SecurityFocus Microsoft Newsletter #296



SecurityFocus Microsoft Newsletter #296
----------------------------------------

This issue is sponsored by: SPI Dynamics
ALERT: "How A Hacker Launches A Cross-Site Scripting Attack" - White Paper
Cross-site scripting vulnerabilities in web apps allow hackers to compromise confidential information, steal cookies and create requests that can be mistaken for those of a valid user!! Download this *FREE* white paper from SPI Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/xss.asp?Campaign_ID=70160000000CY4R

------------------------------------------------------------------
I. FRONT AND CENTER
1. Phishing with Rachna Dhamija
2. Ajax security basics
II. MICROSOFT VULNERABILITY SUMMARY
1. Toshiba Bluetooth Stack TOSRFBD.SYS Remote Denial of Service Vulnerability
2. CHM Lib Extract_chmlib Directory Traversal Vulnerability
3. Nullsoft Winamp Malformed MIDI File Remote Buffer Overflow Vulnerability
4. Microsoft Excel Unicode Link Memory Corruption Vulnerability
5. Invision Power Board Admin.PHP Cross-site Scripting Vulnerability 6. Adobe Reader Multiple Unspecified Security Vulnerabilities
7. wv2 Remote Buffer Overflow Vulnerability
8. Sendmail Malformed MIME Message Denial Of Service Vulnerability
9. IBM DB2 Universal Database Multiple Denial of Service Vulnerabilities
10. Microsoft Windows Routing and Remote Access Unspecified Remote Code Execution Vulnerability
11. Microsoft Excel Unspecified Remote Code Execution Vulnerability
12. Microsoft Windows Malformed ART Image Remote Code Execution Vulnerability
13. Microsoft Windows RPC Mutual Authentication Service Spoofing Vulnerability
14. Microsoft Windows Media Player Malformed PNG Remote Code Execution Vulnerability
15. WinSCP URI Handler Remote Arbitrary File Access Vulnerability
16. Microsoft PowerPoint Malformed Record Remote Code Execution Vulnerability
17. Microsoft Exchange Server Outlook Web Access Script Injection Vulnerability
18. Nullsoft SHOUTcast Multiple HTML Injection Vulnerabilities
19. FilZip Remote Directory Traversal Vulnerability
20. Microsoft Windows TCP/IP Protocol Driver Remote Buffer Overflow Vulnerability
21. Microsoft JScript Memory Corruption Vulnerability
22. Microsoft Windows Routing and Remote Access RASMAN Registry Remote Code Execution Vulnerability
23. Microsoft SMB Driver Local Denial Of Service Vulnerability
24. Microsoft Windows SMB Driver Local Privilege Escalation Vulnerability
25. Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability Variant
26. Microsoft Windows Routing and Remote Access Remote Code Execution Vulnerability
27. Microsoft Windows GDI WMF Handling Heap Overflow Vulnerability
28. Microsoft Internet Explorer Persistent Modal Dialog Window Address Bar Spoofing Vulnerability
29. Microsoft Internet Explorer Multipart HTML File Handling Remote Code Execution Vulnerability
30. Microsoft Internet Explorer HTML Decoding Remote Code Execution Vulnerability
31. Microsoft DXImageTransform.Microsoft.Light ActiveX Control Remote Code Execution Vulnerability
III. MICROSOFT FOCUS LIST SUMMARY
1. Securing an encryption key within software.
2. SecurityFocus Microsoft Newsletter #295
3. Controlling specific USB devices on Windows XP
IV. UNSUBSCRIBE INSTRUCTIONS
V. SPONSOR INFORMATION

I. FRONT AND CENTER
---------------------
1. Phishing with Rachna Dhamija
By Federico Biancuzzi
Federico Biancuzzi interviews Rachna Dhamija, co-author of the paper "Why Phishing Works" and creator of Dynamic Security Skins. They discuss the human factor, how easy it is to recreate a credible browser window made with images, some new anti-phishing features included in the upcoming version of some popular browsers, and the power of letting a user personalize his interface. http://www.securityfocus.com/columnists/407

2. Ajax security basics
Jaswinder S. Hayre and Jayasankar Kelath
Ajax technologies have been very visible on the web over the past year, due to their interactive nature. Companies are now thinking of how they too can leverage it, web developers are trying to learn it, security professionals are thinking of how to secure it, and penetration testers are thinking of how to hack it.


II. MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. Toshiba Bluetooth Stack TOSRFBD.SYS Remote Denial of Service Vulnerability
BugTraq ID: 18527
Remote: Yes
Date Published: 2006-06-20
Relevant URL: http://www.securityfocus.com/bid/18527
Summary:
Toshiba Bluetooth Stack is prone to a remote denial-of-service vulnerability.

Reports indicate that a successful attack can corrupt memory and restart a vulnerable computer. Toshiba Bluetooth Stack for Windows versions 4.0.23 and prior are reported to be affected.

2. CHM Lib Extract_chmlib Directory Traversal Vulnerability
BugTraq ID: 18511
Remote: Yes
Date Published: 2006-06-12
Relevant URL: http://www.securityfocus.com/bid/18511
Summary:
CHM Lib is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to place malicious files and to overwrite files in arbitrary locations on the vulnerable system, in the context of the user running the application. Successful exploits may aid in further attacks.

3. Nullsoft Winamp Malformed MIDI File Remote Buffer Overflow Vulnerability
BugTraq ID: 18507
Remote: Yes
Date Published: 2006-06-19
Relevant URL: http://www.securityfocus.com/bid/18507
Summary:
Winamp is prone to a buffer-overflow vulnerability when handling specially crafted files. An attacker may exploit this issue to gain unauthorized access to a computer with the privileges of the user that activated the vulnerable application.

Winamp versions prior to 5.22 are reported prone to this issue.

4. Microsoft Excel Unicode Link Memory Corruption Vulnerability
BugTraq ID: 18500
Remote: Yes
Date Published: 2006-06-19
Relevant URL: http://www.securityfocus.com/bid/18500
Summary:
Microsoft Excel is prone to a memory-corruption vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

Successfully exploiting this issue causes the affected application to crash, denying service to legitimate users. Attackers may also be able to execute arbitrary code in the context of targeted users, but this has not been confirmed.

Note that Microsoft Office applications include functionality to embed Office files as objects contained in other Office files. As an example, Microsoft Word files may contain embedded malicious Microsoft Excel files, making Word documents another possible attack vector.

Microsoft Excel versions 2002 SP3 and 2003 SP2 are vulnerable to this issue; other versions may also be affected.

5. Invision Power Board Admin.PHP Cross-site Scripting Vulnerability BugTraq ID: 18450
Remote: Yes
Date Published: 2006-06-15
Relevant URL: http://www.securityfocus.com/bid/18450
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may use this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie credentials; other attacks are also possible.

6. Adobe Reader Multiple Unspecified Security Vulnerabilities
BugTraq ID: 18445
Remote: Yes
Date Published: 2006-06-15
Relevant URL: http://www.securityfocus.com/bid/18445
Summary:
Adobe Reader is susceptible to multiple unspecified security vulnerabilities.

Due to the 'critical' rating given by the vendor, combined with their 'Severity rating system', at least one of these vulnerabilities may be exploited to execute arbitrary machine code in the context of the affected application. This is stated to occur in the Apple Macintosh version of the software.

Other vulnerabilities for the Microsoft Windows version of the software rate a 'low' on the vendor's scale, meaning that the vulnerabilities have minimal impact or are extremely difficult to exploit.

No further details are currently available. This BID will be updated as more information is disclosed.

Versions of Adobe Reader prior to 7.0.8 are vulnerable to these issues.

7. wv2 Remote Buffer Overflow Vulnerability
BugTraq ID: 18437
Remote: Yes
Date Published: 2006-06-14
Relevant URL: http://www.securityfocus.com/bid/18437
Summary:
The wv2 library is prone to a remote buffer-overflow vulnerability. This issue is due to the library's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue allows remote attackers to execute arbitrary machine code in the context of applications that use the affected library to parse malicious Microsoft Word files.

Version 0.2.2 of the wv2 library is vulnerable to this issue; other versions may also be affected.

8. Sendmail Malformed MIME Message Denial Of Service Vulnerability
BugTraq ID: 18433
Remote: Yes
Date Published: 2006-06-14
Relevant URL: http://www.securityfocus.com/bid/18433
Summary:
Sendmail is prone to a denial-of-service vulnerability. This issue is due to a failure in the application to properly handle malformed multi-part MIME messages.

An attacker can exploit this issue to crash the sendmail process during delivery.

9. IBM DB2 Universal Database Multiple Denial of Service Vulnerabilities
BugTraq ID: 18428
Remote: Yes
Date Published: 2006-06-14
Relevant URL: http://www.securityfocus.com/bid/18428
Summary:
IBM DB2 Universal Database is prone to multiple denial-of-service vulnerabilities. An attacker may be able to exploit these issues to cause the database to crash or hang, effectively denying service to legitimate users.

These issues affect DB2 versions prior to 8 FixPak 12 also known as version 8.2 FixPak 5.

10. Microsoft Windows Routing and Remote Access Unspecified Remote Code Execution Vulnerability
BugTraq ID: 18424
Remote: Yes
Date Published: 2006-06-14
Relevant URL: http://www.securityfocus.com/bid/18424
Summary:
Microsoft Windows Routing and Remote Access is prone to an unspecified remote vulnerability. This issue is reportedly due to an integer-signedness error in the affected component.

This issue likely allows remote attackers to execute arbitrary machine code on affected computers with SYSTEM-level privileges. This facilitates the complete compromise of affected computers.

It is not currently known if remote, anonymous attacks are possible on all affected platforms.

This BID will be updated as further information is disclosed.

11. Microsoft Excel Unspecified Remote Code Execution Vulnerability
BugTraq ID: 18422
Remote: Yes
Date Published: 2006-06-14
Relevant URL: http://www.securityfocus.com/bid/18422
Summary:
Microsoft Excel is prone to an unspecified remote code-execution vulnerability. Insufficient details are currently available to elaborate further.

Successfully exploiting this issue allows attackers to execute arbitrary code in the context of targeted users.

Attackers are actively exploiting this vulnerability in targeted attacks and to install malicious software.

Note that MS Office applications include functionality to embed Office files as objects contained in other Microsoft Office files. As an example, Microsoft Word files may contain embedded malicious Microsoft Excel files, making Word documents another possible attack vector.

This BID will be updated as further information becomes available.

12. Microsoft Windows Malformed ART Image Remote Code Execution Vulnerability
BugTraq ID: 18394
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18394
Summary:
Microsoft Windows is prone to remote code execution when processing malformed AOL ART images. This issue is exposed when the malicious images are processed by Internet Explorer or other applications that rely on Internet Explorer to display AOL ART images. If exploited, this vulnerability could let a remote attacker execute arbitrary code in the context of the victim user.

13. Microsoft Windows RPC Mutual Authentication Service Spoofing Vulnerability
BugTraq ID: 18389
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18389
Summary:
Microsoft Windows is susceptible to a vulnerability in the RPC component, specifically when using the mutual authentication mechanism with the SSL (Secure Socket Layer) protocol.

This issue is due to a flaw in the mutual authentication mechanism that can occur when it attempts to validate the identity of an RPC service. This can allow the attacker to spoof a valid RPC service that victims of the attack may inadvertently access.

Exploitation of this issue could potentially expose the victim to other attacks.

14. Microsoft Windows Media Player Malformed PNG Remote Code Execution Vulnerability
BugTraq ID: 18385
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18385
Summary:
Microsoft Windows Media Player is prone to a remote code-execution vulnerability. This vulnerability is related to handling of malicious PNG images.

PNG images may be embedded in Windows Media Player skin files. Attackers may be able to exploit this issue by causing the application to load a malicious skin file, which could be hosted on an attacker-controlled web page or through email attachments. If successful, an attacker could execute arbitrary code in the context of the affected user.

Microsoft has stated that web-based attack scenarios are not possible with Media Player 7.1 on Windows 2000 SP4 and Media Player XP on Windows XP SP2. However, a victim may still be affected if they manually download and install a malicious skin file on these platforms.

15. WinSCP URI Handler Remote Arbitrary File Access Vulnerability
BugTraq ID: 18384
Remote: Yes
Date Published: 2006-06-12
Relevant URL: http://www.securityfocus.com/bid/18384
Summary:
WinSCP is prone to an arbitrary file-access vulnerability. An attacker can exploit this issue to upload arbitrary files to a victim user's computer or to download arbitrary files from the victim's computer in the context of the vulnerable application.

This issue affects version 3.8.1; earlier versions may also be vulnerable.

16. Microsoft PowerPoint Malformed Record Remote Code Execution Vulnerability
BugTraq ID: 18382
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18382
Summary:
Microsoft PowerPoint is prone to a remote code-execution vulnerability. The issue is related to how the application processes malformed record data in PowerPoint documents. To exploit this issue, an attacker must entice a victim to open a malicious PowerPoint file. If the exploit is successful, the attacker may execute arbitrary code with the privileges of the currently logged-in user.

17. Microsoft Exchange Server Outlook Web Access Script Injection Vulnerability
BugTraq ID: 18381
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18381
Summary:
Microsoft Exchange Server Outlook Web Access is prone to a script-injection vulnerability.

A remote attacker can exploit this issue by sending a malicious email message to a vulnerable user.

18. Nullsoft SHOUTcast Multiple HTML Injection Vulnerabilities
BugTraq ID: 18376
Remote: Yes
Date Published: 2006-06-12
Relevant URL: http://www.securityfocus.com/bid/18376
Summary:
Nullsoft SHOUTcast is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would be executed in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

These issues affect version 1.9.5; other versions may also be vulnerable.

19. FilZip Remote Directory Traversal Vulnerability
BugTraq ID: 18375
Remote: Yes
Date Published: 2006-06-12
Relevant URL: http://www.securityfocus.com/bid/18375
Summary:
Reportedly, an attacker can carry out attacks similar to directory traversals. These issues present themselves when the application processes malicious archives. A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. Successful exploits may aid in further attacks.

20. Microsoft Windows TCP/IP Protocol Driver Remote Buffer Overflow Vulnerability
BugTraq ID: 18374
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18374
Summary:
Microsoft Windows is prone to a remote buffer-overflow vulnerability. The vulnerability arises in the Microsoft Windows TCP/IP protocol driver when IP Source Routing has been enabled.

A remote attacker may trigger a denial-of-service condition or may execute arbitrary code, leading to a complete compromise.

21. Microsoft JScript Memory Corruption Vulnerability
BugTraq ID: 18359
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18359
Summary:
Microsoft JScript is prone to a remote memory-corruption vulnerability. This issue is due to the software's failure to properly execute certain HTML script content.

This issue allows remote attackers to execute arbitrary machine code in the context of applications that use the JScript component to render attacker-supplied script code.

Microsoft Internet Explorer and Outlook both use the affected component, allowing attackers to exploit this issue by sending HTML email or by coercing unsuspecting users to visit malicious websites.

22. Microsoft Windows Routing and Remote Access RASMAN Registry Remote Code Execution Vulnerability
BugTraq ID: 18358
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18358
Summary:
Microsoft Windows Routing and Remote Access is prone to a memory-corruption vulnerability. This issue is due to the software's failure to properly bounds-check user-supplied network data before copying it to an insufficiently sized memory buffer.

This issue allows remote attackers to execute arbitrary machine code on affected computers with SYSTEM-level privileges. This facilitates the complete compromise of affected computers.

Exploiting this issue on Microsoft Windows XP SP2 or Windows Server 2003 requires valid login credentials. Anonymous attacks are possible with Windows 2000 and Windows XP versions prior to SP2.

23. Microsoft SMB Driver Local Denial Of Service Vulnerability
BugTraq ID: 18357
Remote: No
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18357
Summary:
The Microsoft SMB driver is prone to a local denial-of-service vulnerability.

A local attacker can exploit this issue to create processes that cannot be killed in affected operating systems, potentially denying service to legitimate users and other software on affected computers. This may aid the attacker in further attacks.

24. Microsoft Windows SMB Driver Local Privilege Escalation Vulnerability
BugTraq ID: 18356
Remote: No
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18356
Summary:
The Microsoft SMB driver is susceptible to a local privilege-escalation vulnerability. This issue is due to a failure of the affected software to properly bounds-check user-supplied input prior to copying it to insufficiently-sized kernel memory.

A local attacker can exploit this issue to elevate privileges and gain complete control of an affected computer.

25. Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability Variant
BugTraq ID: 18328
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18328
Summary:
Microsoft Internet Explorer is prone to a memory-corruption vulnerability that is related to the instantiation of COM objects. This issue results from a design error.

The vulnerability arises because of the way Internet Explorer tries to instantiate certain COM objects as ActiveX controls, resulting in arbitrary code execution. The affected objects are not intended to be instantiated through Internet Explorer.

This BID is related to the issues described in BID 14511 (Microsoft Internet Explorer COM Object Instantiation Buffer Overflow Vulnerability), BID 15061 (Microsoft Internet Explorer COM Object Instantiation Variant Vulnerability), and BID 17453 (Microsoft Internet Explorer COM Object Instantiation Code Execution Vulnerability). However, this issue affects a different set of COM objects that were not addressed in the previous BIDs.

26. Microsoft Windows Routing and Remote Access Remote Code Execution Vulnerability
BugTraq ID: 18325
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18325
Summary:
Microsoft Windows Routing and Remote Access is prone to a memory-corruption vulnerability. This issue is due to the software's failure to properly bounds-check user-supplied network data before copying it to an insufficiently sized memory buffer.

This issue allows remote attackers to execute arbitrary machine code on affected computers with SYSTEM-level privileges. This facilitates the complete compromise of affected computers.

Exploiting this issue on Microsoft Windows XP SP2 or Windows Server 2003 requires valid login credentials. Anonymous attacks are possible with Windows 2000 and Windows XP versions prior to SP2.

