Security 10918 Published by Philipp Esselbach 0

A security vulnerability exists in Exchange 2000 Outlook Web Access, because it will accept and process a request for an item in an authenticated user's mailbox without verifying first that the folder structure is valid. An attacker could mount a denial of service attack by repeatedly levying a request for a non-existent but deeply nested folder in his own mailbox.

Read more

Security 10918 Published by Philipp Esselbach 0

Security experts on Monday warned of a new file-deleting virus masquerading as a program that allows people to vote on whether the United States should go to war.

The Vote Virus is spreading via e-mail to users of Microsoft's Outlook e-mail program, said Simon Perry, vice president of security solutions at Computer Associates International.

Read more

Security 10918 Published by Philipp Esselbach 0

Analysts are advising against using Microsoft's Internet Information Server (IIS) because of its multitude of vulnerabilities that viruses like Nimda and Code Red exploit.

The Gartner Group has advised enterprises that had not yet made web server decisions to weigh security heavily and to evaluate other web server software offerings rather than opting straight out for IIS.

Read more

Security 10918 Published by Philipp Esselbach 0

Authorities around the world have released further warnings about the mass-mailing Nimda worm, saying it could be more dangerous than Code Red.

Over the last few days, the National Infrastructure Protection Centre, CERT and the Home Office have all warned about the swiftly spreading worm.

Read more

Security 10918 Published by Philipp Esselbach 0

W32.Nimda.A@mm is a new mass-mailing worm that utilizes multiple methods to spread itself. The worm sends itself out by email, searches for open network shares, and attempts to copy itself to unpatched Microsoft IIS web servers. The worm does this using the Unicode Web Traversal exploit.

Read more

Security 10918 Published by Philipp Esselbach 0

Thanks Clutch for this one:
Microsoft released today a tool called URLScan that could be a valuable security asset. It is an ISAPI filter (consequently, it will always run in process), that will analyze an incoming request and screen them according to a ruleset created by the administrator. This is the same kind of technology used by IISSecure created by Eeye which has proven to be an effective security tool. It would be ideal if a malformed or suspect URL never reached IIS for processing in the first place.

Download

Security 10918 Published by Philipp Esselbach 0

.... Service to Fail

The RPC endpoint mapper allows RPC clients to determine the port number currently assigned to a particular RPC service. The Windows NT 4.0 endpoint mapper contains a flaw that causes it to fail upon receipt of a request that contains a particular type of malformed data.

Because the endpoint mapper runs within the RPC service itself, exploiting this vulnerability would cause the RPC service itself to fail, with the attendant loss of any RPC-based services the server offers, as well as potential loss of some COM functions. Normal service could be restored by rebooting the server.

Read more

Security 10918 Published by Philipp Esselbach 0

A new Internet worm has emerged in China akin to the Code Red worm, which caused $2.4 billion in estimated cleanup costs on Internet-linked computers last month, a computer security expert said on Friday.

The Code Blue worm has similarities with the Code Red worm, which caused widespread problems, said a worker at the police-run Computer Virus Treatment Center in Tianjin, about 54 miles from Beijing.

Read more