Security 10918 Published by Philipp Esselbach 0

Thanks Clutch for this one:

HFNetChk is a command-line tool that enables an administrator to check the patch status of all the machines in a network from a central location. The tool does this by referring to an XML database that's constantly updated by Microsoft. HFNetChk can be run on Windows NT 4.0 or Windows 2000 systems, and will scan either the local system or remote ones for patches available for the following products:

Windows NT 4.0
Windows 2000
All system services, including Internet Information Server 4.0 and 5.0
SQL Server 7.0 and 2000 (including Microsoft Data Engine)
Internet Explorer 5.01 and later

Read more

Security 10918 Published by Philipp Esselbach 0

.... Global Address List

Among the functions Outlook Web Access (OWA) in Exchange 5.5 offers is the ability to search the global address list (GAL). By design, this is an authenticated function, implemented as a two-tier architecture - a front tier that provides a user interface and a back-end tier that actually performs the search. However, only the front tier actually checks authentication. An attacker who sent a properly formatted request to the back-end function that actually performs the search could enumerate the GAL without authenticating.

Read more

Security 10918 Published by Philipp Esselbach 0

Thanks to CestLaVie for this one:

DSNS: an advanced network scanner for Windows 2000
When you're just starting out as a system administrator at a new network, sometimes you just want to know which machine runs which services. There aren't many better methods to do that than to run a portscan. DSNS is an advanced network scanner for Windows 2000 that will certainly aid you in this task.

Read more

Security 10918 Published by Philipp Esselbach 0

Thanks to CestLaVie for this one:

Cache Corruption on Microsoft DNS Servers
Release Date: August 31, 2001

Systems Affected
Microsoft Windows NT 4.0 and Windows 2000 systems running Microsoft DNS Server

The CERT/CC has received reports from sites experiencing cache corruption on systems running Microsoft DNS Server. The default configuration of this software allows data from malicious or incorrectly configured servers to be cached in the DNS server. This corruption can result in erronous DNS information later being returned to any clients which use this server.

Read more

Security 10918 Published by Philipp Esselbach 0

The state attorney general has asked Qwest to give refunds to customers who lost high-speed Internet connections as a result of the Code Red computer worm attack, but the Denver-based Internet access provider is refusing.

Read more

Security 10918 Published by Philipp Esselbach 0

... Can Cause System to Restart

Microsoft Windows 2000 provides support for infrared-based connectivity. This support is provided through protocols developed by the Infrared Data Association (IRDA). Because of this, they are often called IRDA devices. These devices can be used to share files and printers with other IRDA-device capable systems. The software which handles IRDA devices in Windows 2000 contains an unchecked buffer in the code which handles certain IRDA packets.

A security vulnerability results because it is possible for a malicious user to send a specially crafted IRDA packet to the victim's system. This could enable the attacker to conduct a buffer overflow attack and cause an access violation on the system, forcing a reboot. To be best of our knowledge, it cannot be used to run malicious code on the user's system.

Read more

Security 10918 Published by Philipp Esselbach 0

Thanks to CestLaVie for this one:

A security hole in MSN Hotmail, Microsoft's Web-based e-mail service, allows any account holder to view other users' private messages, according to the hacker e-zine Root-Core Network. In a bulletin posted on the outfit's Web site Saturday, Root-Core members demonstrated how specially crafted uniform resource locators (URLs) could do an end-run around password security on the Hotmail servers

Read more

Security 10918 Published by Philipp Esselbach 0

Thanks to Andrew for this one:

Microsoft Personal Security Advisor (MPSA) is an easy to use web application that will help you secure your Windows NT:tm: 4.0 or Windows 2000:tm: computer system. Simply press the Scan Now button to receive a detailed report of your computer's security settings and recommendations for improvement.

MPSA will scan your system and build a customized report on items such as: missing security patches, weak passwords, Internet Explorer and Outlook Express security settings, and Office macro protection settings. More details on the specific tests performed by MPSA are available by clicking on the Features menu option above.

Read more

Security 10918 Published by Philipp Esselbach 0

On July 12, 2001, Microsoft released the original version of this bulletin, to advise customers of a vulnerability affecting Microsoft Outlook and to recommend that they temporarily use an administrative procedure to protect their systems. A patch that eliminates the vulnerability is now available. An updated version of the bulletin was released on August 16, 2001, to announce the availability of the patch and to advise customers that the administrative procedure is no longer needed.

The Microsoft Outlook View Control is an ActiveX control that allows Outlook mail folders to be viewed via web pages. The control should only allow passive operations such as viewing mail or calendar data. In reality, though, it exposes a function that could allow the web page to manipulate Outlook data. This could enable an attacker to delete mail, change calendar information, or take virtually any other action through Outlook including running arbitrary code on the user's machine.

Read more

Security 10918 Published by Philipp Esselbach 0

This bulletin discusses three security vulnerabilities that are unrelated except in the sense that both affect ISA Server 2000:

- A denial of service vulnerability involving the H.323 Gatekeeper Service, a service that supports the transmission of voice-over-IP traffic through the firewall. The service contains a memory leak that is triggered by a particular type of malformed H.323 data. Each time such data is received, the memory available on the server is depleted by a small amount; if an attacker repeatedly sent such data, the performance of the server could deteriorate to the point where it would effectively disrupt all communications across the firewall. A server administrator could restore normal service by cycling the H.323 service.

- A denial of service vulnerability in the in the Proxy service. Like the vulnerability above, this one is caused by a memory leak, and could be used to degrade the performance of the server to the point where is disrupted communcations.

- A cross-site scripting vulnerability affecting the error page that ISA Server 2000 generates in response to a failed request for a web page. An attacker could exploit the vulnerability by tricking a user into submitting to ISA Server 2000 an URL that has the following characteristics: (a) it references a valid web site; (b)it requests a page within that site that can't be retrieved - that is, a non-existent page or one that generates an error; and (c) it contains script within the URL. The error page generated by ISA Server 2000 would contain the embedded script commands, which would execute when the page was displayed in the user's browser. The script would run in the security domain of the web site referenced in the URL, and would be able to access any cookies that site has written to the user's machine.

Read more