issue to execute arbitrary machine code in the
context of the affected server application. This likely occurs with
SYSTEM-level privileges.
3. Sybase Pylon Anywhere Unauthorized Access Vulnerability
BugTraq ID: 17677
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17677
Summary:
Sybase Pylon Anywhere is prone to an access-validation vulnerability. This
issue could allow an authenticated attacker to access other users' data.
Pylon Anywhere versions prior to 7.0 are vulnerable.
4. Lotus Domino Unspecified LDAP Denial of Service Vulnerability
BugTraq ID: 17669
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17669
Summary:
Lotus Domino LDAP server is prone to an unspecified denial-of-service
vulnerability when handling malformed requests.
Lotus Domino version 7.0 is vulnerable; earlier versions may also be affected.
This issue may be related to the one described in BID 16523 (Lotus Domino LDAP
Denial of Service Vulnerability), but insufficient details are currently
available to make a proper determination.
5. IZArc Hostile Destination Path Vulnerability
BugTraq ID: 17664
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17664
Summary:
IZArc contains a vulnerability in the handling of pathnames for archived files.
By specifying a path for an archived item that points outside the expected
destination directory, the creator of the archive can cause the file to be
extracted to arbitrary locations on the filesystem, possibly including paths
containing system binaries and other sensitive or confidential information.
Presumably, an attacker could use this to create or overwrite binaries in any
desired location, using the privileges of the invoking user.
Version 3.5 beta 3 is vulnerable; other versions may also be affected.
6. Blender BVF File Import Python Code Execution Vulnerability
BugTraq ID: 17663
Remote: Yes
Date Published: 2006-04-24
Relevant URL: http://www.securityfocus.com/bid/17663
Summary:
Blender is susceptible to a Python code-execution vulnerability. This issue is
due to the application's failure to properly sanitize user-supplied input
before using it in a Python 'eval' statement.
This issue allows attackers to execute arbitrary Python code in the context of
the user running the affected application.
7. Skulltag Remote Format String Vulnerability
BugTraq ID: 17659
Remote: Yes
Date Published: 2006-04-23
Relevant URL: http://www.securityfocus.com/bid/17659
Summary:
Skulltag is reported prone to a remote format-string vulnerability.
As a result of this issue, malicious data containing format specifiers may be
interpreted literally by the application, which may cause attacker-specified
memory to be disclosed or corrupted, leading to arbitrary code execution.
A successful exploit could cause the application to fail or arbitrary code to
run in the context of the application.
8. Microsoft Internet Explorer Nested OBJECT Tag Memory Corruption
Vulnerability
BugTraq ID: 17658
Remote: Yes
Date Published: 2006-04-22
Relevant URL: http://www.securityfocus.com/bid/17658
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. This
issue is due to a flaw in the application in handling nested OBJECT tags in
HTML content.
An attacker could exploit this issue via a malicious web page to potentially
execute arbitrary code in the context of the currently logged-in user, but this
has not been confirmed. Exploit attempts likely result in crashing the affected
application. Attackers could exploit this issue through HTML email/newsgroup
postings or through other applications that employ the affected component.
Microsoft Internet Explorer 6 for Microsoft Windows XP SP2 is reportedly
vulnerable to this issue; other versions may also be affected.
9. iOpus Secure Email Attachments Encryption Weakness
BugTraq ID: 17656
Remote: Yes
Date Published: 2006-04-22
Relevant URL: http://www.securityfocus.com/bid/17656
Summary:
iOpus Secure Email Attachments is susceptible to an insecure-encryption
weakness. This issue is due to a design flaw in the encryption algorithm used
in the application.
The insecure method of encrypting attachments may result in a substantially
less than brute-force attack against certain passwords used to encrypt
attachments.
10. SolarWinds TFTP Server Directory Traversal Vulnerability
BugTraq ID: 17648
Remote: Yes
Date Published: 2006-04-21
Relevant URL: http://www.securityfocus.com/bid/17648
Summary:
TFTP Server is prone to a directory-traversal vulnerability.
An attacker can exploit this issue to retrieve arbitrary files from the
vulnerable computer in the context of the affected server process. This may
facilitate a complete compromise of the affected computer because the
application is typically run with SYSTEM privileges.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. File/Directory Permission Setting in Windows 2k/2003 Security Template
http://www.securityfocus.com/archive/88/431867
2. SecurityFocus Microsoft Newsletter #287
http://www.securityfocus.com/archive/88/431339
3. Internet security on "hotspots"
http://www.securityfocus.com/archive/88/431338
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to
[EMAIL PROTECTED] from the subscribed address. The
contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively
you can also visit http://www.securityfocus.com/newsletters and unsubscribe via
the website.
If your email address has changed email [EMAIL PROTECTED] and ask to
be manually removed.
V. SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SPI Dynamics
ALERT: "How A Hacker Launches A Blind SQL Injection Attack Step-by-Step!" -
White Paper
Blind SQL Injection can deliver total control of your server to a hacker giving
them the ability to read, write and manipulate all data stored in your backend
systems! Download this *FREE* white paper from SPI Dynamics for a complete
guide to protection!
https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000CGKl
---------------------------------------------------------------------------
---------------------------------------------------------------------------