--- Begin Message ---
SecurityFocus Microsoft Newsletter #211
----------------------------------------
This issue sponsored by: SPI Dynamics
ALERT: "How Hackers Launch Blind SQL Injection Attacks- New White Paper
The newest web app vulnerability? Blind SQL Injection!
Even if your web application does not return error messages, it may still
be open to a Blind SQL Injection Attack. Blind SQL Injection can deliver
total control of your server to a hacker giving them the ability to read,
write and manipulate all data stored in your backend systems! Download this
*FREE* white paper from SPI Dynamics for a complete guide to protection!
http://www.securityfocus.com/sponsor/SPIDynamics_ms-secnews_041020
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Securing Exchange With ISA Server 2004
II. MICROSOFT VULNERABILITY SUMMARY
1. MySQL Multiple Local Vulnerabilities
2. Macromedia ColdFusion MX CreateObject And CFOBJECT Java Exte...
3. Microsoft Windows Kernel Local Denial of Service Vulnerabili...
4. Microsoft Internet Explorer Install Engine ActiveX Control B...
5. Microsoft Internet Explorer Heartbeat ActiveX Control Unspec...
6. OCPortal Content Management System Remote File Include Vulne...
7. Microsoft Windows Kernel Virtual DOS Machine Privilege Escal...
8. IceWarp Web Mail Multiple Unspecified Remote Input Validatio...
9. Microsoft Windows NetDDE Remote Buffer Overflow Vulnerabilit...
10. Microsoft Excel File Handler Buffer Overflow Vulnerability
11. Microsoft SMTP Service and Exchange Routing Engine Buffer Ov...
12. Microsoft Windows WMF/EMF Image Format Rendering Remote Buff...
13. Microsoft CABARC Directory Traversal Vulnerability
14. Microsoft Internet Explorer Double Byte Character Set Handli...
15. Microsoft Window Management API Local Privilege Escalation V...
16. Microsoft NNTP Component Heap Overflow Vulnerability
17. Microsoft RPC Runtime Library Remote Denial Of Service And I...
18. Microsoft Internet Explorer Plug-in Navigations Handling Add...
19. Microsoft Windows Compressed (zipped) Folder Buffer Overflow...
20. Microsoft Internet Explorer Secure Sockets Layer Caching Vul...
21. Microsoft IIS Server WebDAV XML Requests Denial of Service V...
22. Adobe Acrobat Reader Remote Access Validation Vulnerability
23. Microsoft Windows 2003 Services Default SACL Access Right We...
24. Microsoft Internet Explorer Unspecified showHelp Zone Bypass...
25. Research In Motion Blackberry Remote Denial of Service Vulne...
26. SCT Campus Pipeline Render.UserLayoutRootNode.uP Cross-Site ...
27. LibTIFF Multiple Buffer Overflow Vulnerabilities
28. ShixxNOTE 6.net Remote Buffer Overflow Vulnerability
29. Microsoft Windows XP Weak Default Configuration Vulnerabilit...
30. Macromedia JRun Management Console HTML Injection Vulnerabil...
31. Microsoft Frontpage Asycpict.DLL JPEG Handling Remote Denial...
32. Macromedia JRun Session ID Cookie HTTP Response Splitting Vu...
33. Macromedia JRun Management Console Administrative Session Fi...
34. MailEnable Multiple Remote Denial Of Service Vulnerabilities
35. Ideal Science IdealBB Multiple Unspecified Remote Input Vali...
36. CyberStrong eShop ASP Shopping Cart Unspecified Cross-Site S...
37. Express-Web Content Management System Unspecified Cross-Site...
38. DevoyBB Forum Multiple Unspecified Remote Input Validation V...
39. WowBB Forum Multiple Unspecified Remote Input Validation Vul...
40. Yak! Chat Client FTP Server Directory Traversal Vulnerabilit...
III. MICROSOFT FOCUS LIST SUMMARY
1. Remote connections (Thread)
2. Remove domain user from local administrators group (Thread)
3. Can we really block users from installing applicatio... (Thread)
IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
1. Firewall RuleMaker
2. CAT Cellular Authentication Token and eAuthentication Servic...
3. KeyCaptor Keylogger
4. SpyBuster
5. FreezeX
6. NeoExec for Active Directory
V. NEW TOOLS FOR MICROSOFT PLATFORMS
1. ByteShelter I 1.0
2. DiskInternals Uneraser 2.01
3. DiskInternals NTFS Reader 1.01
4. Airscanner Mobile Firewall 1.0
5. SiVuS, The VoIP Vulnerability Scanner 1.07
6. XArp 0.1.5
VI. UNSUBSCRIBE INSTRUCTIONS
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Securing Exchange With ISA Server 2004
By Jonathan Hassell
This article will highlight the security issues involved with providing
Outlook Web Access or full Outlook client connections over the Internet,
and then discuss how Microsoft's new ISA Server 2004 can be configured to
mitigate these threats.
http://www.securityfocus.com/infocus/1807
II. MICROSOFT VULNERABILITY SUMMARY
-----------------------------------
1. MySQL Multiple Local Vulnerabilities
BugTraq ID: 11357
Remote: No
Date Published: Oct 11 2004
Relevant URL: http://www.securityfocus.com/bid/11357
Summary:
MySQL is reported prone to multiple local vulnerabilities. These issues may
allow an attacker to bypass security restrictions or cause a denial of service
condition in the application.
It is reported that an attacker can bypass certain security restrictions and
gain access to and corrupt potentially sensitive data due to an error in 'ALTER
TABLE ... RENAME' operations.
A denial of service condition presents itself when multiple threads ALTER MERGE
tables to change the UNION.
Due to a lack of details, further information is not available at the moment.
This BID will be updated as more information becomes available.
2. Macromedia ColdFusion MX CreateObject And CFOBJECT Java Exte...
BugTraq ID: 11364
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11364
Summary:
It is reported that ColdFusion MX contains a weakness that allows all
developers to utilize the CFOBJECT tag and the CreateObject function to execute
potentially malicious code in the context of the affected application server.
This weakness allows malicious developers to execute code that is not
appropriate for a shared server environment, or to perform administrative
actions in the context of the affected application server. Malicious developers
may possibly exploit this weakness to aid them in further application or system
attacks.
Versions 6.0 and 6.1 of Macromedia ColdFusion MX are reported to be affected by
this weakness.
3. Microsoft Windows Kernel Local Denial of Service Vulnerabili...
BugTraq ID: 11365
Remote: No
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11365
Summary:
The Microsoft Windows kernel is prone to a denial of service vulnerability.
This issue can allow a local attacker to cause a vulnerable computer to stop
responding and restart. This can effectively deny service to legitimate users.
This issue does not pose a privilege escalation threat.
4. Microsoft Internet Explorer Install Engine ActiveX Control B...
BugTraq ID: 11366
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11366
Summary:
A remotely exploitable buffer overflow vulnerability exists in the Microsoft
Internet Explorer Install Engine ActiveX control. This vulnerability is caused
by insufficient bounds checking of arguments passed to the control.
The vulnerability may be exploited to execute arbitrary code in the context of
the client user.
** Update: NGSSoftware has released a preliminary advisory for this issue
announcing that technical details will be withheld until January 19th, 2005.
5. Microsoft Internet Explorer Heartbeat ActiveX Control Unspec...
BugTraq ID: 11367
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11367
Summary:
An unspecified vulnerability exists in the Microsoft Internet Explorer
Heartbeat MSN gaming ActiveX control (heartbeat.ocx).
6. OCPortal Content Management System Remote File Include Vulne...
BugTraq ID: 11368
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11368
Summary:
Reportedly ocPortal is affected by a remote file include vulnerability. This
issue is due to a failure of the application to sanitize user supplied URI
input.
An attacker might leverage this issue to run arbitrary server side script code
on a vulnerable computer with the privileges of the web server process. This
may potentially result in a compromise of the vulnerable computer as well as
other attacks.
7. Microsoft Windows Kernel Virtual DOS Machine Privilege Escal...
BugTraq ID: 11369
Remote: No
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11369
Summary:
Microsoft Windows Kernel Virtual DOS Machine is reported prone to a local
privilege escalation vulnerability.
The Microsoft Virtual DOS Machine (VDM) is a protected environment that
emulates MS-DOS on Windows NT-based operating systems. This issue arises due
to an access validation error. A local attacker can exploit this vulnerability
to gain elevated privileges on a vulnerable computer.
8. IceWarp Web Mail Multiple Unspecified Remote Input Validatio...
BugTraq ID: 11371
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11371
Summary:
Multiple unspecified remote input validation vulnerabilities reportedly affect
IceWarp Web Mail. These issues are due to a failure of the application to
validate or filter user-supplied input.
Although the impact of all of these issues is currently unknown, it is known
that an attacker can exploit some of these issues to carry out cross-site
scripting attacks.
9. Microsoft Windows NetDDE Remote Buffer Overflow Vulnerabilit...
BugTraq ID: 11372
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11372
Summary:
Microsoft Windows NetDDE is affected by a remote buffer overflow vulnerability.
This issue is due to a failure of the application to properly verify the
lengths of strings contained within unspecified network messages prior to
copying them into finite buffers.
It should be noted that NetDDE is not activated by default on Windows computers.
An attacker may leverage this issue to execute arbitrary code on an affected
computer with SYSTEM privileges. It is also noted that in some circumstances,
where NetDDE services have been installed but not started, local attackers
might exploit this issue to gain elevated privileges since it may be possible
for an unprivileged user to start the services.
** Update: NGSSoftware has released a preliminary advisory for this issue
announcing that technical details will be withheld until January 19th, 2005.
** Update: Immunity Research has reported that a remote attacker may require
authentication prior to the exploitation of this vulnerability. Further details
of this report can be found in the referenced message "ms04-031 pre-auth ??".
10. Microsoft Excel File Handler Buffer Overflow Vulnerability
BugTraq ID: 11373
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11373
Summary:
Microsoft Excel is reported prone to an buffer overflow vulnerability. The
issue presents itself when the vulnerable software handles a malicious Excel
file.
Ultimately a remote attacker may exploit this vulnerability to execute
arbitrary code. Code execution will occur in the context of a user that is
using a vulnerable version of Excel to view a malicious Excel spreadsheet.
11. Microsoft SMTP Service and Exchange Routing Engine Buffer Ov...
BugTraq ID: 11374
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11374
Summary:
The Microsoft Windows 2003 SMTP Service and Exchange Routing Engine have been
reported prone to a buffer overflow. This occurs during the processing
responses to DNS lookups. Successful exploitation could allow for remote code
execution in the context of the vulnerable service.
12. Microsoft Windows WMF/EMF Image Format Rendering Remote Buff...
BugTraq ID: 11375
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11375
Summary:
Microsoft Windows WMF/EMF image rendering library is affected by a remote
buffer overflow vulnerability. This issue is due to a failure of the affected
library to properly verify the lengths of strings contained within an affected
image file prior to copying them into finite buffers.
Any code execution that occurs will take place with SYSTEM privileges due to
the nature of the affected library. This will also permit local privilege
escalation attacks.
13. Microsoft CABARC Directory Traversal Vulnerability
BugTraq ID: 11376
Remote: No
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11376
Summary:
CABARC is reported prone to a directory traversal vulnerability. This issue
may allow a local attacker to gain access to potentially sensitive files on a
vulnerable computer.
It is reported that an attacker can escape the path by supplying '../'
character sequences.
14. Microsoft Internet Explorer Double Byte Character Set Handli...
BugTraq ID: 11377
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11377
Summary:
It is reported that Microsoft Internet Explorer is prone to a vulnerability
that may allow a malicious Web page to spoof the address bar of the browser.
This vulnerability presents itself due to a malfunction that occurs when
certain double byte characters are encountered. As a result, this vulnerability
will only affect computers that are configured to employ double byte character
sets.
This could be used to lure Web users into a false sense of trust since a
malicious or spoofed site may pose as a site that is trusted by the user.
15. Microsoft Window Management API Local Privilege Escalation V...
BugTraq ID: 11378
Remote: No
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11378
Summary:
Microsoft has reported that several unspecified Window Management API functions
can allow a local attacker to change the attributes of an application with
higher level of privileges. This can allow the attacker to gain elevated
privileges on a vulnerable computer.
This issue represents a fundamental design flaw, as certain messages used to
communicate between windows on a desktop may adversely affect the operation of
a receiving process. By altering various properties of window components
running with higher privileges, an attacker can create circumstances where
attacks such as buffer overflows and potential arbitrary code execution are
possible.
This issue likely affects some native Windows applications but other
third-party applications may also provide an opportunity for exploitation.
16. Microsoft NNTP Component Heap Overflow Vulnerability
BugTraq ID: 11379
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11379
Summary:
The Microsoft Network News Transfer Protocol (NNTP) Component is prone to a
buffer overflow condition. Successful exploitation of this vulnerability could
allow remote code execution in the context of the process accessing the
vulnerable component.
17. Microsoft RPC Runtime Library Remote Denial Of Service And I...
BugTraq ID: 11380
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11380
Summary:
Microsoft RPC Runtime Library is affected by a remote denial of service and
information disclosure vulnerability. This issue is due to a failure of the
library to properly handle exceptional network traffic.
An attacker may leverage this issue to disclose potentially sensitive
information and to cause the affected application to crash, denying service to
legitimate users.
18. Microsoft Internet Explorer Plug-in Navigations Handling Add...
BugTraq ID: 11381
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11381
Summary:
It is reported that Microsoft Internet Explorer is prone to a vulnerability
that may allow a malicious Web page containing embedded flash multimedia to
spoof the address bar of the browser.
This could be used to lure Web users into a false sense of trust since a
malicious or spoofed site may pose as a site that is trusted by the user.
19. Microsoft Windows Compressed (zipped) Folder Buffer Overflow...
BugTraq ID: 11382
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11382
Summary:
Microsoft Windows contains a buffer overflow in the Compressed (zipped) Folders
feature. A maliciously crafted compressed file could overrun an internal
buffer causing arbitrary code to be executed in the security context of the
current user.
20. Microsoft Internet Explorer Secure Sockets Layer Caching Vul...
BugTraq ID: 11383
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11383
Summary:
Microsoft Internet Explorer is reported prone to a Secure Sockets Layer caching
vulnerability.
It is reported that arbitrary content may be cached to the computer that is
viewing a malicious site when this vulnerability is exploited. This cached
content will be rendered in the context of a legitimate site when a legitimate
site is viewed.
21. Microsoft IIS Server WebDAV XML Requests Denial of Service V...
BugTraq ID: 11384
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11384
Summary:
Microsoft IIS Server is prone to a remote denial of service vulnerability when
handling malformed WebDAV requests. The vulnerability exists in the Microsoft
XML Parser component and can be exploited through the WebDAV XML message
handler.
It is reported that this issue requires a remote attacker to create specially
crafted WebDAV requests and send them to a vulnerable server over TCP port 80.
There is a possibility of increased CPU resource and memory consumption as the
IIS server attempts to process these requests. This can eventually lead to a
denial of service condition in the server. A reboot is required to restore
normal functionality.
This vulnerability can also be exploited through other applications that rely
on Microsoft XML Parser to process XML messages.
22. Adobe Acrobat Reader Remote Access Validation Vulnerability
BugTraq ID: 11386
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11386
Summary:
An access validation vulnerability affects Adobe Acrobat Reader. This issue is
due to a design error that allows a malicious file to be embedded inside a
Portable Document Format (PDF) file.
An attacker may leverage this issue to disclose files that are readable by the
unsuspecting user who activates a malicious PDF file. Information disclosed in
this way may facilitate further attacks against the affected computer.
23. Microsoft Windows 2003 Services Default SACL Access Right We...
BugTraq ID: 11387
Remote: No
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11387
Summary:
It is reported that the default SACL access right settings for multiple
Microsoft Windows 2003 services are weak.
Reports indicate that several services have lax permissions that will allow
unprivileged local users to start them.
Because any user can start these services, an administrator may be under a
false sense of security.
24. Microsoft Internet Explorer Unspecified showHelp Zone Bypass...
BugTraq ID: 11388
Remote: Yes
Date Published: Oct 12 2004
Relevant URL: http://www.securityfocus.com/bid/11388
Summary:
Microsoft Security Bulletin MS04-038 includes fixes to address an unspecified
vulnerability in Internet Explorer that may permit elevation of zone privileges
by bypassing from the Internet Zone to the Local Zone.
The vendor has stated that additional security verifications have been added to
prevent the showHelp DHTML method from being abused by a malicious Web site to
load HTML Help files in the context of the Local Zone. It is unclear at this
point whether they mean HTML Help files that already exist on the system or
HTML Help files that originate from a remote source.
Although unconfirmed, this could be related to the following unspecified
vulnerability that was addressed in Windows XP SP2/BID 10897 (
Microsoft Windows XP SP2 Released - Multiple Vulnerabilities Fixed):
- HTML Help Update to Limit Functionality When It Is Invoked with the
window.showHelp( ) Method
This is likely similar to earlier issues that have been reported in showHelp,
such as BID 9320. Microsoft has not released further details about this
vulnerability.
25. Research In Motion Blackberry Remote Denial of Service Vulne...
BugTraq ID: 11389
Remote: Yes
Date Published: Oct 13 2004
Relevant URL: http://www.securityfocus.com/bid/11389
Summary:
The Research In Motion Blackberry 7230 is affected by a remote denial of
service vulnerability. This issue is due to the device attempting to copy a
long message in to flash memory.
An attacker may leverage this issue to cause the affected device to restart,
causing a loss of all email messages saved on the device.
Update: This issue was originally identified as a buffer overflow
vulnerability. New information suggests that it is only a remote denial of
service condition. This BID is being updated to reflect this information.
26. SCT Campus Pipeline Render.UserLayoutRootNode.uP Cross-Site ...
BugTraq ID: 11392
Remote: Yes
Date Published: Oct 13 2004
Relevant URL: http://www.securityfocus.com/bid/11392
Summary:
Campus Pipeline is affected by a cross-site scripting vulnerability. This issue
is due to a failure of the application to properly sanitize user-supplied URI
input.
This issue could permit a remote attacker to create a malicious URI link that
includes hostile HTML and script code. If this link were to be followed, the
hostile code may be rendered in the web browser of the victim user. This would
occur in the security context of the affected web site and may allow for theft
of cookie-based authentication credentials or other attacks.
27. LibTIFF Multiple Buffer Overflow Vulnerabilities
BugTraq ID: 11406
Remote: Yes
Date Published: Oct 13 2004
Relevant URL: http://www.securityfocus.com/bid/11406
Summary:
LibTIFF is affected by multiple buffer overflow vulnerabilities. This issue is
due to a failure of the application to properly perform boundary checks prior
to copying user-supplied strings into finite process buffers.
An attacker may leverage these issues to execute arbitrary code on a vulnerable
computer with the privileges of the user running the vulnerable application,
facilitating unauthorized access. These issues may also be leveraged to cause
an affected application to crash.
28. ShixxNOTE 6.net Remote Buffer Overflow Vulnerability
BugTraq ID: 11409
Remote: Yes
Date Published: Oct 13 2004
Relevant URL: http://www.securityfocus.com/bid/11409
Summary:
ShixxNOTE 6.net is reported susceptible to a remote buffer overflow
vulnerability. This issue is due to a failure of the application to properly
perform boundary checks prior to copying user-supplied strings into finite
process buffers.
An attacker may leverage this issue to execute arbitrary code on a vulnerable
computer with the privileges of the user running the vulnerable application.
29. Microsoft Windows XP Weak Default Configuration Vulnerabilit...
BugTraq ID: 11410
Remote: No
Date Published: Oct 13 2004
Relevant URL: http://www.securityfocus.com/bid/11410
Summary:
Microsoft Windows XP Service Pack 2 is reported prone to a weak default
configuration vulnerability. Internet Connection Firewall (ICF) includes
functionality that controls what binaries are permitted to listen for incoming
connections.
It is reported that one of the executables that is permitted to listen for
incoming network connections may provide a conduit to bypass ICF access
controls. Due to a configuration weakness, this executable is accessible for
all users.
A local attacker may exploit this vulnerability to create a listening port to
provide remote access to a vulnerable computer.
30. Macromedia JRun Management Console HTML Injection Vulnerabil...
BugTraq ID: 11411
Remote: Yes
Date Published: Oct 14 2004
Relevant URL: http://www.securityfocus.com/bid/11411
Summary:
Macromedia JRun is prone to an HTML injection vulnerability. This issue exists
in the Management Console and may allow hijacking of administrative sessions.
31. Microsoft Frontpage Asycpict.DLL JPEG Handling Remote Denial...
BugTraq ID: 11412
Remote: Yes
Date Published: Oct 14 2004
Relevant URL: http://www.securityfocus.com/bid/11412
Summary:
Microsoft Frontpage is reported prone to multiple remote denial of service
vulnerabilities when handling malformed JPEG files. These issues exist due to
insufficient verification performed by the 'asycpict.dll' module.
Reportedly, these issues can only cause a denial of service condition, however,
it may be possible to execute arbitrary code on a vulnerable computer as well.
This has not been confirmed at the moment.
It should be noted that in an initial advisory these vulnerabilities were
reported to affect the 'asycpict.dll' library. In the report it is mentioned
that this library is shipped with all versions of Microsoft Windows XP,
however, conflicting reports indicate that this is not accurate. These
conflicting reports indicate that this library is in fact shipped with
Microsoft Front Page 97 and 98. Additionally, one of these reports indicated
that the library was also shipped with Microsoft Internet Explorer version
3.01. This is not confirmed.
Due to a lack of details, further information is not available at the moment.
This BID will be updated as more information becomes available.
32. Macromedia JRun Session ID Cookie HTTP Response Splitting Vu...
BugTraq ID: 11413
Remote: Yes
Date Published: Oct 14 2004
Relevant URL: http://www.securityfocus.com/bid/11413
Summary:
An HTTP response splitting vulnerability affects Macromedia JRun due to Session
ID handling. This issue is due to a failure of the application to properly
handle how POST requests are processed.
A remote attacker may exploit this vulnerability to influence or misrepresent
how web content is served, cached or interpreted. This could aid in various
attacks, which try to entice client users into a false sense of trust.
33. Macromedia JRun Management Console Administrative Session Fi...
BugTraq ID: 11414
Remote: Yes
Date Published: Oct 14 2004
Relevant URL: http://www.securityfocus.com/bid/11414
Summary:
Macromedia JRun is prone to session fixation vulnerability. This issue exists
in the Management Console.
The application is reported prone to session fixation vulnerability. This
attack can allow an attacker to set a session ID in a user's browser and hijack
the user's session upon authentication to JRun.
This issue can allow remote attackers to bypass authentication checks, and
possibly allow them to gain administrative access to the web application.
This issue was originally reported in BID 11245 (Macromedia JRun Multiple
Remote Vulnerabilities). It is now being separated and assigned a new BID.
34. MailEnable Multiple Remote Denial Of Service Vulnerabilities
BugTraq ID: 11418
Remote: Yes
Date Published: Oct 14 2004
Relevant URL: http://www.securityfocus.com/bid/11418
Summary:
MailEnable is affected by multiple remote denial of service vulnerabilities.
These issues are due to a failure of the application to handle malformed
requests.
An attacker may leverage these issues to cause the IMAP and SNMP services to
crash, denying service to legitimate users.
35. Ideal Science IdealBB Multiple Unspecified Remote Input Vali...
BugTraq ID: 11424
Remote: Yes
Date Published: Oct 15 2004
Relevant URL: http://www.securityfocus.com/bid/11424
Summary:
Ideal Science IdealBB is reported prone to multiple unspecified input
validation vulnerabilities. These issues result from insufficient sanitization
of user-supplied data.
It is reported that the application is affected by SQL injection, cross-site
scripting and HTTP response splitting vulnerabilities.
All versions of IdealBB are considered vulnerable at the moment.
36. CyberStrong eShop ASP Shopping Cart Unspecified Cross-Site S...
BugTraq ID: 11425
Remote: Yes
Date Published: Oct 15 2004
Relevant URL: http://www.securityfocus.com/bid/11425
Summary:
An unspecified cross-site scripting vulnerability exists in CyberStrong eShop
ASP Shopping Cart. This could potentially be exploited to steal cookie-based
authentication credentials or launch other attacks.
37. Express-Web Content Management System Unspecified Cross-Site...
BugTraq ID: 11426
Remote: Yes
Date Published: Oct 15 2004
Relevant URL: http://www.securityfocus.com/bid/11426
Summary:
An unspecified cross-site scripting vulnerability exists in Express-Web Content
Management System. This could potentially be exploited to steal cookie-based
authentication credentials or launch other attacks.
38. DevoyBB Forum Multiple Unspecified Remote Input Validation V...
BugTraq ID: 11428
Remote: Yes
Date Published: Oct 15 2004
Relevant URL: http://www.securityfocus.com/bid/11428
Summary:
DevoyBB is reportedly affected by multiple input validation vulnerabilities.
These issues are due to a failure of the application to properly sanitize
user-supplied input prior to including it in dynamic web content and SQL
database queries.
An attacker can leverage these issues to manipulate or reveal database contents
through SQL injection attacks as well as carry out other attacks and steal
cookie-based authentication credentials through cross-site scripting attacks.
39. WowBB Forum Multiple Unspecified Remote Input Validation Vul...
BugTraq ID: 11429
Remote: Yes
Date Published: Oct 15 2004
Relevant URL: http://www.securityfocus.com/bid/11429
Summary:
WowBB is reportedly affected by multiple input validation vulnerabilities.
These issues are due to a failure of the application to properly sanitize
user-supplied input prior to including it in dynamic web content and SQL
database queries.
An attacker can leverage these issues to manipulate or reveal database contents
through SQL injection attacks as well as carry out other attacks and steal
cookie-based authentication credentials through cross-site scripting attacks.
40. Yak! Chat Client FTP Server Directory Traversal Vulnerabilit...
BugTraq ID: 11433
Remote: Yes
Date Published: Oct 15 2004
Relevant URL: http://www.securityfocus.com/bid/11433
Summary:
Yak! Chat Client FTP server is reported prone to a remote directory traversal
vulnerability. This issue presents itself due to insufficient sanitization of
user-supplied data.
This issue can ultimately allow an attacker to compromise a computer by placing
malicious files on the system and executing these files through other means.
Yak! 2.1.2 and prior versions are reported vulnerable to this issue.
III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Remote connections (Thread)
Relevant URL:
http://www.securityfocus.com/archive/88/378293
2. Remove domain user from local administrators group (Thread)
Relevant URL:
http://www.securityfocus.com/archive/88/378282
3. Can we really block users from installing applicatio... (Thread)
Relevant URL:
http://www.securityfocus.com/archive/88/378246
IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
----------------------------------------
1. Firewall RuleMaker
By: The Net Memetic Pte Ltd
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://firewall.rulemaker.net
Summary:
Firewall RuleMaker is a Windows-based firewall configuration version control
software product for managers of Cisco PIX and Netscreen firewalls.
2. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, UNIX,
Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:
Low cost, easy to use Two Factor Authentication One Time Password token using
the Cellular. Does not use SMS or communication, manages multiple OTP accounts
- new technology. For any business that want a safer access to its Internet
Services. More information at our site.
We also provide eAuthentication service for businesses that will not buy an
Authentication product but would prefer to pay a monthly charge for
authentication services from our our CAT Server.
3. KeyCaptor Keylogger
By: Keylogger Software
Platforms: MacOS, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keylogger-software.com/keylogger/keylogger.htm
Summary:
KeyCaptor is your solution for recording ALL keystrokes of ALL users on your
computer! Now you have the power to record emails, websites, documents, chats,
instant messages, usernames, passwords, and MUCH MORE!
With our advanced stealth technology, KeyCaptor will not show in your processes
list and cannot be stopped from running unless you say so!
4. SpyBuster
By: Remove Spyware
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.remove-spyware.com/spybuster.htm
Summary:
Our award winning spyware / adware scanner and removal software, SpyBuster will
scan your computer for over 4,000 known spyware and adware applications.
SpyBuster protects your computer from data stealing programs that can expose
your personal information.
SpyBuster scanning technology allows for a quick and easy sweep, so you can
resume your work in minutes.
5. FreezeX
By: Faronics Technologies USA Inc
Platforms: Windows 2000, Windows 95/98, Windows XP
Relevant URL: http://www.faronics.com/html/Freezex.asp
Summary:
FreezeX prevents all unauthorized programs, including viruses, keyloggers and
spy ware from executing. Powerful and secure, FreezeX ensures that any new
executable, program, or application that is downloaded, introduced via
removable media or the network will never install
6. NeoExec for Active Directory
By: NeoValens
Platforms: Windows 2000, Windows XP
Relevant URL: http://www.neovalens.com
Summary:
NeoExec® is an operating system extension for Windows 2000/XP that allows the
setting of privileges at the application level rather than at the user level.
NeoExec® is the ideal solution for applications that require elevated
privileges to run as the privileges are granted to the application, not the
user.
NeoExec® is the only solution on the market capable of modifying at runtime the
processes' security context -- without requiring a second account as with RunAs
and RunAs-derived products.
V. NEW TOOLS FOR MICROSOFT PLATFORMS
------------------------------------
1. ByteShelter I 1.0
By: MazZoft NDA
Relevant URL: http://www.mazzoft.com/bs1.zip
Platforms: Windows 2000, Windows 95/98
Summary:
This steganography tools lets you conceal data in Outlook e-mail messages and
.doc files.
2. DiskInternals Uneraser 2.01
By: Alexey Babenko
Relevant URL: http://diskinternals.com/download/Uneraser_Setup.zip
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:
DiskInternals Uneraser can recover any deleted file, including documents,
photos, mp3 and zip files, or even folders and damaged disks. In addition to
HDD, the program supports any type of storage media (music sticks, cameras,
flash drives, USB drives, etc)! It works with encrypted files and helps you
undelete file lost because of a virus attack or an employee's malicious
behavior. No special skills needed; 100% free to try.
3. DiskInternals NTFS Reader 1.01
By: Alexey Babenko
Relevant URL: http://diskinternals.com/download/NTFS_Reader_Setup.zip
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:
Provides read access to NTFS disks from Windows 95, 98 and Me. Allows you to
save any files to any disk visible on the system or on the network. Supports
saving compressed or encrypted files.
While saving, it ignores file security policies. It means that it is possible
to access absolutely any file on a NTFS disk from Windows 9x.
4. Airscanner Mobile Firewall 1.0
By: Airscanner Corp
Relevant URL: http://www.airscanner.com/downloads/fw/amfw.exe
Platforms: Windows CE
Summary:
A Full-Strength Personal Firewall for Your Windows Mobile/Pocket PC handheld.
Airscanner Mobile Firewall for Windows Mobile Pocket PC is a low-level,
bi-directional, packet filtering firewall that examines all incoming and
outgoing TCP/IP traffic.
This personal firewall ensures that data is permitted based on access control
lists that you select from a set of predefined filters, or from filters that
you create yourself.
The firewall parses packets as they come in (or go out)
5. SiVuS, The VoIP Vulnerability Scanner 1.07
By: SiVuS
Relevant URL: http://www.vopsecurity.org/html/downloads.html
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:
New release of the first free VoIP vulnerability scanner with enhanced
features. Additional vulnerability checks, faster discovery scanner, ability
to save and reload configurations and more. SiVuS can be downloaded from
www.vopsecurity.org
6. XArp 0.1.5
By: Christoph Mayer
Relevant URL: http://www.chrismc.de
Platforms: Windows 2000, Windows XP
Summary:
XArp is a graphical tool to monitor the ARP cache. It periodically requests the
local ARP cache and reports changes in the IP to MAC mapping. Thus it can be
used to recognize ARP poisoning which is used to prepare 'man in the middle'
attacks on switched networks.
VI. UNSUBSCRIBE INSTRUCTIONS
----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed
address. The contents of the subject or message body do not matter. You will
receive a confirmation request message to which you will have to answer.
Alternatively you can also visit http://www.securityfocus.com/newsletters and
unsubscribe via the website.
If your email address has changed email [EMAIL PROTECTED] and ask to be
manually removed.
VII. SPONSOR INFORMATION
-----------------------
This issue sponsored by: SPI Dynamics
ALERT: "How Hackers Launch Blind SQL Injection Attacks- New White Paper
The newest web app vulnerability? Blind SQL Injection!
Even if your web application does not return error messages, it may still
be open to a Blind SQL Injection Attack. Blind SQL Injection can deliver
total control of your server to a hacker giving them the ability to read,
write and manipulate all data stored in your backend systems! Download this
*FREE* white paper from SPI Dynamics for a complete guide to protection!
http://www.securityfocus.com/sponsor/SPIDynamics_ms-secnews_041020
------------------------------------------------------------------------
---------------------------------------------------------------------------
---------------------------------------------------------------------------
--- End Message ---