Focus on Microsoft
SecurityFocus Microsoft Newsletter #442 May 04 2009 03:07PM
Rob Keith (rkeith securityfocus com)
SecurityFocus Microsoft Newsletter #442
----------------------------------------

This issue is sponsored by Thawte

Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their application. By making use of
an SSL certificate on your web server, you can securely collect sensitive information online, and
increase business by giving your customers confidence that their transactions are safe.

http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a
17f194

SECURITY BLOGS
SecurityFocus has selected a few syndicated sources that stand out as conveying topics of interest
for our community. We are proud to offer content from Matasano at this time and will be adding more
in the coming weeks.
http://www.securityfocus.com/blogs

------------------------------------------------------------------
I. FRONT AND CENTER
1. Projecting Borders into Cyberspace
2. Celebrity Viruses Improve Security
II. MICROSOFT VULNERABILITY SUMMARY
1. Mercury Audio Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
2. McAfee Products RAR/ZIP Files Scan Evasion Vulnerability
3. Baby Web Server URL File Disclosure Vulnerability
4. Symantec WinFax Pro 'DCCFAXVW.DLL' Heap Buffer Overflow Vulnerability
5. Multiple Trend Micro Products RAR/ZIP/CAB Files Scan Evasion Vulnerability
6. Pablo Software Solutions Quick 'n Easy Web Server Directory Traversal Vulnerability
7. DWebPro Directory Traversal Vulnerability and Arbitrary File Disclosure Vulnerability
8. SDP Downloader 'ASX' File Heap Buffer Overflow Vulnerability
9. Popcorn POP3 Response Remote Heap Buffer Overflow Vulnerability
10. Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
11. Symantec Norton Ghost 'EasySetupInt.dll' ActiveX Multiple Remote Denial of Service
Vulnerabilities
12. Acritum Femitter Server Remote File Disclosure Vulnerability
13. Xitami HTTP Server Multiple Socket HEAD Request Remote Denial Of Service Vulnerability
14. Sun Java Runtime Environment Unspecified Remote Code Execution Vulnerability
15. Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability
16. Groovy Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
17. 1by1 '.m3u' File Remote Stack Buffer Overflow Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. SecurityFocus Microsoft Newsletter #441
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Projecting Borders into Cyberspace
By Jeffrey Carr
Two recent stories of significant cyber attacks come close to blaming the Chinese for the intrusions
but stop short.
http://www.securityfocus.com/columnists/500

2. Celebrity Viruses Improve Security
By Adam O'Donnell
Every so often, a computer virus becomes more than just a novelty for anti-virus researchers and
moves into the consciousness of the mass media, even if it's not a grave threat.
http://www.securityfocus.com/columnists/499

II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Mercury Audio Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34788
Remote: Yes
Date Published: 2009-04-30
Relevant URL: http://www.securityfocus.com/bid/34788
Summary:
Mercury Audio Player is prone to a remote stack-based buffer-overflow vulnerability because the
application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application.
Failed attacks will cause denial-of-service conditions.

Mercury Audio Player 1.21 is vulnerable; other versions may also be affected.

2. McAfee Products RAR/ZIP Files Scan Evasion Vulnerability
BugTraq ID: 34780
Remote: Yes
Date Published: 2009-04-30
Relevant URL: http://www.securityfocus.com/bid/34780
Summary:
Multiple McAfee products are prone to a vulnerability that may allow certain compressed archives to
bypass the scan engine.

Successful exploits will allow attackers to distribute files containing malicious code that the
antivirus application will fail to detect.

The issue affects all McAfee software that uses DAT files.

3. Baby Web Server URL File Disclosure Vulnerability
BugTraq ID: 34772
Remote: Yes
Date Published: 2009-04-29
Relevant URL: http://www.securityfocus.com/bid/34772
Summary:
Baby Web Server is prone to a vulnerability that lets attackers obtain potentially sensitive
information because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to download arbitrary files with the privileges of the webserver
process. Information obtained may aid in further attacks.

Baby Web Server 2.7.2 is vulnerable; other versions may also be affected.

4. Symantec WinFax Pro 'DCCFAXVW.DLL' Heap Buffer Overflow Vulnerability
BugTraq ID: 34766
Remote: Yes
Date Published: 2009-04-29
Relevant URL: http://www.securityfocus.com/bid/34766
Summary:
Symantec WinFax Pro ActiveX control is prone to a heap-based buffer-overflow vulnerability because
the application fails to perform adequate boundary checks on user-supplied input.

An attacker can exploit this issue to execute arbitrary code in the context of the application using
the ActiveX control (typically Internet Explorer). Failed attacks will likely cause
denial-of-service conditions.

Symantec WinFax Pro 10.03 is vulnerable; other versions may also be affected.

5. Multiple Trend Micro Products RAR/ZIP/CAB Files Scan Evasion Vulnerability
BugTraq ID: 34763
Remote: Yes
Date Published: 2009-04-29
Relevant URL: http://www.securityfocus.com/bid/34763
Summary:
Multiple Trend Micro products are prone to a vulnerability that may allow certain compressed
archives to bypass the scan engine.

Successful exploits will allow attackers to distribute files containing malicious code that the
antivirus application will fail to detect.

ServerProtect for Microsoft Windows/Novell NetWare
ServerProtect for EMC Celerra
ServerProtect for NetApp
ServerProtect for Linux
ServerProtect for Network Appliance Filers
Internet Security Pro Internet Security
OfficeScan Component
Worry Free Business Security - Standard
Worry Free Business Security - Advanced
Worry Free Business Security Hosted
Housecall
InterScan Web Security Suite
InterScan Web Protect for ISA
InterScan Messaging Security Appliance
Neatsuite Advanced
ScanMail for Exchange
ScanMail for Domino Suites

6. Pablo Software Solutions Quick 'n Easy Web Server Directory Traversal Vulnerability
BugTraq ID: 34758
Remote: Yes
Date Published: 2009-04-28
Relevant URL: http://www.securityfocus.com/bid/34758
Summary:
Quick 'n Easy Web Server is prone to a directory-traversal vulnerability.

An attacker can exploit this issue to obtain sensitive information that may lead to other attacks.

Quick 'n Easy Web Server 3.3.5 is vulnerable; other versions may also be affected.

7. DWebPro Directory Traversal Vulnerability and Arbitrary File Disclosure Vulnerability
BugTraq ID: 34721
Remote: Yes
Date Published: 2009-04-27
Relevant URL: http://www.securityfocus.com/bid/34721
Summary:
DWebPro is prone to a directory-traversal vulnerability and a vulnerability that allows attackers to
view arbitrary files.

An attacker can exploit these issues to obtain sensitive information that may lead to other attacks.

DWebPro 6.8.26 is vulnerable; other versions may also be affected.

8. SDP Downloader 'ASX' File Heap Buffer Overflow Vulnerability
BugTraq ID: 34712
Remote: Yes
Date Published: 2009-04-24
Relevant URL: http://www.securityfocus.com/bid/34712
Summary:
SDP Downloader is prone to a heap-based buffer-overflow vulnerability because the application fails
to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

Attackers can execute arbitrary code in the context of the affected application. Failed exploit
attempts will result in a denial-of-service condition.

SDP Downloader 2.3.0 is vulnerable; other versions may also be affected.

9. Popcorn POP3 Response Remote Heap Buffer Overflow Vulnerability
BugTraq ID: 34699
Remote: Yes
Date Published: 2009-04-23
Relevant URL: http://www.securityfocus.com/bid/34699
Summary:
Popcorn is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly
sanitize user-supplied input.

An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable
application. Failed exploit attempts will likely result in a denial-of-service condition.

Popcorn 1.87 is vulnerable; other versions may also be affected.

10. Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
BugTraq ID: 34698
Remote: Yes
Date Published: 2009-04-23
Relevant URL: http://www.securityfocus.com/bid/34698
Summary:
Home Web Server is prone to a denial-of-service vulnerability because it fails to adequately handle
malformed HTTP requests.

Attackers can exploit this issue to cause the server's graphical interface to stop responding,
denying service to the administrator.

Home Web Server 1.7.1.147 is vulnerable; other versions may also be affected.

11. Symantec Norton Ghost 'EasySetupInt.dll' ActiveX Multiple Remote Denial of Service Vulnerabilities
BugTraq ID: 34696
Remote: Yes
Date Published: 2009-04-23
Relevant URL: http://www.securityfocus.com/bid/34696
Summary:
Symantec Norton Ghost EasySetup Wizard ActiveX control is prone to multiple denial-of-service
vulnerabilities.

A successful attack allows an attacker to crash the application using the affected control
(typically Internet Explorer), causing denial-of-service conditions. The attacker may also be able
to run arbitrary code, but this has not been confirmed.

These issues are reported to affect 'EasySetupInt.dll' 14.0.4.30167; other versions may also be
affected.

12. Acritum Femitter Server Remote File Disclosure Vulnerability
BugTraq ID: 34689
Remote: Yes
Date Published: 2009-04-22
Relevant URL: http://www.securityfocus.com/bid/34689
Summary:
Acritum Femitter Server is prone to a remote file-disclosure vulnerability because it fails to
properly sanitize user-supplied input.

An attacker can exploit this vulnerability to view local files in the context of the server process.
This may aid in further attacks.

Acritum Femitter Server 0.96 and 1.03 are affected; other versions may be vulnerable as well.

13. Xitami HTTP Server Multiple Socket HEAD Request Remote Denial Of Service Vulnerability
BugTraq ID: 34681
Remote: Yes
Date Published: 2009-04-22
Relevant URL: http://www.securityfocus.com/bid/34681
Summary:
Xitami HTTP server is prone to a denial-of-service vulnerability because it fails to adequately
handle multiple socket requests.

Attackers can exploit this issue to crash the affected application, denying service to legitimate
users.

Xitami 5.0a0 (Alpha 0) is vulnerable.

14. Sun Java Runtime Environment Unspecified Remote Code Execution Vulnerability
BugTraq ID: 34667
Remote: Yes
Date Published: 2009-04-22
Relevant URL: http://www.securityfocus.com/bid/34667
Summary:
Sun Java Runtime Environment (JRE) is prone to an unspecified security vulnerability that allows
attackers to execute arbitrary code.

Attackers can exploit this issue to execute arbitrary code in the context of the application,

JRE 6 Update 1 and 2 are vulnerable.

15. Zervit HTTP Server Malformed URI Remote Denial Of Service Vulnerability
BugTraq ID: 34637
Remote: Yes
Date Published: 2009-04-21
Relevant URL: http://www.securityfocus.com/bid/34637
Summary:
Zervit HTTP server is prone to a denial-of-service vulnerability because it fails to adequately
sanitize user-supplied input.

Attackers can exploit this issue to crash the affected application, denying service to legitimate
users.

Zervit 0.3 is vulnerable; other versions may also be affected.

16. Groovy Media Player '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34621
Remote: Yes
Date Published: 2009-04-20
Relevant URL: http://www.securityfocus.com/bid/34621
Summary:
Groovy Media Player is prone to a remote stack-based buffer-overflow vulnerability because the
application fails to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application.
Failed attacks will cause denial-of-service conditions.

Groovy Media Player 1.1.0 is vulnerable; other versions may also be affected.

17. 1by1 '.m3u' File Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 34618
Remote: Yes
Date Published: 2009-04-20
Relevant URL: http://www.securityfocus.com/bid/34618
Summary:
The '1by1' program is prone to a remote stack-based buffer-overflow vulnerability because it fails
to perform adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application.
Failed attacks will cause denial-of-service conditions.

This issue affects 1by1 1.67; other versions may also be affected.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #441
http://www.securityfocus.com/archive/88/503001

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe (at) securityfocus (dot) com [email concealed] from the
subscribed address. The contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively you can also visit
http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Thawte

Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their application. By making use of
an SSL certificate on your web server, you can securely collect sensitive information online, and
increase business by giving your customers confidence that their transactions are safe.

http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a
17f194

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus