Focus on Microsoft
SecurityFocus Microsoft Newsletter #369 Nov 20 2007 10:53PM
rkeith securityfocus com

SecurityFocus Microsoft Newsletter #369
----------------------------------------

This issue is Sponsored by: Insight24

Are There Holes in Your Network? View this on-demand webcast hosted by Dr. Chenxi Wang,
Principal Analyst, Security & Risk Management, Forrester Research, as she discusses the steps you can follow
to ensure your network isn't vulnerable. She will also outline key metrics organizations can use to measure the
maturity of their vulnerability management programs. Click on the link below to view this on-demand webcast today!
http://showcase.insight24.com/?ForresterSecurityMicrosoft

SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest for our community. We are proud to offer content from Matasano at this time and will be adding more in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1.Aye, Robot, or Can Computers Contract?
2.Don't blame the IDS
II. MICROSOFT VULNERABILITY SUMMARY
1. SMF Private Forum Messages Information Disclosure Vulnerability
2. Microsoft Windows 2000 Insecure Random Number Generator Information Disclosure Weakness
3. Microsoft Jet DataBase Engine MDB File Parsing Remote Buffer Overflow Vulnerability
4. Citrix Presentation Server Remote Unauthorized Code Execution Vulnerability
5. IBM DB2 Multiple Privilege Escalation Vulnerabilities
6. Apple QuickTime Movie Atom Remote Stack Buffer Overflow Vulnerability
7. WebEx GPCContainer Memory Access Violation Multiple Denial of Service Vulnerabilities
8. Microsoft Forms 2.0 ActiveX Control Memory Access Violation Denial of Service Vulnerabilities
9. Microsoft Office Web Component Memory Access Violation Denial of Service Vulnerability
10. Microsoft Windows Recursive DNS Spoofing Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Setting up IPSEC with servers in and out of a domain
2. Security and Implications of Hosted Exchange
3. SecurityFocus Microsoft Newsletter #368
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.Aye, Robot, or Can Computers Contract?
By Mark Rasch
A contract is usually described as a "meeting of the minds." One person makes an offer for goods or services; another person sees the offer and negotiates terms; the parties enter into an agreement of the offer; and some form of consideration is given in return for the provision of something of value. At least that's what I remember from first year law school contracts class.
http://www.securityfocus.com/columnists/458

2.Don't blame the IDS
By Don Parker
Some years ago, I remember reading a press release from the Gartner Group. It was about intrusion detection systems (IDS) offering little return for the monetary investment in them and furthermore, that this very same security technology would be obsolete by the year 2005. A rather bold statement and an even bolder prediction on their part.
http://www.securityfocus.com/columnists/457

II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. SMF Private Forum Messages Information Disclosure Vulnerability
BugTraq ID: 26508
Remote: Yes
Date Published: 2007-11-20
Relevant URL: http://www.securityfocus.com/bid/26508
Summary:
SMF is prone to an information-disclosure vulnerability.

An attacker can exploit this issue to access sensitive information that may lead to further attacks.

SMF 1.1.4 is vulnerable; other versions may also be affected.

2. Microsoft Windows 2000 Insecure Random Number Generator Information Disclosure Weakness
BugTraq ID: 26495
Remote: No
Date Published: 2007-11-19
Relevant URL: http://www.securityfocus.com/bid/26495
Summary:
Microsoft Windows 2000 is prone to an information-disclosure weakness.

An attacker can exploit this issue to weaken encryption and other security-related algorithms, which may aid in further attacks.

3. Microsoft Jet DataBase Engine MDB File Parsing Remote Buffer Overflow Vulnerability
BugTraq ID: 26468
Remote: Yes
Date Published: 2007-11-16
Relevant URL: http://www.securityfocus.com/bid/26468
Summary:
Microsoft Jet DataBase Engine is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data.

Remote attackers can exploit this issue to execute arbitrary machine code in the context of a user running the application. Successful exploits will compromise the affected application and possibly the underlying computer. Failed attacks will likely cause denial-of-service conditions.

4. Citrix Presentation Server Remote Unauthorized Code Execution Vulnerability
BugTraq ID: 26451
Remote: Yes
Date Published: 2007-11-15
Relevant URL: http://www.securityfocus.com/bid/26451
Summary:
Citrix Presentation Server is prone to a vulnerability that may allow remote attackers to execute unauthorized code on the server in the context of the authorized user. The issue stems from a design error.

The issue affects the following applications:

Access Essentials 1.0
Citrix Access Essentials 1.5
Citrix Access Essentials 2.0
Citrix MetaFrame Presentation Server 3.0 for Microsoft Windows 2000
Citrix MetaFrame Presentation Server 3.0 for Microsoft Windows 2003
Citrix Presentation Server 4.0 for Microsoft Windows 2000
Citrix Presentation Server 4.0 for Microsoft Windows 2003
Citrix Presentation Server 4.0 x64 Edition
Citrix Presentation Server 4.5 for Windows Server 2003
Citrix Presentation Server 4.5 for Windows Server 2003 Feature Pack 1
Citrix Presentation Server 4.5 for Windows Server 2003 x64 Edition

5. IBM DB2 Multiple Privilege Escalation Vulnerabilities
BugTraq ID: 26450
Remote: Yes
Date Published: 2007-11-14
Relevant URL: http://www.securityfocus.com/bid/26450
Summary:
IBM DB2 is prone to multiple privilege-escalation vulnerabilities.

Attackers can exploit these issues to gain elevated privileges.

Very few details are available regarding these issues. We will update this BID as more information emerges.

This issue affects IBM DB2 9.1 and IBM DB2 9.1 with fix pack 1, 2, 3, and 3a.

6. Apple QuickTime Movie Atom Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 26443
Remote: Yes
Date Published: 2007-11-14
Relevant URL: http://www.securityfocus.com/bid/26443
Summary:
Apple QuickTime is prone to a stack-based buffer-overflow issue because it fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue by enticing an unsuspecting user to open a specially crafted movie file.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.

This issue affects Apple QuickTime running on Microsoft Windows Vista, Microsoft Windows XP SP2, and Mac OS X.

7. WebEx GPCContainer Memory Access Violation Multiple Denial of Service Vulnerabilities
BugTraq ID: 26430
Remote: Yes
Date Published: 2007-11-13
Relevant URL: http://www.securityfocus.com/bid/26430
Summary:
WebEx is prone to multiple remote denial-of-service vulnerabilities.

Attackers can exploit these issues to crash applications that use the ActiveX control, denying service to legitimate users.

8. Microsoft Forms 2.0 ActiveX Control Memory Access Violation Denial of Service Vulnerabilities
BugTraq ID: 26414
Remote: Yes
Date Published: 2007-11-12
Relevant URL: http://www.securityfocus.com/bid/26414
Summary:
Microsoft Forms 2.0 ActiveX Control is prone to multiple memory-access violation denial-of-service vulnerabilities.

Attackers can exploit these issues to crash Internet Explorer and deny service to legitimate users.

Note: Forms 2.0 ActiveX is distributed with any application that includes Visual Basic for Applications 5.0.

9. Microsoft Office Web Component Memory Access Violation Denial of Service Vulnerability
BugTraq ID: 26405
Remote: Yes
Date Published: 2007-11-12
Relevant URL: http://www.securityfocus.com/bid/26405
Summary:
Microsoft Office Web Component is prone to a denial-of-service vulnerability because of a memory access violation.

Attackers can exploit this issue to crash Internet Explorer and deny service to legitimate users.

This issue affects OWC11 for Microsoft Office 2003.

10. Microsoft Windows Recursive DNS Spoofing Vulnerability
BugTraq ID: 25919
Remote: Yes
Date Published: 2007-11-13
Relevant URL: http://www.securityfocus.com/bid/25919
Summary:
Microsoft Windows DNS Server is prone to a vulnerability that permits an attacker to spoof responses to DNS requests.

A successful attack will corrupt the DNS cache with attacker-specified content. This may aid in further attacks such as phishing.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Setting up IPSEC with servers in and out of a domain
http://www.securityfocus.com/archive/88/483912

2. Security and Implications of Hosted Exchange
http://www.securityfocus.com/archive/88/483800

3. SecurityFocus Microsoft Newsletter #368
http://www.securityfocus.com/archive/88/483725

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe (at) securityfocus (dot) com [email concealed] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is Sponsored by: Insight24

Are There Holes in Your Network? View this on-demand webcast hosted by Dr. Chenxi Wang,
Principal Analyst, Security & Risk Management, Forrester Research, as she discusses the steps you can follow
to ensure your network isn't vulnerable. She will also outline key metrics organizations can use to measure the
maturity of their vulnerability management programs. Click on the link below to view this on-demand webcast today!
http://showcase.insight24.com/?ForresterSecurityMicrosoft

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus