--- Begin Message ---
SecurityFocus Microsoft Newsletter #212
----------------------------------------

This Issue is Sponsored By: SecurityFocus

Stay up to date.  All the latest news, columns, jobs and more in a
convenient html newsletter - Even a glimpse of upcoming columns and feature
articles!  Sign up today!

http://www.securityfocus.com/htmlnewsletter/subscribe

------------------------------------------------------------------------
I. FRONT AND CENTER
     1. Issues Discovering Compromised Machines
     2. The Latest Tool in Competition: Hacking
II. MICROSOFT VULNERABILITY SUMMARY
     1. ARJ Software UNARJ Remote Directory Traversal Vulnerability
     2. CoolPHP Multiple Remote Input Validation Vulnerabilities
     3. Microsoft Outlook 2003 Security Policy Bypass Vulnerability
     4. Microsoft Outlook Express Plaintext Email Security Policy By...
     5. Best Software SalesLogix Multiple Remote Vulnerabilities
     6. IBM Lotus Domino Cross-Site Scripting and HTML Injection Vul...
     7. Cabextract Remote Directory Traversal Vulnerability
     8. Microsoft Internet Explorer Valid File Drag and Drop Embedde...
     9. Microsoft Internet Explorer HTML Help Control Local Zone Sec...
     10. Maxthon Web Browser Cross-Domain Dialog Box Spoofing Vulnera...
     11. Avant Browser Cross-Domain Dialog Box Spoofing Vulnerability
     12. Mozilla Browser Cross-Domain Tab Window Form Field Focus Vul...
     13. Opera Web Browser Cross-Domain Dialog Box Spoofing Vulnerabi...
     14. Maxthon Web Browser Cross-Domain Tab Window Form Field Focus...
     15. Avant Browser Cross-Domain Tab Window Form Field Focus Vulne...
     16. Akella Privateer's Bounty: Age of Sail II Remote Buffer Over...
     17. Gaim MSN SLP Remote Buffer Overflow Vulnerability
     18. Gaim MSN Remote File Transfer Denial Of Service Vulnerabilit...
     19. Gaim MSN Remote SLP Denial Of Service Vulnerability
     20. Zinf/Freeamp Unspecified Insecure Temporary File Creation Vu...
     21. Microsoft Windows XP WAV File Handler Denial Of Service Vuln...
     22. LibTIFF OJPEG Heap Buffer Overflow Vulnerability
     23. Code-Crafters Ability Server FTP STOR Argument Remote Buffer...
III. MICROSOFT FOCUS LIST SUMMARY
     NO NEW POSTS FOR THE WEEK 2004-10-19 to 2004-10-26.
IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
     1. Firewall RuleMaker
     2. CAT Cellular Authentication Token and eAuthentication Servic...
     3. KeyCaptor Keylogger
     4. SpyBuster
     5. FreezeX
     6. NeoExec for Active Directory
V. NEW TOOLS FOR MICROSOFT PLATFORMS
     1. antinat v0.81
     2. PopMessenger 1.60
     3. ByteShelter I 1.0
     4. DiskInternals Uneraser 2.01
     5. DiskInternals NTFS Reader 1.01
     6. Airscanner Mobile Firewall 1.0
VI. UNSUBSCRIBE INSTRUCTIONS
VII. SPONSOR INFORMATION

I. FRONT AND CENTER
-------------------
1. Issues Discovering Compromised Machines
By Anton Chuvakin

This article discusses the discovery of compromised machines in large
enterprise environments, and offers some suggestions on correlating NIDS
and HIPS logs to avoid false positives.

http://www.securityfocus.com/infocus/1808


2. The Latest Tool in Competition: Hacking
By Mark Rasch

A new federal case illustrates the role computer intrusion is taking in the
high-stakes world of niche Internet commerce.

http://www.securityfocus.com/columnists/273

II. MICROSOFT VULNERABILITY SUMMARY
-----------------------------------
1. ARJ Software UNARJ Remote Directory Traversal Vulnerability
BugTraq ID: 11436
Remote: Yes
Date Published: Oct 16 2004
Relevant URL: http://www.securityfocus.com/bid/11436
Summary:
Reportedly ARJ Software UNARJ is affected by a remote directory traversal 
vulnerability.  This issue is due to a failure of the application to properly 
sanitize or validate file names prior to compression or decompression.

This issue may allow an attacker to arbitrarily overwrite files with a user's 
privileges when a malicious compressed file is decompressed with the affected 
application.

2. CoolPHP Multiple Remote Input Validation Vulnerabilities
BugTraq ID: 11437
Remote: Yes
Date Published: Oct 16 2004
Relevant URL: http://www.securityfocus.com/bid/11437
Summary:
Reportedly CoolPHP is affected by multiple remote input validation 
vulnerabilities.  These issues are due to a failure of the application to 
properly sanitize user supplied input prior to using it to make critical 
actions.

An attacker can leverage these issues to steal cookie-based authentication 
credentials as well as carry out other malicious activities through cross-site 
scripting attacks.  An attacker can also leverage this issue to execute 
arbitrary server-side scripts using file include attacks.

3. Microsoft Outlook 2003 Security Policy Bypass Vulnerability
BugTraq ID: 11446
Remote: Yes
Date Published: Oct 18 2004
Relevant URL: http://www.securityfocus.com/bid/11446
Summary:
Microsoft Outlook 2003 is reported prone to a security policy bypass 
vulnerability.

It is reported that by including a base64 encoded image in an email and 
labeling that image in a sufficient manner, it is then possible to reference 
this base64 encoded image.

This will result in a policy bypass because the image will be automatically 
rendered when the email is viewed in Outlook 2003. Although this issue is 
reported to affect Outlook 2003, other mail transfer agents may also be 
affected.

4. Microsoft Outlook Express Plaintext Email Security Policy By...
BugTraq ID: 11447
Remote: Yes
Date Published: Oct 18 2004
Relevant URL: http://www.securityfocus.com/bid/11447
Summary:
Microsoft Outlook Express is reported prone to a security policy bypass 
vulnerability.

The vulnerability presents itself if an attached image file is referenced using 
a specially crafted CID URI.

This will result in a policy bypass because the image will be automatically 
rendered when the email is viewed in Outlook Express.

5. Best Software SalesLogix Multiple Remote Vulnerabilities
BugTraq ID: 11450
Remote: Yes
Date Published: Oct 18 2004
Relevant URL: http://www.securityfocus.com/bid/11450
Summary:
Best Software SalesLogix is affected by multiple vulnerabilities.  These issues 
are due to design errors that reveal sensitive information, access control 
validation issues that allow unauthorized access and input validation issues 
facilitating SQL injection attacks.

An attacker may leverage these issues to manipulate and disclose database 
contents through SQL injection attacks, steal authentication credentials due to 
information disclosure vulnerabilities and bypass authentication to gain 
administrator access to the server.

6. IBM Lotus Domino Cross-Site Scripting and HTML Injection Vul...
BugTraq ID: 11458
Remote: Yes
Date Published: Oct 18 2004
Relevant URL: http://www.securityfocus.com/bid/11458
Summary:
It is reported that Lotus Domino is susceptible to a cross-site scripting and 
an HTML injection vulnerability. These issues are due to a failure of the 
application to properly sanitize user-supplied input.

The cross-site scripting issue could permit a remote attacker to create a 
malicious URI link that includes hostile HTML and script code. If this link 
were to be followed, the hostile code may be rendered in the web browser of the 
victim user. This would occur in the security context of the affected web site 
and may allow for theft of cookie-based authentication credentials or other 
attacks.

The HTML injection issue may allow an attacker to inject malicious HTML and 
script code into the application. An unsuspecting user viewing a page that 
contains the malicious comment will have the attacker-supplied script code 
executed within their browser in the context of the vulnerable site. This issue 
may be leveraged to steal cookie based authentication credentials. Other 
attacks are also possible.

7. Cabextract Remote Directory Traversal Vulnerability
BugTraq ID: 11460
Remote: Yes
Date Published: Oct 19 2004
Relevant URL: http://www.securityfocus.com/bid/11460
Summary:
cabextract is reported prone to a remote directory traversal vulnerability.  
This issue presents itself due to insufficient sanitization of user-supplied 
data.

An attacker may exploit this issue to corrupt or manipulate sensitive data.  
This may aid in further attacks against a computer.

cabextract versions 1.0 and prior are reported prone to this issue.

8. Microsoft Internet Explorer Valid File Drag and Drop Embedde...
BugTraq ID: 11466
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11466
Summary:
The Microsoft cumulative Internet Explorer patch (MS04-038) attempted to limit 
what files may be dragged and dropped onto the local computer from the Internet 
Zone to prevent executable objects from being placed on the file system in this 
manner.  However, a number of file types are still permitted for drag and drop 
operations.  It is has demonstrated that it is possible to embed hostile HTML 
and script code in one of these file types, remove the file extension and then 
allow the operating system to dynamically determine the file type based on its 
contents.

If this issue were combined with other vulnerabilities, such as that described 
in BID 11467, it may result in execution of arbitrary code on the client 
computer.

9. Microsoft Internet Explorer HTML Help Control Local Zone Sec...
BugTraq ID: 11467
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11467
Summary:
Microsoft Windows XP SP2 and Internet Explorer 6 SP2 have included enhanced 
Local Zone security restrictions to prevent various exploits that have depended 
on the previous relaxed security settings associated with this Security Zone.  
A proof-of-concept has been released demonstrating that it is possible to 
bypass these restrictions through the use of the 'hhctrl.ocx' HTML ActiveX 
control.

If the attacker is able to place malicious HTML/scripting content on the system 
through another vulnerability, such as BID 11466, then this control could be 
exploited to bypass Local Zone security restrictions that would normally 
prevent the content from being executed.  The proof-of-concept also employs 
various ADODB methods such as ADODB.Connection and ADODB.recordset to write 
malicious arbitrary code to the file system, in the form of an .HTA file.

10. Maxthon Web Browser Cross-Domain Dialog Box Spoofing Vulnera...
BugTraq ID: 11470
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11470
Summary:
Maxthon web browser is reported prone to a cross-domain dialog box spoofing 
vulnerability.  This issue may allow a remote attacker to carry out phishing 
style attacks as an attacker may exploit this vulnerability to spoof the 
interface of a trusted web site.

11. Avant Browser Cross-Domain Dialog Box Spoofing Vulnerability
BugTraq ID: 11472
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11472
Summary:
Avant Browser is reported prone to a cross-domain dialog box spoofing 
vulnerability.  This issue may allow a remote attacker to carry out phishing 
style attacks as an attacker may exploit this vulnerability to spoof an 
interface of a trusted web site.

12. Mozilla Browser Cross-Domain Tab Window Form Field Focus Vul...
BugTraq ID: 11474
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11474
Summary:
A cross-domain tab window form field focus vulnerability reportedly affects 
Mozilla browser and all browsers derived from it.  This issue is due to an 
access validation error that allows a web page to gain access to form fields in 
other web pages rendered in different tabs of the same browser window.

This issue may be leveraged to facilitate convincing phishing style attacks 
designed to reveal sensitive information such as passwords and financial 
details.

13. Opera Web Browser Cross-Domain Dialog Box Spoofing Vulnerabi...
BugTraq ID: 11475
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11475
Summary:
Opera is reported prone to a cross-domain dialog box spoofing vulnerability.  
This issue may allow a remote attacker to carry out phishing style attacks as 
an attacker may exploit this vulnerability to spoof an interface of a trusted 
web site.

Opera version 7.54 is reported susceptible to this issue, but other versions 
may also be affected.

14. Maxthon Web Browser Cross-Domain Tab Window Form Field Focus...
BugTraq ID: 11476
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11476
Summary:
A cross-domain tab window form field focus vulnerability reportedly affects the 
Maxthon Web browser.  This issue is due to an access validation error that 
allows a web page to gain access to form fields in other web pages rendered in 
different tabs of the same browser window.

This issue may be leveraged to facilitate convincing phishing style attacks 
designed to reveal sensitive information such as passwords and financial 
details.

15. Avant Browser Cross-Domain Tab Window Form Field Focus Vulne...
BugTraq ID: 11478
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11478
Summary:
A cross-domain tab window form field focus vulnerability reportedly affects 
Avant Browser.  This issue is due to an access validation error that allows a 
web page to gain access to form fields in other web pages rendered in different 
tabs of the same browser window.

This issue may be leveraged to facilitate convincing phishing style attacks 
designed to reveal sensitive information such as passwords and financial 
details.

16. Akella Privateer's Bounty: Age of Sail II Remote Buffer Over...
BugTraq ID: 11479
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11479
Summary:
Akella Privateer's Bounty: Age of Sail II is reportedly affected by a remote 
buffer overflow vulnerability.  This issue is due to a failure of the 
application to do sufficient bounds checking on user-supplied input.

An attacker can leverage this issue to execute arbitrary code on an affected 
computer with the privileges of a user running a vulnerable version of the game.

17. Gaim MSN SLP Remote Buffer Overflow Vulnerability
BugTraq ID: 11482
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11482
Summary:
Gaim is reportedly affected by a remote buffer overflow vulnerability in its 
MSN SLP message functionality of gaim.  This issue is due to a failure of the 
application to verify buffer bounds when copying user-supplied input.

An attacker can leverage this issue to execute arbitrary code on an affected 
computer with the privileges of the user that executed the vulnerable 
application.

18. Gaim MSN Remote File Transfer Denial Of Service Vulnerabilit...
BugTraq ID: 11483
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11483
Summary:
Gaim is affected by a remote MSN file transfer denial of service vulnerability. 
 This issue is due to a failure of the application to properly handle 
exceptional conditions.

An attacker may leverage this issue to cause an affected client to crash, 
denying service to legitimate users.

19. Gaim MSN Remote SLP Denial Of Service Vulnerability
BugTraq ID: 11484
Remote: Yes
Date Published: Oct 20 2004
Relevant URL: http://www.securityfocus.com/bid/11484
Summary:
Gaim is affected by a remote MSN SLP denial of service vulnerability.  This 
issue is due to a failure of the application to properly handle exceptional 
conditions.

An attacker may leverage this issue to cause an affected client to crash, 
denying service to legitimate users.

20. Zinf/Freeamp Unspecified Insecure Temporary File Creation Vu...
BugTraq ID: 11490
Remote: No
Date Published: Oct 21 2004
Relevant URL: http://www.securityfocus.com/bid/11490
Summary:
Zinf/Freeamp are affected by an unspecified insecure temporary file creation 
vulnerability.  This issue is likely due to a design error that causes the 
application to fail to verify the existence of a file before writing to it.

An attacker may leverage this issue to overwrite arbitrary files with the 
privileges of an unsuspecting user that activates the vulnerable application.

21. Microsoft Windows XP WAV File Handler Denial Of Service Vuln...
BugTraq ID: 11503
Remote: Yes
Date Published: Oct 22 2004
Relevant URL: http://www.securityfocus.com/bid/11503
Summary:
Microsoft Windows XP is reported prone to a denial of service vulnerability. 
The issue exists due to a lack of sufficient sanitization performed on WAV file 
header values before they are processed.

If an exploit attempt is successful, the Windows Explorer process will begin to 
consume CPU resources. An attacker may exploit this vulnerability to deny 
service to legitimate users.

22. LibTIFF OJPEG Heap Buffer Overflow Vulnerability
BugTraq ID: 11506
Remote: Yes
Date Published: Oct 22 2004
Relevant URL: http://www.securityfocus.com/bid/11506
Summary:
LibTIFF is affected by a heap buffer overflow vulnerability. This issue is due 
to a failure of the application to properly perform boundary checks prior to 
copying user-supplied strings into finite process buffers.

An attacker may leverage this issue to execute arbitrary code on a vulnerable 
computer with the privileges of the user running the vulnerable application, 
facilitating unauthorized access.  This issue may also be leveraged to cause an 
affected application to crash.

23. Code-Crafters Ability Server FTP STOR Argument Remote Buffer...
BugTraq ID: 11508
Remote: Yes
Date Published: Oct 22 2004
Relevant URL: http://www.securityfocus.com/bid/11508
Summary:
Ability Server is reported prone to a remote buffer overflow vulnerability.  
This issue affects the FTP component of the application and arises due to 
insufficient boundary checks performed by the FTP server.

A successful attack can result in memory corruption leading to a crash, 
however, if an attacker is able to overwrite sensitive memory addresses, they 
could execute code on a computer.  Arbitrary code execution occurs in the 
context of the FTP process and may result in unauthorized access to the 
vulnerable computer.

Ability Server versions 2.34 and prior were identified to be vulnerable to this 
issue.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
NO NEW POSTS FOR THE WEEK 2004-10-19 to 2004-10-26.

IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
----------------------------------------
1. Firewall RuleMaker
By: The Net Memetic Pte Ltd
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://firewall.rulemaker.net
Summary:

Firewall RuleMaker is a Windows-based firewall configuration version control 
software product for managers of Cisco PIX and Netscreen firewalls.

2. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, UNIX, 
Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:

Low cost, easy to use Two Factor Authentication One Time Password token using 
the Cellular. Does not use SMS or communication, manages multiple OTP accounts 
- new technology. For any business that want a safer access to its Internet 
Services. More information at our site.

We also provide eAuthentication service for businesses that will not buy an 
Authentication product but would prefer to pay a monthly charge for 
authentication services from our our CAT Server.

3. KeyCaptor Keylogger
By: Keylogger Software
Platforms: MacOS, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keylogger-software.com/keylogger/keylogger.htm
Summary:

KeyCaptor is your solution for recording ALL keystrokes of ALL users on your 
computer!  Now you have the power to record emails, websites, documents, chats, 
instant messages, usernames, passwords, and MUCH MORE!

With our advanced stealth technology, KeyCaptor will not show in your processes 
list and cannot be stopped from running unless you say so!

4. SpyBuster
By: Remove Spyware
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.remove-spyware.com/spybuster.htm
Summary:

Our award winning spyware / adware scanner and removal software, SpyBuster will 
scan your computer for over 4,000 known spyware and adware applications. 
SpyBuster protects your computer from data stealing programs that can expose 
your personal information.

SpyBuster scanning technology allows for a quick and easy sweep, so you can 
resume your work in minutes.

5. FreezeX
By: Faronics Technologies USA Inc
Platforms: Windows 2000, Windows 95/98, Windows XP
Relevant URL: http://www.faronics.com/html/Freezex.asp
Summary:

FreezeX prevents all unauthorized programs, including viruses, keyloggers and 
spy ware from executing. Powerful and secure, FreezeX ensures that any new 
executable, program, or application that is downloaded, introduced via 
removable media or the network will never install

6. NeoExec for Active Directory
By: NeoValens
Platforms: Windows 2000, Windows XP
Relevant URL: http://www.neovalens.com
Summary:

NeoExec® is an operating system extension for Windows 2000/XP that allows the 
setting of privileges at the application level rather than at the user level.

NeoExec® is the ideal solution for applications that require elevated 
privileges to run as the privileges are granted to the application, not the 
user.

NeoExec® is the only solution on the market capable of modifying at runtime the 
processes' security context -- without requiring a second account as with RunAs 
and RunAs-derived products.

V. NEW TOOLS FOR MICROSOFT PLATFORMS
------------------------------------
1. antinat v0.81
By: Malcolm Smith
Relevant URL: http://yallara.cs.rmit.edu.au/~malsmith/products/antinat/
Platforms: MacOS, POSIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

The Antinat SOCKS Server is a multi-threaded, scalable SOCKS server with a 
client library for writing proxy-based applications. It supports SOCKS 4, SOCKS 
5, authentication, firewalling, UDP, and name resolution.

2. PopMessenger 1.60
By: LeadMind Development
Relevant URL: http://www.leadmind.com
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

Chat and send text messages and files to anyone on your LAN easily and securely!

3. ByteShelter I 1.0
By: MazZoft NDA
Relevant URL: http://www.mazzoft.com/bs1.zip
Platforms: Windows 2000, Windows 95/98
Summary:

This steganography tools lets you conceal data in Outlook e-mail messages and 
.doc files.

4. DiskInternals Uneraser 2.01
By: Alexey Babenko
Relevant URL: http://diskinternals.com/download/Uneraser_Setup.zip
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

DiskInternals Uneraser can recover any deleted file, including documents, 
photos, mp3 and zip files, or even folders and damaged disks. In addition to 
HDD, the program supports any type of storage media (music sticks, cameras, 
flash drives, USB drives, etc)! It works with encrypted files and helps you 
undelete file lost because of a virus attack or an employee's malicious 
behavior. No special skills needed; 100% free to try.

5. DiskInternals NTFS Reader 1.01
By: Alexey Babenko
Relevant URL: http://diskinternals.com/download/NTFS_Reader_Setup.zip
Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
Summary:

Provides read access to NTFS disks from Windows 95, 98 and Me. Allows you to 
save any files to any disk visible on the system or on the network. Supports 
saving compressed or encrypted files.

While saving, it ignores file security policies. It means that it is possible 
to access absolutely any file on a NTFS disk from Windows 9x.

6. Airscanner Mobile Firewall 1.0
By: Airscanner Corp
Relevant URL: http://www.airscanner.com/downloads/fw/amfw.exe
Platforms: Windows CE
Summary:

A Full-Strength Personal Firewall for Your Windows Mobile/Pocket PC handheld.

Airscanner Mobile Firewall for Windows Mobile Pocket PC is a low-level, 
bi-directional, packet filtering firewall that examines all incoming and 
outgoing TCP/IP traffic.

This personal firewall ensures that data is permitted based on access control 
lists that you select from a set of predefined filters, or from filters that 
you create yourself.

The firewall parses packets as they come in (or go out)

VI. UNSUBSCRIBE INSTRUCTIONS
----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed 
address. The contents of the subject or message body do not matter. You will 
receive a confirmation request message to which you will have to answer. 
Alternatively you can also visit http://www.securityfocus.com/newsletters and 
unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be 
manually removed.

VII. SPONSOR INFORMATION
-----------------------

This Issue is Sponsored By: SecurityFocus

Stay up to date.  All the latest news, columns, jobs and more in a
convenient html newsletter - Even a glimpse of upcoming columns and feature
articles!  Sign up today!

http://www.securityfocus.com/htmlnewsletter/subscribe

------------------------------------------------------------------------

---------------------------------------------------------------------------
---------------------------------------------------------------------------



--- End Message ---

Responder a