27. Microsoft Windows GDI WMF Handling Heap Overflow Vulnerability
BugTraq ID: 18322
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18322
Summary:
The Microsoft Windows GDI Graphics Rendering Engine is prone to a heap-overflow vulnerability. This issue is exposed when the component loads a specially crafted WMF (Windows Metafile) image.

If this issue is exploited, a malicious WMF or EMF file could potentially corrupt heap-based memory with attacker-supplied data. This could lead to the execution of arbitrary code and to a complete system compromise.

An attacker could exploit the issue by enticing the victim user to visit a malicious web page that contains the image or to open an email attachment that consists of the image.

This vulnerability is limited to Windows 98/98SE/ME systems.

28. Microsoft Internet Explorer Persistent Modal Dialog Window Address Bar Spoofing Vulnerability
BugTraq ID: 18321
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18321
Summary:
Microsoft Internet Explorer is prone to address-bar spoofing. Attackers may exploit this via a malicious web page to spoof the contents of a page that the victim may trust. This vulnerability may be useful in phishing or other attacks that rely on content spoofing.

29. Microsoft Internet Explorer Multipart HTML File Handling Remote Code Execution Vulnerability
BugTraq ID: 18320
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18320
Summary:
Internet Explorer is prone to remote code execution. An attacker could exploit this issue to execute code in the context of the user visiting a malicious web page.

30. Microsoft Internet Explorer HTML Decoding Remote Code Execution Vulnerability
BugTraq ID: 18309
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18309
Summary:
Internet Explorer is vulnerable to remote code execution. An attacker could exploit this issue to execute code in the context of the user visiting a malicious web page.

31. Microsoft DXImageTransform.Microsoft.Light ActiveX Control Remote Code Execution Vulnerability
BugTraq ID: 18303
Remote: Yes
Date Published: 2006-06-13
Relevant URL: http://www.securityfocus.com/bid/18303
Summary:
The DXImageTransform.Microsoft.Light ActiveX control is prone to remote code execution. An attacker could exploit this issue to execute code in the context of the user visiting a malicious web page.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. Securing an encryption key within software.
http://www.securityfocus.com/archive/88/437386

2. SecurityFocus Microsoft Newsletter #295
http://www.securityfocus.com/archive/88/437275

3. Controlling specific USB devices on Windows XP
http://www.securityfocus.com/archive/88/437076

IV. UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to ms-secnews-unsubscribe@xxxxxxxxxxxxxxxxx from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email listadmin@xxxxxxxxxxxxxxxxx and ask to be manually removed.

V. SPONSOR INFORMATION
------------------------
This issue is sponsored by: SPI Dynamics
ALERT: "How A Hacker Launches A Cross-Site Scripting Attack" - White Paper
Cross-site scripting vulnerabilities in web apps allow hackers to compromise confidential information, steal cookies and create requests that can be mistaken for those of a valid user!! Download this *FREE* white paper from SPI Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/xss.asp?Campaign_ID=70160000000CY4R



---------------------------------------------------------------------------
---------------------------------------------------------------------------



Relevant Pages

  • SecurityFocus Microsoft Newsletter #295
    ... MICROSOFT VULNERABILITY SUMMARY ... Sendmail Malformed MIME Message Denial Of Service Vulnerability ... Microsoft Windows Routing and Remote Access Unspecified Remote Code Execution Vulnerability ...
    (Focus-Microsoft)
  • [NT] Microsoft Routing and Remote Access Code Execution Vulnerabilities (MS06-025)
    ... Microsoft Routing and Remote Access Code Execution Vulnerabilities ... There is a remote code execution vulnerability in the Routing and Remote ... * Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service ...
    (Securiteam)
  • SecurityFocus Microsoft Newsletter #445
    ... MICROSOFT VULNERABILITY SUMMARY ... Apple Safari CoreGraphics TrueType Font Handling Remote Code Execution Vulnerability ... Microsoft Windows Argument Validation Local Privilege Escalation Vulnerability ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #71
    ... DaanSystems NewsReactor Password Encoding Vulnerability ... Microsoft Windows NT Inaccurate Login Logging Vulnerability ... Oracle RDBMS Server Default Account Vulnerability ... Avirt Gateway Suite Telnet Proxy Remote SYSTEM Access... ...
    (Focus-Microsoft)
  • SecurityFocus Microsoft Newsletter #145
    ... integrated suite of Web application security products, ... Microsoft URLScan Tool Information Disclosure Vulnerability ... BillingExplorer Multiple Remote Client Communication Integrity... ... Microsoft Windows CreateFile API Named Pipe Privilege... ...
    (Focus-Microsoft)