SecurityFocus Microsoft Newsletter #409
----------------------------------------

This issue is sponsored by Sponsored by Motorola Good technology

Mobile Device Security: Securing the Handheld, Securing the Enterprise. Mobile 
devices represent a tremendous productivity advantage for today's mobile 
worker. However, IT organizations must give consideration to the deployment of 
device security policies in order to provide the level of security that 
enterprises require.
http://whitepapers.securityfocus.com/option,com_categoryreport/task,viewabstract/title,1267/id,/vid,36/cat,/pathway,no/srcid,189/


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying 
topics of interest for our community. We are proud to offer content from 
Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I.   FRONT AND CENTER
       1.Get Off My Cloud
       2.An Astonishing Collaboration
II.  MICROSOFT VULNERABILITY SUMMARY
       1. PureMessage for Microsoft Exchange RTF Multiple Denial Of Service 
Vulnerabilities
       2. Mono 'System.Web' HTTP Header Injection Vulnerability
       3. Ultra Office Control 'Save()' Method Arbitrary File Overwrite 
Vulnerability
       4. Ultra Office Control 'HttpUpload()' Method Buffer Overflow 
Vulnerability
       5. LibTIFF 'tif_lzw.c' Remote Integer Underflow Vulnerability
       6. JustSystems Ichitaro Document Handling Unspecified Code Execution 
Vulnerability
       7. Retired: DriveCrypt Incorrect BIOS API Usage Security Vulnerability
       8. Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote 
Buffer Overflow Vulnerability
       9. Folder Lock Weak Password Encryption Local Information Disclosure 
Vulnerability
       10. Opera Web Browser 9.51 Multiple Security Vulnerabilities
III. MICROSOFT FOCUS LIST SUMMARY
       1. SecurityFocus Microsoft Newsletter #408
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1.Get Off My Cloud
By Mark Rasch
One of the features of Apple's device that appeals to me is the new MobileMe 
service, where you can "access and manage your email, contacts, calendar, 
photos, and files at me.com," according to Apple. 
More companies, among them Microsoft and Google, already allow people to store 
information and use common services online -- or "in the cloud" -- leading 
analysts to refer to the entire trend as "cloud computing."
http://www.securityfocus.com/columnists/478

2.An Astonishing Collaboration
By Dan Kaminsky
Wow. It's out. It's finally, finally out. Sweet!
http://www.securityfocus.com/columnists/477


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. PureMessage for Microsoft Exchange RTF Multiple Denial Of Service 
Vulnerabilities
BugTraq ID: 30881
Remote: Yes
Date Published: 2008-08-28
Relevant URL: http://www.securityfocus.com/bid/30881
Summary:
PureMessage for Microsoft Exchange is prone to multiple remote 
denial-of-service vulnerabilities because the application fails to properly 
process certain messages.

An attacker may exploit these issues to crash the affected application, denying 
service to legitimate users.

PureMessage 3.0 is vulnerable; other versions may also be affected.

2. Mono 'System.Web' HTTP Header Injection Vulnerability
BugTraq ID: 30867
Remote: No
Date Published: 2008-08-20
Relevant URL: http://www.securityfocus.com/bid/30867
Summary:
Mono is prone to a vulnerability that allows attackers to inject arbitrary HTTP 
headers because it fails to sanitize input.

By inserting arbitrary headers into an HTTP response, attackers may be able to 
launch cross-site request-forgery, cross-site scripting, 
HTTP-request-smuggling, and other attacks.

This issue affects Mono 2.0 and earlier.

3. Ultra Office Control 'Save()' Method Arbitrary File Overwrite Vulnerability
BugTraq ID: 30863
Remote: Yes
Date Published: 2008-08-27
Relevant URL: http://www.securityfocus.com/bid/30863
Summary:
Ultra Office Control is prone to a vulnerability that lets attackers overwrite 
files with arbitrary, attacker-controlled content. The issue occurs because the 
control fails to sanitize user-supplied input.

Successful exploits may allow attackers to compromise affected computers.

Ultra Office Control 2.0.2008.501 is vulnerable; other versions may also be 
affected.

4. Ultra Office Control 'HttpUpload()' Method Buffer Overflow Vulnerability
BugTraq ID: 30861
Remote: Yes
Date Published: 2008-08-27
Relevant URL: http://www.securityfocus.com/bid/30861
Summary:
Ultra Office Control is prone to a buffer-overflow vulnerability because the 
application fails to perform adequate boundary-checks on user-supplied data. 

An attacker can exploit this issue to execute arbitrary code in the context of 
an application using the ActiveX control (typically Internet Explorer). Failed 
attacks will likely cause denial-of-service conditions.

Ultra Office Control  2.0.2008.501 is vulnerable; other versions may also be 
affected.

5. LibTIFF 'tif_lzw.c' Remote Integer Underflow Vulnerability
BugTraq ID: 30832
Remote: Yes
Date Published: 2008-08-26
Relevant URL: http://www.securityfocus.com/bid/30832
Summary:
LibTIFF is prone to an integer-underflow vulnerability because it fails to 
bounds-check user-supplied input before copying it into an insufficiently sized 
memory buffer.

 An attacker can exploit this issue to execute arbitrary malicious code in the 
context of the user running an application that uses the affected library. 
Failed exploit attempts will likely crash applications using the affected 
library.
 
LibTIFF 3.7.2 and 3.8.2 are vulnerable.

6. JustSystems Ichitaro Document Handling Unspecified Code Execution 
Vulnerability
BugTraq ID: 30828
Remote: Yes
Date Published: 2008-08-26
Relevant URL: http://www.securityfocus.com/bid/30828
Summary:
Ichitaro is prone to an unspecified remote code-execution vulnerability.

Attackers may exploit this issue to execute arbitrary code within the context 
of the vulnerable application. Failed attempts will result in a 
denial-of-service condition.

Ichitaro 2008 is vulnerable; other versions may also be affected.

7. Retired: DriveCrypt Incorrect BIOS API Usage Security Vulnerability
BugTraq ID: 30818
Remote: No
Date Published: 2008-08-25
Relevant URL: http://www.securityfocus.com/bid/30818
Summary:
DriveCrypt is prone to a security vulnerability that may cause a 
denial-of-service condition or allow attackers to gain access to plain text 
passwords.

Local attackers can exploit this issue to gain access to access to sensitive 
information or cause the affected computer to reboot.

DriveCrypt Plus Pack version 3.9 is vulnerable; other versions may also be 
affected.

Note: This vulnerability is the same issue described in BID 15751 (Multiple 
Vendor BIOS Keyboard Buffer Password Persistence Weakness) therefore this BID 
is being retired.

8. Microsoft Windows Media Services 'nskey.dll' ActiveX Control Remote Buffer 
Overflow Vulnerability
BugTraq ID: 30814
Remote: Yes
Date Published: 2008-08-22
Relevant URL: http://www.securityfocus.com/bid/30814
Summary:
The Microsoft Windows Media Services ActiveX control is prone to a 
buffer-overflow vulnerability because it fails to perform adequate boundary 
checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code in the context of 
an application using the affected ActiveX control (typically Internet 
Explorer). Failed attacks will likely cause denial-of-service conditions.

'nskey.dll' 4.1.00.3917 is vulnerable; other versions may also be affected.

9. Folder Lock Weak Password Encryption Local Information Disclosure 
Vulnerability
BugTraq ID: 30771
Remote: No
Date Published: 2008-08-20
Relevant URL: http://www.securityfocus.com/bid/30771
Summary:
Folder Lock is prone to an information-disclosure vulnerability because it 
stores credentials in an insecure manner.

A local attacker can exploit this issue to obtain passwords used by the 
application, which may aid in further attacks.

Folder Lock 5.9.5 is vulnerable; other versions may also be affected.

10. Opera Web Browser 9.51 Multiple Security Vulnerabilities
BugTraq ID: 30768
Remote: Yes
Date Published: 2008-08-20
Relevant URL: http://www.securityfocus.com/bid/30768
Summary:
Opera Web Browser is prone to multiple security vulnerabilities.

Successful exploits may allow attackers to:
- cause denial-of-service conditions
- violate the same-origin policy
- carry out phishing and cross-domain attacks
- execute arbitrary script code in the browser of an unsuspecting user in the 
context of an affected site
- steal cookie-based authentication credentials
- present insecure websites as secure
- obtain sensitive information
- mislead a user
- carry out other attacks

Versions prior to Opera 9.52 are vulnerable.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #408
http://www.securityfocus.com/archive/88/495736

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed 
address. The contents of the subject or message body do not matter. You will 
receive a confirmation request message to which you will have to answer. 
Alternatively you can also visit http://www.securityfocus.com/newsletters and 
unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be 
manually removed.

V.   SPONSOR INFORMATION
------------------------
This issue is sponsored by Sponsored by Motorola Good technology

Mobile Device Security: Securing the Handheld, Securing the Enterprise. Mobile 
devices represent a tremendous productivity advantage for today's mobile 
worker. However, IT organizations must give consideration to the deployment of 
device security policies in order to provide the level of security that 
enterprises require.
http://whitepapers.securityfocus.com/option,com_categoryreport/task,viewabstract/title,1267/id,/vid,36/cat,/pathway,no/srcid,189/


Reply via email to