SecurityFocus Microsoft Newsletter #213

From: Marc Fossi (mfossi_at_securityfocus.com)
Date: 11/03/04

  • Next message: Llistes Diverses: "root_drv.sys rootkit"
    Date: Wed, 3 Nov 2004 08:21:41 -0700 (MST)
    To: Focus-MS <focus-ms@securityfocus.com>
    
    

    SecurityFocus Microsoft Newsletter #213
    ----------------------------------------

    This Issue is Sponsored By: SecurityFocus

    Stay up to date. All the latest news, columns, jobs and more in a
    convenient html newsletter - Even a glimpse of upcoming columns and feature
    articles! Sign up today!

    http://www.securityfocus.com/htmlnewsletter/subscribe

    ------------------------------------------------------------------------
    I. FRONT AND CENTER
         1. Trends in Web Application Security
         2. Phishing For Savvy Users
    II. MICROSOFT VULNERABILITY SUMMARY
         1. Microsoft Internet Explorer Malformed HTML Null Pointer Dere...
         2. Mozilla Bugzilla Multiple Authentication Bypass and Informat...
         3. OpenWFE Remote Cross-Site Scripting And Connection Proxy Vul...
         4. Microsoft Internet Explorer Malformed IFRAME Remote Buffer O...
         5. NetCaptor Cross-Domain Dialog Box Spoofing Vulnerability
         6. NetCaptor Cross-Domain Tab Window Form Field Focus Vulnerabi...
         7. Microsoft Internet Explorer HHCtrl ActiveX Control Cross-Dom...
         8. Mozilla Temporary File Insecure Permissions Information Disc...
         9. GD Graphics Library Remote Integer Overflow Vulnerability
         10. PostNuke Trojan Horse Vulnerability
         11. Slim Browser Cross-Domain Tab Window Form Field Focus Vulner...
         12. Slim Browser Cross-Domain Dialog Box Spoofing Vulnerability
         13. Tabs Laboratories MailCarrier Remote SMTP EHLO/HELO Buffer O...
         14. Microsoft Internet Explorer Font Tag Denial Of Service Vulne...
         15. Novell ZENworks System Tray Local Privilege Escalation Vulne...
         16. Hummingbird Connectivity INETD32 Privilege Escalation Vulner...
         17. Google Desktop Search Remote Cross-Site Scripting Vulnerabil...
         18. Hummingbird Connectivity FTP Server Denial Of Service Vulner...
         19. PHPList Multiple unspecified Vulnerabilities
         20. PuTTY Remote SSH2_MSG_DEBUG Buffer Overflow Vulnerability
         21. Quicksilver Master of Orion III Multiple Remote Denial of Se...
         22. Apple QuickTime Remote Integer Overflow Vulnerability
         23. RealNetworks RealOne Player/RealPlayer Skin File Remote Stac...
         24. Multiple Vendor Content Filtering Bypass Vulnerabilities
         25. Microsoft Internet Explorer TABLE Status Bar URI Obfuscation...
         26. Global Spy Software Cyber Web Filter IP Filter Bypass Vulner...
    III. MICROSOFT FOCUS LIST SUMMARY
         1. 802.1x Authentication (Thread)
         2. GPO that forces users to use a proxy server. (Thread)
         3. Remove "Shutdown" command from w2k PCs but enable re... (Thread)
         4. Notifying users of password expiration via e-mail` (Thread)
         5. RE: Can we really block users from installing applic... (Thread)
         6. SecurityFocus Microsoft Newsletter #212 (Thread)
    IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
         1. CAT Cellular Authentication Token and eAuthentication Servic...
         2. KeyCaptor Keylogger
         3. SpyBuster
         4. FreezeX
         5. NeoExec for Active Directory
         6. Secrets Protector v2.03
    V. NEW TOOLS FOR MICROSOFT PLATFORMS
         1. WapgGuihttp://workspaces.gotdotnet.com/wapggui 1.0
         2. antinat v0.81
         3. PopMessenger 1.60
         4. ByteShelter I 1.0
         5. DiskInternals Uneraser 2.01
         6. DiskInternals NTFS Reader 1.01
    VI. UNSUBSCRIBE INSTRUCTIONS
    VII. SPONSOR INFORMATION

    I. FRONT AND CENTER
    -------------------
    1. Trends in Web Application Security
    By Kapil Raina

    This article discusses current trends in penetration testing for web
    application security, and in particular discusses a framework for selecting
    the best tool or tools to use for these increasingly common type of
    application.

    http://www.securityfocus.com/infocus/1809

    2. Phishing For Savvy Users
    By Scott Granneman

    Recent "phishing" episodes are still often overlooked by tech-savvy users,
    but a lesson in history shows how entire nations have been fooled.

    http://www.securityfocus.com/columnists/274

    II. MICROSOFT VULNERABILITY SUMMARY
    -----------------------------------
    1. Microsoft Internet Explorer Malformed HTML Null Pointer Dere...
    BugTraq ID: 11510
    Remote: Yes
    Date Published: Oct 23 2004
    Relevant URL: http://www.securityfocus.com/bid/11510
    Summary:
    Microsoft Internet Explorer is prone to a vulnerability that may permit malformed HTML to crash the browser. The source of the crash is reportedly a null pointer dereference.

    2. Mozilla Bugzilla Multiple Authentication Bypass and Informat...
    BugTraq ID: 11511
    Remote: Yes
    Date Published: Oct 25 2004
    Relevant URL: http://www.securityfocus.com/bid/11511
    Summary:
    Mozilla Bugzilla is affected by multiple authentication bypass and information disclosure vulnerabilities. These issues are due to a failure of the application to properly validate access permissions of a user prior to revealing or altering information.

    An attacker can leverage these issues to disclose bug details that are marked private as well as edit bug reports without requiring authorization.

    3. OpenWFE Remote Cross-Site Scripting And Connection Proxy Vul...
    BugTraq ID: 11514
    Remote: Yes
    Date Published: Oct 25 2004
    Relevant URL: http://www.securityfocus.com/bid/11514
    Summary:
    OpenWFE is affected by a cross-site scripting and connection proxy vulnerability. These issues are due to a failure of the application to properly sanitize user-supplied input.

    An attacker may leverage the cross-site scripting issue to steal cookie-based authentication credentials as well as carry out other attacks by executing client-based script code in an unsuspecting user's browser. An attacker may leverage the connection proxy issue to scan arbitrary network computers anonymously, facilitating further attacks.

    4. Microsoft Internet Explorer Malformed IFRAME Remote Buffer O...
    BugTraq ID: 11515
    Remote: Yes
    Date Published: Oct 24 2004
    Relevant URL: http://www.securityfocus.com/bid/11515
    Summary:
    Microsoft Internet Explorer is reported prone to a remote buffer overflow vulnerability. This issue presents itself due to insufficient boundary checks performed by the application and results in a denial of service condition. Arbitrary code execution may be possible as well.

    This issue is reported to affect Microsoft Internet Explorer 6 running on a Windows 2000 SP4 platform.

    5. NetCaptor Cross-Domain Dialog Box Spoofing Vulnerability
    BugTraq ID: 11519
    Remote: Yes
    Date Published: Oct 25 2004
    Relevant URL: http://www.securityfocus.com/bid/11519
    Summary:
    NetCaptor is reported prone to a cross-domain dialog box spoofing vulnerability. This issue may allow a remote attacker to carry out phishing style attacks as an attacker may exploit this vulnerability to spoof an interface of a trusted web site.

    6. NetCaptor Cross-Domain Tab Window Form Field Focus Vulnerabi...
    BugTraq ID: 11520
    Remote: Yes
    Date Published: Oct 25 2004
    Relevant URL: http://www.securityfocus.com/bid/11520
    Summary:
    A cross-domain tab window form field focus vulnerability reportedly affects NetCaptor. This issue is due to an access validation error that allows a web page to gain access to form fields in other web pages rendered in different tabs of the same browser window.

    This issue may be leveraged to facilitate convincing phishing style attacks designed to reveal sensitive information such as passwords and financial details.

    7. Microsoft Internet Explorer HHCtrl ActiveX Control Cross-Dom...
    BugTraq ID: 11521
    Remote: Yes
    Date Published: Oct 25 2004
    Relevant URL: http://www.securityfocus.com/bid/11521
    Summary:
    Microsoft Internet Explorer is reported prone to a cross-domain scripting vulnerability.

    The vulnerability is reported in the 'hhctrl' Internet Explorer ActiveX control and could allow an attacker to influence Internet Explorer into running script in the context of a foreign domain.

    8. Mozilla Temporary File Insecure Permissions Information Disc...
    BugTraq ID: 11522
    Remote: No
    Date Published: Oct 25 2004
    Relevant URL: http://www.securityfocus.com/bid/11522
    Summary:
    Mozilla, Mozilla Firefox, and Mozilla Thunderbird are all reported susceptible to an information disclosure vulnerability. This issue is due to a failure of the applications to properly ensure secure file permissions on temporary files located in world-accessible locations.

    This vulnerability allows local attackers to gain access to the contents of potentially sensitive files. This may aid them in further attacks.

    9. GD Graphics Library Remote Integer Overflow Vulnerability
    BugTraq ID: 11523
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11523
    Summary:
    The GD Graphics Library (gdlib) is affected by an integer overflow that facilitates a heap overflow. This issue is due to a failure of the library to do proper sanity checking on size values contained within image format files.

    An attacker may leverage this issue to manipulate process heap memory, potentially leading to code execution and compromise of the computer running the affected library.

    10. PostNuke Trojan Horse Vulnerability
    BugTraq ID: 11529
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11529
    Summary:
    It is reported that the server hosting PostNuke, www.postnuke.com, was compromised recently. Additionally, it is reported that the attacker modified the download address of the archive 'PostNuke-0.750.zip'. The new download location contained a trojaned version of the PostNuke archive.

    It is reported that users that downloaded the PostNuke archive between Sunday the 24th of Oct 2004 at 23:50 GMT and Tuesday the 26th of Oct 2004 at 8:30 GMT are likely to be affected by this vulnerability.

    11. Slim Browser Cross-Domain Tab Window Form Field Focus Vulner...
    BugTraq ID: 11530
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11530
    Summary:
    A cross-domain tab window form field focus vulnerability reportedly affects Slim Browser. This issue is due to an access validation error that allows a web page to gain access to form fields in other web pages rendered in different tabs of the same browser window.

    This issue may be leveraged to facilitate convincing phishing style attacks designed to reveal sensitive information such as passwords and financial details.

    12. Slim Browser Cross-Domain Dialog Box Spoofing Vulnerability
    BugTraq ID: 11532
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11532
    Summary:
    Slim Browser is reported prone to a cross-domain dialog box spoofing vulnerability. This issue may allow a remote attacker to carry out phishing style attacks as an attacker may exploit this vulnerability to spoof an interface of a trusted web site.

    13. Tabs Laboratories MailCarrier Remote SMTP EHLO/HELO Buffer O...
    BugTraq ID: 11535
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11535
    Summary:
    Tabs Laboratories MailCarrier is affected by a remote SMTP EHLO/HELO buffer overflow vulnerability. This issue is due to a failure of the application to perform adequate bounds checking on network messages prior to copying them into process buffers.

    A remote attacker may leverage this issue to execute arbitrary code on a computer running the affected software. This will facilitate unauthorized access and privilege escalation.

    14. Microsoft Internet Explorer Font Tag Denial Of Service Vulne...
    BugTraq ID: 11536
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11536
    Summary:
    Microsoft Internet Explorer is reported prone to a remote denial of service vulnerability.

    The issue presents itself due to a malfunction that occurs when certain font tags are encountered and rendered.

    When a page that contains the malicious HTML code is viewed, Internet Explorer and all instances of Internet Explorer that are spawned from the instance used to view the malicious page, will crash.

    15. Novell ZENworks System Tray Local Privilege Escalation Vulne...
    BugTraq ID: 11537
    Remote: No
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11537
    Summary:
    It is reported that ZENworks for Desktops contains a local privilege escalation vulnerability.

    This vulnerability allows users with local interactive access to execute arbitrary application with administrative privileges.

    Version 4.0.1 of the application is reported to be vulnerable to this issue.

    16. Hummingbird Connectivity INETD32 Privilege Escalation Vulner...
    BugTraq ID: 11539
    Remote: No
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11539
    Summary:
    Hummingbird Connectivity is reported prone to a privilege escalation vulnerability in its inetd32 application.

    This vulnerability allows users with local interactive access to execute arbitrary applications with administrative privileges.

    Version 7.1 and 9.0 are reported vulnerable to this issue. Other versions are also likely affected.

    17. Google Desktop Search Remote Cross-Site Scripting Vulnerabil...
    BugTraq ID: 11541
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11541
    Summary:
    Google Desktop Search is reportedly affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize HTML tag content.

    An attacker may leverage this issue to execute arbitrary client-side script code in an unsuspecting user's browser, facilitating theft of cookie-based authentication credentials and other attacks.

    18. Hummingbird Connectivity FTP Server Denial Of Service Vulner...
    BugTraq ID: 11542
    Remote: Yes
    Date Published: Oct 26 2004
    Relevant URL: http://www.securityfocus.com/bid/11542
    Summary:
    Hummingbird Connectivity is reported prone to a denial of service vulnerability in its FTP server application.

    This vulnerability allows remote attackers to crash the affected application, denying service to legitimate users.

    Version 7.1 and 9.0 are reported vulnerable to this issue. Other versions are also likely affected.

    19. PHPList Multiple unspecified Vulnerabilities
    BugTraq ID: 11545
    Remote: Yes
    Date Published: Oct 27 2004
    Relevant URL: http://www.securityfocus.com/bid/11545
    Summary:
    PHPList is affected by multiple unspecified vulnerabilities. The underlying cause for these issues is currently unknown, however due to the nature of the application it is likely that they are due to input validation issues.

    The impact of these issues is currently unknown, although due to the nature of the application they may facilitate unauthorized administrator access to the affected application. This is not confirmed.

    20. PuTTY Remote SSH2_MSG_DEBUG Buffer Overflow Vulnerability
    BugTraq ID: 11549
    Remote: Yes
    Date Published: Oct 27 2004
    Relevant URL: http://www.securityfocus.com/bid/11549
    Summary:
    A remote SSH2_MSG_DEBUG buffer overflow vulnerability affects PuTTY. This issue is due to insufficient bounds checking on network data prior to copying the data into process buffers.

    An attacker may leverage this issue to execute arbitrary code on a computer running the affected software with the privileges of the user that activated it, facilitating unauthorized access.

    21. Quicksilver Master of Orion III Multiple Remote Denial of Se...
    BugTraq ID: 11550
    Remote: Yes
    Date Published: Oct 27 2004
    Relevant URL: http://www.securityfocus.com/bid/11550
    Summary:
    Master of Orion III is reported prone to multiple remote denial of service vulnerabilities. These issues occur because the application does not handle exceptional conditions in a proper manner.

    Master of Orion III 1.2.5 and prior versions are reportedly affected by these issues.

    22. Apple QuickTime Remote Integer Overflow Vulnerability
    BugTraq ID: 11553
    Remote: Yes
    Date Published: Oct 27 2004
    Relevant URL: http://www.securityfocus.com/bid/11553
    Summary:
    A remote integer overflow vulnerability affects Apple QuickTime for the Microsoft Windows platform. This issue is due to a failure of the application to properly validate integer signed-ness prior to using it to carry out critical operations.

    An attacker may leverage this issue to cause the affected QuickTime client to crash, denying service to legitimate users. It has been speculated that this issue may also facilitate code execution; any code execution would occur with the privileges of the user that activated the affected software.

    23. RealNetworks RealOne Player/RealPlayer Skin File Remote Stac...
    BugTraq ID: 11555
    Remote: Yes
    Date Published: Oct 27 2004
    Relevant URL: http://www.securityfocus.com/bid/11555
    Summary:
    RealNetworks RealPlayer and RealOne Player are reported prone to a remote stack based buffer overflow vulnerability.

    It is reported that the buffer overflow exists due to a lack of boundary checks performed on filenames contained in skin file archives.

    A remote attacker may exploit this vulnerability to execute arbitrary instructions in the context of a user that visits a malicious website, or that applies a malicious skin file manually.

    24. Multiple Vendor Content Filtering Bypass Vulnerabilities
    BugTraq ID: 11558
    Remote: Yes
    Date Published: Oct 28 2004
    Relevant URL: http://www.securityfocus.com/bid/11558
    Summary:
    It has been reported that several products are vulnerable to content filtering bypass issues.

    These issues could allow a web client to access disallowed content from behind an affected product. Bypassing the content filter could potentially allow malicious code to be executed on a client system thought to be protected.

    Checkpoint VPN-1 and Firewall-1 and Agnitum Outpost Pro have been confirmed vulnerable to some or all of these issues. Other products are likely vulnerable.

    25. Microsoft Internet Explorer TABLE Status Bar URI Obfuscation...
    BugTraq ID: 11561
    Remote: Yes
    Date Published: Oct 28 2004
    Relevant URL: http://www.securityfocus.com/bid/11561
    Summary:
    Microsoft Internet Explorer is reported prone to a URI obfuscation weakness.

    This issue may be leveraged by an attacker to display false information in the status bar of an unsuspecting user, allowing an attacker to present web pages to users that seem to originate from a trusted location.

    This vulnerability is reported to affect Internet Explorer 6, other versions might also be affected.

    Update: A report regarding this issue has been disclosed specifying that Internet Explorer version 6.0.2900.2180 may not be affected, or may be affected in a different manner. Symantec has confirmed that version 6.0.2800.1106 of Internet Explorer is vulnerable to this weakness.

    NOTE: It has been reported that this issue does not affect Internet Explorer for Apple Mac OS X.

    Update: Internet Explorer version 6.0.2900.2180 running on Windows XP SP2 is reportedly not vulnerable to this issue.

    26. Global Spy Software Cyber Web Filter IP Filter Bypass Vulner...
    BugTraq ID: 11562
    Remote: Yes
    Date Published: Oct 29 2004
    Relevant URL: http://www.securityfocus.com/bid/11562
    Summary:
    Global Spy Software Cyber Web Filter is affected by an IP filter bypass vulnerability. This issue is due to a failure of the application to properly handle exceptional HTTP requests.

    An attacker may leverage this issue to bypass filters based on IP addresses, allowing an attacker to visit restricted Web sites.

    III. MICROSOFT FOCUS LIST SUMMARY
    ---------------------------------
    1. 802.1x Authentication (Thread)
    Relevant URL:

    http://www.securityfocus.com/archive/88/380143

    2. GPO that forces users to use a proxy server. (Thread)
    Relevant URL:

    http://www.securityfocus.com/archive/88/380142

    3. Remove "Shutdown" command from w2k PCs but enable re... (Thread)
    Relevant URL:

    http://www.securityfocus.com/archive/88/380140

    4. Notifying users of password expiration via e-mail` (Thread)
    Relevant URL:

    http://www.securityfocus.com/archive/88/379796

    5. RE: Can we really block users from installing applic... (Thread)
    Relevant URL:

    http://www.securityfocus.com/archive/88/379731

    6. SecurityFocus Microsoft Newsletter #212 (Thread)
    Relevant URL:

    http://www.securityfocus.com/archive/88/379696

    IV. NEW PRODUCTS FOR MICROSOFT PLATFORMS
    ----------------------------------------
    1. CAT Cellular Authentication Token and eAuthentication Servic...
    By: Mega AS Consulting Ltd
    Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris, UNIX, Windows 2000, Windows NT
    Relevant URL: http://www.megaas.co.nz
    Summary:

    Low cost, easy to use Two Factor Authentication One Time Password token using the Cellular. Does not use SMS or communication, manages multiple OTP accounts - new technology. For any business that want a safer access to its Internet Services. More information at our site.

    We also provide eAuthentication service for businesses that will not buy an Authentication product but would prefer to pay a monthly charge for authentication services from our our CAT Server.

    2. KeyCaptor Keylogger
    By: Keylogger Software
    Platforms: MacOS, Windows 2000, Windows 95/98, Windows NT, Windows XP
    Relevant URL: http://www.keylogger-software.com/keylogger/keylogger.htm
    Summary:

    KeyCaptor is your solution for recording ALL keystrokes of ALL users on your computer! Now you have the power to record emails, websites, documents, chats, instant messages, usernames, passwords, and MUCH MORE!

    With our advanced stealth technology, KeyCaptor will not show in your processes list and cannot be stopped from running unless you say so!

    3. SpyBuster
    By: Remove Spyware
    Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
    Relevant URL: http://www.remove-spyware.com/spybuster.htm
    Summary:

    Our award winning spyware / adware scanner and removal software, SpyBuster will scan your computer for over 4,000 known spyware and adware applications. SpyBuster protects your computer from data stealing programs that can expose your personal information.

    SpyBuster scanning technology allows for a quick and easy sweep, so you can resume your work in minutes.

    4. FreezeX
    By: Faronics Technologies USA Inc
    Platforms: Windows 2000, Windows 95/98, Windows XP
    Relevant URL: http://www.faronics.com/html/Freezex.asp
    Summary:

    FreezeX prevents all unauthorized programs, including viruses, keyloggers and spy ware from executing. Powerful and secure, FreezeX ensures that any new executable, program, or application that is downloaded, introduced via removable media or the network will never install

    5. NeoExec for Active Directory
    By: NeoValens
    Platforms: Windows 2000, Windows XP
    Relevant URL: http://www.neovalens.com
    Summary:

    NeoExec® is an operating system extension for Windows 2000/XP that allows the setting of privileges at the application level rather than at the user level.

    NeoExec® is the ideal solution for applications that require elevated privileges to run as the privileges are granted to the application, not the user.

    NeoExec® is the only solution on the market capable of modifying at runtime the processes' security context -- without requiring a second account as with RunAs and RunAs-derived products.

    6. Secrets Protector v2.03
    By: E-CRONIS
    Platforms: Windows 2000, Windows XP
    Relevant URL: http://www.e-cronis.com/download/sp.exe
    Summary:

    It's the end of your worries about top-secret data of your company, your confidential files or the pictures from the last party. All these will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. It is the ultimate security tool to protect your sensitive information on PC, meeting the three most important security issues: Integrity, Confidentiality and Availability. This product gives you the features of a "folder locker" and a "secure eraser".

    Your secret information is available only trough this software and there is no other mean to access it. The information is protected at file system level and it cannot be accidentally deleted or overwritten neither in Safe mode nor in other operating system. This program doesn't make your operating system unstable as other related product do and protects your information from being seen, altered or deleted by an unauthorized user with or without his wish. The program allows you to permanently erase your sensitive data using secure wiping methods leaving no trace of your information. Depending on the selected wiping method your data is unrecoverable using software or even hardware recovery techniques.

    V. NEW TOOLS FOR MICROSOFT PLATFORMS
    ------------------------------------
    1. WapgGuihttp://workspaces.gotdotnet.com/wapggui 1.0
    By: William D. Bartholomew
    Relevant URL: http://workspaces.gotdotnet.com/wapggui
    Platforms: Windows 2000, Windows XP
    Summary:

    A free, open-source, user-friendly interface to run the WAPG password generator. Supports generation of random and pronounceable passwords, specifying minimum and maximum length, specifying what character classes should or must be used, and much more.

    2. antinat v0.81
    By: Malcolm Smith
    Relevant URL: http://yallara.cs.rmit.edu.au/~malsmith/products/antinat/
    Platforms: MacOS, POSIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
    Summary:

    The Antinat SOCKS Server is a multi-threaded, scalable SOCKS server with a client library for writing proxy-based applications. It supports SOCKS 4, SOCKS 5, authentication, firewalling, UDP, and name resolution.

    3. PopMessenger 1.60
    By: LeadMind Development
    Relevant URL: http://www.leadmind.com
    Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
    Summary:

    Chat and send text messages and files to anyone on your LAN easily and securely!

    4. ByteShelter I 1.0
    By: MazZoft NDA
    Relevant URL: http://www.mazzoft.com/bs1.zip
    Platforms: Windows 2000, Windows 95/98
    Summary:

    This steganography tools lets you conceal data in Outlook e-mail messages and .doc files.

    5. DiskInternals Uneraser 2.01
    By: Alexey Babenko
    Relevant URL: http://diskinternals.com/download/Uneraser_Setup.zip
    Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
    Summary:

    DiskInternals Uneraser can recover any deleted file, including documents, photos, mp3 and zip files, or even folders and damaged disks. In addition to HDD, the program supports any type of storage media (music sticks, cameras, flash drives, USB drives, etc)! It works with encrypted files and helps you undelete file lost because of a virus attack or an employee's malicious behavior. No special skills needed; 100% free to try.

    6. DiskInternals NTFS Reader 1.01
    By: Alexey Babenko
    Relevant URL: http://diskinternals.com/download/NTFS_Reader_Setup.zip
    Platforms: Windows 2000, Windows 95/98, Windows NT, Windows XP
    Summary:

    Provides read access to NTFS disks from Windows 95, 98 and Me. Allows you to save any files to any disk visible on the system or on the network. Supports saving compressed or encrypted files.

    While saving, it ignores file security policies. It means that it is possible to access absolutely any file on a NTFS disk from Windows 9x.

    VI. UNSUBSCRIBE INSTRUCTIONS
    ----------------------------
    To unsubscribe send an e-mail message to ms-secnews-unsubscribe@securityfocus.com from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

    If your email address has changed email listadmin@securityfocus.com and ask to be manually removed.

    VII. SPONSOR INFORMATION
    -----------------------

    This Issue is Sponsored By: SecurityFocus

    Stay up to date. All the latest news, columns, jobs and more in a
    convenient html newsletter - Even a glimpse of upcoming columns and feature
    articles! Sign up today!

    http://www.securityfocus.com/htmlnewsletter/subscribe

    ------------------------------------------------------------------------

    ---------------------------------------------------------------------------
    ---------------------------------------------------------------------------


  • Next message: Llistes Diverses: "root_drv.sys rootkit"

    Relevant Pages

    • SecurityFocus Microsoft Newsletter #231
      ... Stormy Studios KNet Remote Buffer Overflow Vulnerability ... Mozilla Firefox Address Bar Image Dragging Remote Script Exe... ... Relevant URL: http://www.securityfocus.com/bid/12669 ... This vulnerability is reported to exist in RealNetworks products for Microsoft Windows, Linux, and Apple Mac platforms. ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #207
      ... Samba Multiple ASN.1 and MailSlot Parsing Remote Denial Of S... ... Jigunet TwinFTP Server Directory Traversal Vulnerability ... IBM OEM Microsoft Windows XP And Windows XP SP1 Default Admi... ... Relevant URL: http://www.securityfocus.com/bid/11155 ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #226
      ... Golden FTP Server Remote Buffer Overflow Vulnerability ... Redmond's plan to make you install Windows authentication software before ... Relevant URL: http://www.securityfocus.com/bid/12333 ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #221
      ... Windows Media Player ActiveX Control Media File Attribute Co... ... ArGoSoft Mail Server HTML Injection Vulnerability ... Snort DecodeTCPOptions Remote Denial Of Service Vulnerabilit... ... Relevant URL: http://www.securityfocus.com/bid/12031 ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #230
      ... Bontago Game Server Remote Nickname Buffer Overrun Vulnerabi... ... Mambo Open Source Tar.PHP Remote File Include Vulnerability ... Relevant URL: http://www.securityfocus.com/bid/12601 ... The weakness is reported to exist due to a flaw that manifests in script-initiated pop-up windows. ...
      (Focus-Microsoft)