Jaqui opened this issue on Jan 05, 2005 ยท 25 posts
Jaqui posted Sat, 08 January 2005 at 8:34 AM
hey bone,
what's an eisk?
Windows WINS Service Buffer Overflow
Description: Exploit code has been publicly posted for the buffer
overflow in the Windows WINS service that has been discussed in the
Microsoft security bulletin MS04-045. Note that this overflow can be
leveraged to execute arbitrary code with 'SYSTEM' privileges. Any domain
controllers running WINS should be patched immediately.
Council Site Actions: Most of the reporting council sites are running
the affected software and have already patched their systems or are in
the process of patching their systems.
References:
Exploit Code
http://www.securiteam.com/exploits/5EP020KEKW.html Windows NetDDE Service Buffer Overflow Description: Exploit code has been publicly posted for the buffer overflow vulnerability in the Windows NetDDE service that has been discussed in the Microsoft Security Bulletin MS04-031. The service is not enabled by default. However, if this service is being used, ensure that the systems are properly patched. Note that the overflow can be leveraged to execute arbitrary code with 'SYSTEM' privileges. Council Site Actions: Most of the reporting council sites are running the affected software and have already patched their systems or are in the process of patching their systems. References: Exploit Code http://www.securiteam.com/exploits/5FP030KEKS.html Previous @RISK Newsletter Posting (Item #4) http://www.sans.org/newsletters/risk/vol3_41.php 05.1.5 CVE: Not Available Platform: Other Microsoft Products Title: Internet Explorer FTP Client Directory Traversal Description: Microsoft Internet Explorer FTP client allows users to transfer files. The client is vulnerable to a directory traversal vulnerability due to a failure of the application to sanitize user-supplied input. A remote attacker could place files in an arbitrary location without the user's knowledge or consent. Microsoft Internet Explorer 6.0 and 6.0 SP1 are reported to be vulnerable. Ref: http://www.7a69ezine.org/node/view/176 05.1.7 CVE: Not Available Platform: Third Party Windows Apps Title: Mozilla/Firefox File Download Dialog Spoofing Vulnerability Description: Mozilla and Firefox are vulnerable to an issue that may permit a malicious web page to spoof the source of a download. Mozilla versions 1.7.x and Firefox versions 1.x are reported to be vulnerable. No solution available, but the vendor states a fix will be included in the next release. Ref: http://secunia.com/secunia_research/2004-15/advisory/
Message edited on: 01/08/2005 08:38