[prev in list] [next in list] [prev in thread] [next in thread] 

List:       focus-ms
Subject:    SecurityFocus Microsoft Newsletter #394
From:       Rob Keith <rkeith () securityfocus ! com>
Date:       2008-05-13 21:51:50
Message-ID: 482A0D76.3080808 () securityfocus ! com
[Download RAW message or body]

SecurityFocus Microsoft Newsletter #394

----------------------------------------

This issue is sponsored by Industry Brains

FREE SECURITY AUDIT RESOURCES
Take a Risk Assessment, get White Papers on the Latest Threats, listen to Malware \
Expert Webcasts. http://newsletter.industrybrains.com/c?fe;1;766c3;210a3;4cc;0;da4


SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying \
topics of interest for our community. We are proud to offer content from Matasano at \
this time and will be adding more in the coming weeks. \
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Click Crime
       2. Just Who's Being Exploited?
II.  MICROSOFT VULNERABILITY SUMMARY
       1. Jenkins Software RakNet Autopatcher Multiple Unspecified SQL Injection \
                Vulnerabilities
       2. Microsoft Windows Intelligent Input/Output (I2O) Multiple Local Privilege \
                Escalation Vulnerabilities
       3. Microsoft Publisher Memory Object Handler Data Remote Code Execution \
                Vulnerability
       4. Microsoft Windows CE JPEG And GIF Processing Multiple Arbitrary Code \
Execution Vulnerabilities  5. Zarafa Multiple Remote Vulnerabilities
       6. Microsoft Outlook Web Access 'no-store' HTTP Directive Information \
                Disclosure Weakness
       7. Microsoft Internet Explorer 'DisableCachingOfSSLPages' Security Weakness
       8. Apache HTTP Server 403 Error Cross-Site Scripting Vulnerability
       9. Microsoft May 2008 Advance Notification Multiple Vulnerabilities
       10. Microsoft Word CSS Handling Memory Corruption Remote Code Execution \
                Vulnerability
       11. Microsoft Word RTF Malformed String Handling Memory Corruption Remote Code \
                Execution Vulnerability
       12. Microsoft Malware Protection Engine Disk Space Exhaustion Remote Denial Of \
                Service Vulnerability
       13. Microsoft Malware Protection Engine File Processing Remote Denial Of \
Service Vulnerability III. MICROSOFT FOCUS LIST SUMMARY
       1. XP Hardening
       2. SecurityFocus Microsoft Newsletter #393
       3. Binding Windows Services to Specific Addresses Only
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Click Crime
By Mark Rasch
It has long been a crime not only to commit an illegal act, but also to attempt -- or \
conspire with others -- to commit one.  http://www.securityfocus.com/columnists/471

2.Just Who's Being Exploited?
By Jamie Reid
Last month's revelation that Tipping Point paid out a prize of $10,000 and a new \
laptop (MSRP: about $2000) at the CanSecWest conference, for the privilege of being \
the exclusive licensor of a heretofore unpublished vulnerability in Apple's Safari \
web browser to researcher, Charles Miller of Independent Security Evaluators, may \
lend some credence to this adage. http://www.securityfocus.com/columnists/470


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Jenkins Software RakNet Autopatcher Multiple Unspecified SQL Injection \
Vulnerabilities BugTraq ID: 29178
Remote: Yes
Date Published: 2008-05-12
Relevant URL: http://www.securityfocus.com/bid/29178
Summary:
RakNet Autopatcher is prone to multiple SQL-injection vulnerabilities because it \
fails to sufficiently sanitize user-supplied data before using it in SQL queries.

Exploiting these issues could allow an attacker to compromise the application, access \
or modify data, or exploit latent vulnerabilities in the underlying database.

Versions prior to RakNet 3.23 are vulnerable.

2. Microsoft Windows Intelligent Input/Output (I2O) Multiple Local Privilege \
Escalation Vulnerabilities BugTraq ID: 29171
Remote: No
Date Published: 2008-05-12
Relevant URL: http://www.securityfocus.com/bid/29171
Summary:
Microsoft Windows is prone to multiple local privilege-escalation vulnerabilities.  

An attacker can exploit these issues to execute arbitrary code with kernel-level \
privileges. Successfully exploiting these issues will completely compromise affected \
computers.

These issues affect Windows XP prior to SP3.

3. Microsoft Publisher Memory Object Handler Data Remote Code Execution Vulnerability
BugTraq ID: 29158
Remote: Yes
Date Published: 2008-05-13
Relevant URL: http://www.securityfocus.com/bid/29158
Summary:
Microsoft Publisher is prone to a remote code-execution vulnerability.

An attacker could exploit this issue by enticing a victim to open a malicious \
Publisher file. 

Successfully exploiting this issue would allow the attacker to execute arbitrary code \
in the context of the currently logged-in user.

4. Microsoft Windows CE JPEG And GIF Processing Multiple Arbitrary Code Execution \
Vulnerabilities BugTraq ID: 29147
Remote: Yes
Date Published: 2008-05-09
Relevant URL: http://www.securityfocus.com/bid/29147
Summary:
Microsoft Windows CE is prone to multiple vulnerabilities that allow attackers to \
execute arbitrary code. The issues stem from unspecified errors.

An attacker can exploit these issues to execute arbitrary code within the context of \
the affected components. Failed exploit attempts will likely result in \
denial-of-service conditions.

5. Zarafa Multiple Remote Vulnerabilities
BugTraq ID: 29122
Remote: Yes
Date Published: 2008-05-09
Relevant URL: http://www.securityfocus.com/bid/29122
Summary:
Zarafa is prone to multiple remote HTML-injection vulnerabilities and \
denial-of-service vulnerabilities.

An attacker can exploit these issues to crash the affected application, execute \
arbitrary HTML and script code within the context of the affected website, \
potentially steal cookie-based authentication credentials, or control how the site is \
rendered to the user; other attacks are also possible.

These issues affect versions prior to Zarafa Script 6.02.

6. Microsoft Outlook Web Access 'no-store' HTTP Directive Information Disclosure \
Weakness BugTraq ID: 29121
Remote: No
Date Published: 2008-05-09
Relevant URL: http://www.securityfocus.com/bid/29121
Summary:
Microsoft Outlook Web Access is prone to a weakness that may allow sensitive \
information to be unintentionally stored on the local computer.

To exploit this issue, an attacker would need to exploit another vulnerability. \
Specifically, the attacker would need to be able to read the victim's cache.

7. Microsoft Internet Explorer 'DisableCachingOfSSLPages' Security Weakness
BugTraq ID: 29120
Remote: No
Date Published: 2008-05-09
Relevant URL: http://www.securityfocus.com/bid/29120
Summary:
Microsoft Internet Explorer is prone to a weakness that may allow attackers to \
extract potentially sensitive information.

Attackers with local access to a computer may exploit this issue to obtain \
potentially sensitive information from cached SSL-enabled web pages. Information \
obtained may aid in further attacks.

This issue affects Internet Explorer 7.

8. Apache HTTP Server 403 Error Cross-Site Scripting Vulnerability
BugTraq ID: 29112
Remote: Yes
Date Published: 2008-05-08
Relevant URL: http://www.securityfocus.com/bid/29112
Summary:
Apache HTTP server is prone to a cross-site scripting vulnerability because the \
application fails to sufficiently sanitize user-supplied input. 

 An attacker may leverage this issue to execute arbitrary script code in the browser \
of an unsuspecting user in the context of the affected site. This may let the \
attacker steal cookie-based authentication credentials and launch other attacks.

UPDATE: Additional reports indicate that the default error page has the Content-Type \
set, rendering it not vulnerable. 

NOTE: Reportedly, Microsoft Internet Explorer fails to properly follow RFC-2616 and \
uses content-sniffing to interpret UTF-7 data received in HTTP responses. After \
further analysis, we may rewrite this BID to be Internet Explorer-specific.

9. Microsoft May 2008 Advance Notification Multiple Vulnerabilities
BugTraq ID: 29108
Remote: Yes
Date Published: 2008-05-08
Relevant URL: http://www.securityfocus.com/bid/29108
Summary:
Microsoft has released advance notification that the vendor will be releasing four \
security bulletins on May 13, 2008. The highest severity rating for these issues is \
'Critical'.

Successfully exploiting these issues may allow remote or local attackers to \
compromise affected computers.

Individual records will be created to document these vulnerabilities when the \
bulletins are released.

10. Microsoft Word CSS Handling Memory Corruption Remote Code Execution Vulnerability
BugTraq ID: 29105
Remote: Yes
Date Published: 2008-05-13
Relevant URL: http://www.securityfocus.com/bid/29105
Summary:
Microsoft Word is prone to a remote code-execution vulnerability.

An attacker could exploit this issue by enticing a victim to open a malicious Word \
file. 

Successfully exploiting this issue would allow the attacker to execute arbitrary code \
in the context of the currently logged-in user.

11. Microsoft Word RTF Malformed String Handling Memory Corruption Remote Code \
Execution Vulnerability BugTraq ID: 29104
Remote: Yes
Date Published: 2008-05-13
Relevant URL: http://www.securityfocus.com/bid/29104
Summary:
Microsoft Word is prone to a remote code-execution vulnerability.

An attacker could exploit this issue by enticing a victim to open a malicious RTF \
file. 

Successfully exploiting this issue would allow the attacker to execute arbitrary code \
in the context of the currently logged-in user.

12. Microsoft Malware Protection Engine Disk Space Exhaustion Remote Denial Of \
Service Vulnerability BugTraq ID: 29073
Remote: Yes
Date Published: 2008-05-13
Relevant URL: http://www.securityfocus.com/bid/29073
Summary:
Microsoft Malware Protection Engine is prone to a remote denial-of-service \
vulnerability because it fails to properly validate certain data structures when \
parsing specially crafted files.

Attackers can exploit this issue to cause an affected computer to stop responding or \
to restart. Successful attacks will deny service to legitimate users.

13. Microsoft Malware Protection Engine File Processing Remote Denial Of Service \
Vulnerability BugTraq ID: 29060
Remote: Yes
Date Published: 2008-05-13
Relevant URL: http://www.securityfocus.com/bid/29060
Summary:
Microsoft Malware Protection Engine is prone to a remote denial-of-service \
vulnerability because it fails to properly validate user-supplied input when parsing \
specially crafted files.

Attackers can exploit this issue to cause an affected computer to stop responding or \
to restart. Successful attacks will deny service to legitimate users.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. XP Hardening
http://www.securityfocus.com/archive/88/492001

2. SecurityFocus Microsoft Newsletter #393
http://www.securityfocus.com/archive/88/491763

3. Binding Windows Services to Specific Addresses Only
http://www.securityfocus.com/archive/88/491595

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe@securityfocus.com \
from the subscribed address. The contents of the subject or message body do not \
matter. You will receive a confirmation request message to which you will have to \
answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and \
unsubscribe via the website.

If your email address has changed email listadmin@securityfocus.com and ask to be \
manually removed.

V.   SPONSOR INFORMATION
------------------------
This issue is sponsored by Industry Brains

FREE SECURITY AUDIT RESOURCES
Take a Risk Assessment, get White Papers on the Latest Threats, listen to Malware \
Expert Webcasts. http://newsletter.industrybrains.com/c?fe;1;766c3;210a3;4cc;0;da4


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic