Focus on Microsoft
SecurityFocus Microsoft Newsletter #452 Sep 25 2009 05:32PM
Rob Keith (rkeith securityfocus com)
SecurityFocus Microsoft Newsletter #452
----------------------------------------

This issue is sponsored by Entrust

Entrust SSL Certificates - UCC certificates
Secure MS Exchange '07 - up to 10 host names included
Now from only $387/year

http://www.entrust.net/securityfocus-ucc

------------------------------------------------------------------
I. FRONT AND CENTER
1.Lazy Workers May Be Deemed Hackers
2.The Scale of Security
II. MICROSOFT VULNERABILITY SUMMARY
1. Code-Crafters Ability Mail Server IMAP FETCH Request Remote Denial Of Service Vulnerability
2. Apple iTunes '.pls' File Buffer Overflow Vulnerability
3. Snort Unified1 Output Remote Denial Of Service Vulnerability
4. HP ProCurve Identity Driven Manager (IDM) Unspecified Privilege Escalation Vulnerability
5. Adobe Shockwave Player ActiveX Control 'PlayerVersion' Property Remote Buffer Overflow
Vulnerability
6. Notepad++ 'C' and 'CPP' File Handling Remote Stack Buffer Overflow Vulnerability
7. Wireshark 1.2.1 Multiple Vulnerabilities
8. BRS WebWeaver 'Scripts' Security Bypass Vulnerability
9. FileCOPA FTP Server 'NOOP' Command Denial Of Service Vulnerability
10. Proland Protector Plus Insecure Program File Permissions Local Privilege Escalation
Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1.Lazy Workers May Be Deemed Hackers
By Mark Rasch
>From his office job at the Shelby City (Ohio) Wastewater Treatment plant, he was browsing adult Web sites, including one called Adult Friend Finder to meet women. When some of the women asked Wolf for nude pictures, he bought a digital camera, took pictures, and e-mailed them using his work computer.
http://www.securityfocus.com/columnists/504

2.The Scale of Security
By Adam O'Donnell
Human beings do not naturally understand scale. While we speak of financial transactions in the
hundreds of billions of dollars as being something as routine as brushing our teeth, we question the
value of programs that cost in the single-digit millions and quibble with friends over dollars.
Similarly, there are many problems in our industry that, when explained to an outsider, sound like
they should have been solved decades ago. It is only when we relate the number of systems that need
to be considered in the repair that we truly communicate the difficulty of the problem.
http://www.securityfocus.com/columnists/503

II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Code-Crafters Ability Mail Server IMAP FETCH Request Remote Denial Of Service Vulnerability
BugTraq ID: 36519
Remote: Yes
Date Published: 2009-09-25
Relevant URL: http://www.securityfocus.com/bid/36519
Summary:
Ability Mail Server is prone to a denial-of-service vulnerability because it fails to adequately
handle IMAP requests.

Attackers can exploit this issue to cause the affected application to crash, denying service to
legitimate users.

Versions prior to Ability Mail Server 2.70 are affected.

2. Apple iTunes '.pls' File Buffer Overflow Vulnerability
BugTraq ID: 36478
Remote: Yes
Date Published: 2009-09-22
Relevant URL: http://www.securityfocus.com/bid/36478
Summary:
Apple iTunes is prone to a buffer-overflow vulnerability because the software fails to bounds-check
user-supplied data before copying it into an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code within the context of the affected
application. Failed exploit attempts will result in a denial-of-service condition.

Versions prior to Apple iTunes 9.0.1 are vulnerable.

3. Snort Unified1 Output Remote Denial Of Service Vulnerability
BugTraq ID: 36473
Remote: Yes
Date Published: 2009-09-21
Relevant URL: http://www.securityfocus.com/bid/36473
Summary:
Snort is affected by a denial-of-service vulnerability because the application fails to properly
process unified1 output.

Attackers can leverage this issue by sending malformed network packets that will produce corrupted
logs and alerts, causing denial-of-service conditions.

Snort 2.8.1 through 2.8.4 are affected.

4. HP ProCurve Identity Driven Manager (IDM) Unspecified Privilege Escalation Vulnerability
BugTraq ID: 36462
Remote: No
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36462
Summary:
HP ProCurve Identity Driven Manager (IDM) is prone to an unspecified privilege-escalation scripting
vulnerability.

Few technical details are available at this time; we will update this BID as more information emerges.

HP ProCurve Identity Driven Manager (IDM) A.02.03 and A.03.00 running on Microsoft Windows 2003 with
Internet Authentication Service (IAS) or Microsoft Windows 2008 with Network Policy Server (NPS) are
vulnerable.

5. Adobe Shockwave Player ActiveX Control 'PlayerVersion' Property Remote Buffer Overflow Vulnerability
BugTraq ID: 36434
Remote: Yes
Date Published: 2009-09-16
Relevant URL: http://www.securityfocus.com/bid/36434
Summary:
Adobe Shockwave Player ActiveX control is prone to a remote buffer-overflow vulnerability because
the application fails to perform adequate boundary checks on user-supplied data.

Successful exploits allow remote attackers to execute arbitrary code in the context of the
application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely
result in denial-of-service conditions.

Shockwave Player 11.5.1.601 is vulnerable; other versions may also be affected.

6. Notepad++ 'C' and 'CPP' File Handling Remote Stack Buffer Overflow Vulnerability
BugTraq ID: 36426
Remote: Yes
Date Published: 2009-09-16
Relevant URL: http://www.securityfocus.com/bid/36426
Summary:
Notepad++ is prone to a stack-based buffer-overflow vulnerability because it fails to perform
adequate boundary checks on user-supplied input.

Attackers may leverage this issue to execute arbitrary code in the context of the application.
Failed attacks will cause denial-of-service conditions.

Notepad++ 5.4.5 is vulnerable; other versions may also be affected.

7. Wireshark 1.2.1 Multiple Vulnerabilities
BugTraq ID: 36408
Remote: Yes
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36408
Summary:
Wireshark is prone to multiple denial-of-service vulnerabilities.

Exploiting these issues may allow attackers to crash the application and deny service to legitimate
users.

These issues affect Wireshark 0.99.6 through 1.2.1.

8. BRS WebWeaver 'Scripts' Security Bypass Vulnerability
BugTraq ID: 36399
Remote: Yes
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36399
Summary:
BRS WebWeaver is prone to a security-bypass vulnerability because it fails to properly validate
user-supplied input.

Attackers can exploit this issue to access scripts or perform actions without proper authorization.

BRS WebWeaver 1.33 is vulnerable; other versions may also be affected.

9. FileCOPA FTP Server 'NOOP' Command Denial Of Service Vulnerability
BugTraq ID: 36397
Remote: Yes
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36397
Summary:
FileCOPA FTP Server is prone to a denial-of-service vulnerability.

A successful exploit may allow attackers to halt the server process, resulting in a
denial-of-service condition.

FileCOPA FTP Server 5.01 is vulnerable; other versions may also be affected.

10. Proland Protector Plus Insecure Program File Permissions Local Privilege Escalation Vulnerability
BugTraq ID: 36396
Remote: No
Date Published: 2009-09-15
Relevant URL: http://www.securityfocus.com/bid/36396
Summary:
Proland Protector Plus is prone to a local privilege-escalation vulnerability.

A local attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges,
resulting in a complete compromise of the affected computer.

The following versions are affected:

Protector Plus 2009 8.0.E03 for Windows Desktops
Protector Plus 2009 8.0.E03 for Windows Server
Protector Plus Professional 9.1.001

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe (at) securityfocus (dot) com [email concealed] from the
subscribed address. The contents of the subject or message body do not matter. You will receive a
confirmation request message to which you will have to answer. Alternatively you can also visit
http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin (at) securityfocus (dot) com [email concealed] and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by Entrust

Entrust SSL Certificates - UCC certificates
Secure MS Exchange '07 - up to 10 host names included
Now from only $387/year

http://www.entrust.net/securityfocus-ucc

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus