SecurityFocus Microsoft Newsletter #355 ----------------------------------------
This Issue is Sponsored by: SPI Dynamics ALERT: Web Hacking - Attack Scenarios and Examples- White Paper Learn how to defend against Web Application Attacks with real-world examples of recent hacking methods such as SQL Injection, Cross Site Scripting and Parameter Manipulation. Learn step-by-step vulnerability testing methods for your own Web Applications and guidelines for establishing best administration and coding practices. Download *FREE* white paper from SPI Dynamics for a complete guide to protection! https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=70160000000D0r2 SECURITY BLOGS SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks. http://www.securityfocus.com/blogs ------------------------------------------------------------------ I. FRONT AND CENTER 1. Delete This! 2. Security conferences versus practical knowledge II. MICROSOFT VULNERABILITY SUMMARY 1. EDraw Office Viewer Component ActiveX Control Arbitrary File Overwrite Vulnerability 2. IBM DB2 Universal Database Multiple Unspecified Vulnerabilities 3. Symantec Enterprise Firewall Username Enumeration Weakness 4. Cisco VPN Client for Windows Multiple Local Privilege Escalation Vulnerabilities 5. RndLabs Babo Violent 2 Multiple Vulnerabilities 6. EFS Software Easy Chat Server Authentication Request Handling Remote Denial Of Service Vulnerability 7. Live For Speed Multiple Vulnerabilities 8. Zoidcom Malformed Packet Denial of Service Vulnerability 9. Drupal Content Construction Kit Nodereference Module Multiple HTML-injection Vulnerabilities 10. Diskeeper DKService.EXE Remote Information Disclosure Vulnerability 11. Microsoft Internet Explorer Vector Markup Language VGX.DLL Remote Buffer Overflow Vulnerability 12. Microsoft Windows Media Player Remote Skin Decompression Code Execution Vulnerability 13. Windows Vista Weather Gadget Remote Code Execution Vulnerability 14. Microsoft Windows Media Player Remote Skin Header Code Execution Vulnerability 15. Windows Vista Contacts Gadget Remote Code Execution Vulnerability 16. Qbik WinGate SMTP Service Command Format String Vulnerability 17. Microsoft Windows GDI Metafiles AttemptWrite Remote Code Execution Vulnerability 18. Microsoft XML Core Services SubstringData Integer Overflow Vulnerability 19. WengoPhone SIP Soft Phone Malformed Packet Denial of Service Vulnerability 20. CounterPath X-Lite SIP Soft Phone Malformed Packet Denial of Service Vulnerability 21. Microsoft Virtual PC and Virtual Server Heap Overflow Vulnerability 22. MS Visual Basic 6 Package and Deployment Wizard ActiveX Control Remote Code Execution Vulnerability 23. Microsoft Internet Explorer CSS Strings Memory Corruption Vulnerability 24. Windows Vista Feed Headlines Gadget Remote Code Execution Vulnerability 25. Microsoft OLE Automation SubstringData Function Integer Overflow Vulnerability 26. Microsoft Excel Worksheet Index Value Remote Code Execution Vulnerability 27. Microsoft DirectX Media SDK DXTLIPI.DLL ActiveX Control Buffer Overflow Vulnerability 28. WinGate SMTP Session Invalid State Remote Denial Of Service Vulnerability 29. Microsoft August 2007 Advance Notification Multiple Vulnerabilities 30. Microsoft Windows Media Player AU Divide-By-Zero Denial of Service Vulnerability 31. Symantec Altiris Deployment Solution Local Privilege Escalation Vulnerability 32. Microsoft Internet Explorer Position:Relative Denial of Service Vulnerability III. MICROSOFT FOCUS LIST SUMMARY 1. Password complexity - improvement 2. SecurityFocus Microsoft Newsletter #354 3. SecurityFocus Microsoft Newsletter #352 IV. UNSUBSCRIBE INSTRUCTIONS V. SPONSOR INFORMATION I. FRONT AND CENTER --------------------- 1. Delete This! By Mark Rasch A series of legal events means that companies that have no business reason to retain documents or records may be compelled to create and retain such records just so they can become available for discovery. http://www.securityfocus.com/columnists/450 2. Security conferences versus practical knowledge By Don Parker While the training industry as a whole has evolved rather well to suit the needs of their clients, the computer conference - specifically the computer security conference - has declined in relevance to the everyday sys-admin and network security practitioners. http://www.securityfocus.com/columnists/449 II. MICROSOFT VULNERABILITY SUMMARY ------------------------------------ 1. EDraw Office Viewer Component ActiveX Control Arbitrary File Overwrite Vulnerability BugTraq ID: 25344 Remote: Yes Date Published: 2007-08-16 Relevant URL: http://www.securityfocus.com/bid/25344 Summary: The EDraw Office Viewer Component ActiveX Control is prone to an arbitrary file-overwrite vulnerability. An attacker can exploit this issue to overwrite files with arbitrary, attacker-controlled content. This will aid in further attacks. Version 5.1 of the control is vulnerable to this issue; other versions may also be affected. 2. IBM DB2 Universal Database Multiple Unspecified Vulnerabilities BugTraq ID: 25339 Remote: Yes Date Published: 2007-08-16 Relevant URL: http://www.securityfocus.com/bid/25339 Summary: IBM DB2 is prone to multiple vulnerabilities that may allow an attacker to carry out a variety of attacks. It is possible that some of these issues may permit an attacker to completely compromise a vulnerable computer. These issues affect DB2 9.1 and 8 running on all supported platforms. 3. Symantec Enterprise Firewall Username Enumeration Weakness BugTraq ID: 25338 Remote: Yes Date Published: 2007-08-16 Relevant URL: http://www.securityfocus.com/bid/25338 Summary: Symantec Enterprise Firewall is prone to a username-enumeration weakness. An attacker can exploit this issue to enumerate valid user names. This may aid in further attacks. 4. Cisco VPN Client for Windows Multiple Local Privilege Escalation Vulnerabilities BugTraq ID: 25332 Remote: No Date Published: 2007-08-15 Relevant URL: http://www.securityfocus.com/bid/25332 Summary: Cisco VPN Client for Windows is prone to multiple local privilege-escalation vulnerabilities. Successfully exploiting these issues allows attackers with local, interactive access to affected computers to gain SYSTEM-level privileges. This facilitates the complete compromise of affected computers. Versions prior to 4.8.02.0010 and 5.0.01.0600 of Cisco VPN Client for the Microsoft Windows platform are vulnerable to these issues. These issues are tracked as Cisco Bug IDs CSCse89550 and CSCsj00785. 5. RndLabs Babo Violent 2 Multiple Vulnerabilities BugTraq ID: 25329 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25329 Summary: Babo Violent 2 is prone to four vulnerabilities. These vulnerabilities include a format-string and three denial-of-service issues. Successful attacks could result in execution of arbitrary code or could crash game servers. 6. EFS Software Easy Chat Server Authentication Request Handling Remote Denial Of Service Vulnerability BugTraq ID: 25328 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25328 Summary: Easy Chat Server is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the server, denying access to legitimate users. Easy Chat Server 2.2 is reported to be vulnerable; other versions may also be affected. 7. Live For Speed Multiple Vulnerabilities BugTraq ID: 25327 Remote: No Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25327 Summary: Live For Speed is prone to four vulnerabilities. These vulnerabilities include buffer overflows and denial of service issues. Successful exploits could result in execution of arbitrary code or could crash game servers. 8. Zoidcom Malformed Packet Denial of Service Vulnerability BugTraq ID: 25326 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25326 Summary: The Zoidcom network library is prone to a denial of service vulnerability when handling malformed packets. An attacker could exploit this to crash a network service that is implemented with the library. 9. Drupal Content Construction Kit Nodereference Module Multiple HTML-injection Vulnerabilities BugTraq ID: 25321 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25321 Summary: Drupal Content Construction Kit is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input before displaying it in dynamically generated content. An attacker could exploit these vulnerabilities to execute arbitrary script code in the browser of an unsuspecting victim in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. 10. Diskeeper DKService.EXE Remote Information Disclosure Vulnerability BugTraq ID: 25320 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25320 Summary: Diskeeper is prone to an information-disclosure vulnerability because it fails to restrict access to a certain RPC function. This issue can be exploited to gain access to potentially sensitive information stored at arbitrary attacker-supplied memory addresses. Information gained could aid in further attacks. Supplying a bad memory address will cause denial-of-service conditions. Diskeeper 9 Professional and Diskeeper 2007 Pro Premier are vulnerable; other versions may also be affected. 11. Microsoft Internet Explorer Vector Markup Language VGX.DLL Remote Buffer Overflow Vulnerability BugTraq ID: 25310 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25310 Summary: Microsoft Internet Explorer is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. This issue occurs when rendering VML (Vector Markup Language) grpahics. Attackers can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Successful attacks may facilitate the remote compromise of affected computers. Failed attacks will likely cause denial-of-service conditions. 12. Microsoft Windows Media Player Remote Skin Decompression Code Execution Vulnerability BugTraq ID: 25307 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25307 Summary: Microsoft Windows Media Player is prone to a remote code-execution vulnerability when handling specially crafted compressed skin files. Attackers exploit this issue by coercing unsuspecting users to download and open Windows Media Player skin files (WMZ or WMD files). Successful exploits allow attackers to execute arbitrary code in the context of the vulnerable application. This facilitates the remote compromise of affected computers. 13. Windows Vista Weather Gadget Remote Code Execution Vulnerability BugTraq ID: 25306 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25306 Summary: Windows Vista is prone to a remote code-execution vulnerability because it fails to adequately validate certain HTML attributes. Attackers can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Successful attacks may facilitate the remote compromise of affected computers. 14. Microsoft Windows Media Player Remote Skin Header Code Execution Vulnerability BugTraq ID: 25305 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25305 Summary: Microsoft Windows Media Player is prone to a remote code-execution vulnerability when handling specially crafted skin files. Attackers exploit this issue by coercing unsuspecting users to download and open Windows Media Player skin files (WMZ or WMD files). Note that users must attempt to apply the skin files. Successful exploits allow attackers to execute arbitrary code in the context of the vulnerable application. This facilitates the remote compromise of affected computers. 15. Windows Vista Contacts Gadget Remote Code Execution Vulnerability BugTraq ID: 25304 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25304 Summary: Windows Vista is prone to a remote code-execution vulnerability because it fails to adequately sanitize user-supplied data. Attackers exploit this issue by coercing unsuspecting users to add or import malicious contact files. Attackers can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Successful attacks may facilitate the remote compromise of affected computers. 16. Qbik WinGate SMTP Service Command Format String Vulnerability BugTraq ID: 25303 Remote: Yes Date Published: 2007-08-13 Relevant URL: http://www.securityfocus.com/bid/25303 Summary: Qbik WinGate is prone to a remote format-string vulnerability because the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function. A remote attacker may execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial of service. This issue affects Qbik WinGate 6.2.1; other versions may also be affected. 17. Microsoft Windows GDI Metafiles AttemptWrite Remote Code Execution Vulnerability BugTraq ID: 25302 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25302 Summary: Microsoft Windows is prone to a remote code-execution vulnerability because it fails to properly bounds-check user-supplied metafile data. Successfully exploiting this issue allows remote attackers to execute arbitrary machine code in the context of users viewing malicious files. This facilitates the remote compromise of affected computers. 18. Microsoft XML Core Services SubstringData Integer Overflow Vulnerability BugTraq ID: 25301 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25301 Summary: Microsoft XML Core Services is prone to an integer-overflow vulnerability. This issue occursw because the application fails to ensure that integer values are not overrun. Attackers can exploit this issue by enticing unsuspecting users to view malicious web content. Specially crafted scripts could issue requests to MSXML that trigger memory corruption. Successfully exploiting this issue allows remote attackers to corrupt heap-memory and execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. 19. WengoPhone SIP Soft Phone Malformed Packet Denial of Service Vulnerability BugTraq ID: 25300 Remote: Yes Date Published: 2007-08-13 Relevant URL: http://www.securityfocus.com/bid/25300 Summary: WengoPhone is prone to a denial-of-service vulnerability because the application fails to properly handle malformed data. Successful exploits can allow remote attackers to crash the application, resulting in denial-of-service conditions. This issue affects WengoPhone 2.1; other versions may also be affected. 20. CounterPath X-Lite SIP Soft Phone Malformed Packet Denial of Service Vulnerability BugTraq ID: 25299 Remote: Yes Date Published: 2007-08-13 Relevant URL: http://www.securityfocus.com/bid/25299 Summary: CounterPath X-Lite is prone to a denial-of-service vulnerability because the application fails to properly handle malformed data. Successful exploits can allow remote attackers to crash the application, resulting in denial-of-service conditions. This issue affects X-Lite 3.0; other versions may also be affected. 21. Microsoft Virtual PC and Virtual Server Heap Overflow Vulnerability BugTraq ID: 25298 Remote: No Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25298 Summary: Microsoft Virtual PC and Virtual Server are prone to a local heap-overflow vulnerability. To exploit this issue, attackers must have administrative privileges for the guest operating system. Attackers may exploit this issue to execute arbitrary code in the context of the host operating system or another guest operating system. Successful exploits can result in a compromise of vulnerable computers. 22. MS Visual Basic 6 Package and Deployment Wizard ActiveX Control Remote Code Execution Vulnerability BugTraq ID: 25295 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25295 Summary: The Microsoft Visual Basic 6 Package and Deployment Wizard ActiveX control is prone to a remote code-execution vulnerability. An attacker may exploit this issue by enticing victims into opening a maliciously crafted HTML document. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. 23. Microsoft Internet Explorer CSS Strings Memory Corruption Vulnerability BugTraq ID: 25288 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25288 Summary: Microsoft Internet Explorer is prone to a remote code-execution vulnerability because the application fails to properly handle certain CSS data. An attacker may exploit this issue by enticing victims into opening a maliciously crafted HTML document. Successful exploits may allow an attacker to execute arbitrary code in the context of the user running the vulnerable application. This issue affects Internet Explorer 5.01 SP4 running on Microsoft Windows 2000 SP4. 24. Windows Vista Feed Headlines Gadget Remote Code Execution Vulnerability BugTraq ID: 25287 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25287 Summary: Windows Vista is prone to a remote code-execution vulnerability because it fails to adequately sanitize user-supplied data. Attackers exploit this issue by coercing unsuspecting users to subscribe to a malicious RSS feed using the affected gadget. Attackers can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Successful attacks may facilitate the remote compromise of affected computers. 25. Microsoft OLE Automation SubstringData Function Integer Overflow Vulnerability BugTraq ID: 25282 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25282 Summary: Microsoft OLE Automation is prone to an integer-overflow vulnerability. this issue occurs because the application fails to ensure that integer values are not overrun. Successfully exploiting this issue allows remote attackers to corrupt heap memory and execute arbitrary in the context of the affeced application. Failed exploit attempts will result in a denial-of-service condition. 26. Microsoft Excel Worksheet Index Value Remote Code Execution Vulnerability BugTraq ID: 25280 Remote: Yes Date Published: 2007-08-14 Relevant URL: http://www.securityfocus.com/bid/25280 Summary: Microsoft Excel is prone to a remote code-execution vulnerability. Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file (.xls). Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. This may facilitate a compromise of vulnerable computers. 27. Microsoft DirectX Media SDK DXTLIPI.DLL ActiveX Control Buffer Overflow Vulnerability BugTraq ID: 25279 Remote: Yes Date Published: 2007-08-10 Relevant URL: http://www.securityfocus.com/bid/25279 Summary: Microsoft DirectX Media SDK 'DXTLIPI.DLL' ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions. Microsoft DirectX Media SDK 6.0 with DXTLIPI.DLL 6.0.2.827 is reported vulnerable. 28. WinGate SMTP Session Invalid State Remote Denial Of Service Vulnerability BugTraq ID: 25272 Remote: Yes Date Published: 2007-08-10 Relevant URL: http://www.securityfocus.com/bid/25272 Summary: WinGate is prone to a denial-of-service vulnerability because the application fails to sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. This issue affects versions prior to WinGate 6.2.2. 29. Microsoft August 2007 Advance Notification Multiple Vulnerabilities BugTraq ID: 25247 Remote: Yes Date Published: 2007-08-09 Relevant URL: http://www.securityfocus.com/bid/25247 Summary: Microsoft has released advance notification that the vendor will be releasing nine security bulletins on August 14, 2007. The highest severity rating for these issues is 'Critical'. Successful exploits can result in privilege escalation and remote code execution. Further details about these issues are not currently available. Individual BIDs will be created for each issue; this record will be removed when the security bulletins are released. 30. Microsoft Windows Media Player AU Divide-By-Zero Denial of Service Vulnerability BugTraq ID: 25236 Remote: Yes Date Published: 2007-08-08 Relevant URL: http://www.securityfocus.com/bid/25236 Summary: Microsoft Windows Media Player is prone to a denial-of-service vulnerability when processing a malformed AU file. A remote attacker can exploit this issue to crash the affected application, denying service to legitimate users. This issue affects Microsoft Windows Media Player 11; other versions may also be affected. 31. Symantec Altiris Deployment Solution Local Privilege Escalation Vulnerability BugTraq ID: 25232 Remote: No Date Published: 2007-08-13 Relevant URL: http://www.securityfocus.com/bid/25232 Summary: Symantec Altiris Deployment Solution is prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary commands with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. 32. Microsoft Internet Explorer Position:Relative Denial of Service Vulnerability BugTraq ID: 25222 Remote: Yes Date Published: 2007-08-07 Relevant URL: http://www.securityfocus.com/bid/25222 Summary: Microsoft Internet Explorer is prone to a denial-of-service vulnerability because the application fails to handle certain HTML code. This issue is triggered when a remote attacker entices a victim user to visit a malicious website. Attackers may exploit this issue to crash Internet Explorer, effectively denying service to legitimate users. This issue affects Internet Explorer 6. III. MICROSOFT FOCUS LIST SUMMARY --------------------------------- 1. Password complexity - improvement http://www.securityfocus.com/archive/88/476610 2. SecurityFocus Microsoft Newsletter #354 http://www.securityfocus.com/archive/88/476463 3. SecurityFocus Microsoft Newsletter #352 http://www.securityfocus.com/archive/88/476453 IV. UNSUBSCRIBE INSTRUCTIONS ----------------------------- To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website. If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed. V. SPONSOR INFORMATION ------------------------ This Issue is Sponsored by: SPI Dynamics ALERT: Web Hacking - Attack Scenarios and Examples- White Paper Learn how to defend against Web Application Attacks with real-world examples of recent hacking methods such as SQL Injection, Cross Site Scripting and Parameter Manipulation. Learn step-by-step vulnerability testing methods for your own Web Applications and guidelines for establishing best administration and coding practices. Download *FREE* white paper from SPI Dynamics for a complete guide to protection! https://download.spidynamics.com/1/ad/web.asp?Campaign_ID=70160000000D0r2
