HolidayBuyer's Guide

Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES \ FIXES - September 4, 2008

by Marianna Schmudlach / September 4, 2008 1:25 AM PDT

FreeBSD ICMPv6 "Packet Too Big" MTU Denial of Service Vulnerability

Secunia Advisory: SA31745
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: DoS

Where: From remote

Solution Status: Vendor Patch


OS: FreeBSD 6.x

Description:
FreeBSD has acknowledged a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the "icmp6_mtudisc_update()" function in src/sys/netinet6/icmp6.c when processing ICMPv6 "Packet Too Big" messages. This can be exploited to cause the IPv6 stack to panic by sending specially crafted ICMPv6 messages to a vulnerable system.

Note: The vulnerability only affects systems with IPv6 support.

Solution:
Update FreeBSD or apply patches.

2008-09-03 19:09:47 UTC (RELENG_7, 7.1-PRERELEASE)
2008-09-03 19:09:47 UTC (RELENG_7_0, 7.0-RELEASE-p4)
2008-09-03 19:09:47 UTC (RELENG_6, 6.4-PRERELEASE)
2008-09-03 19:09:47 UTC (RELENG_6_3, 6.3-RELEASE-p4)

Patch:
http://security.FreeBSD.org/patches/SA-08:09/icmp6.patch

Provided and/or discovered by:
The vendor credits Tom Parker and Bjoern A. Zeeb.

Original Advisory:
http://security.freebsd.org/advisories/FreeBSD-SA-08:09.icmp6.asc

Discussion is locked
You are posting a reply to: VULNERABILITIES \ FIXES - September 4, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES \ FIXES - September 4, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
FreeBSD AMD64 General Protection Fault Privilege Escalation
by Marianna Schmudlach / September 4, 2008 1:27 AM PDT

Secunia Advisory: SA31743
Release Date: 2008-09-04


Critical:
Less critical
Impact: Privilege escalation

Where: Local system

Solution Status: Vendor Patch


OS: FreeBSD 6.x

Description:
FreeBSD has acknowledged a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to an error within the handling of general protection faults when returning from processing certain other events (e.g. interrupts, traps, or system calls). This can be exploited to execute arbitrary code with kernel privileges.

Note: This only affects 64bit systems running a FreeBSD/amd64 kernel.

The vulnerability is reported in all FreeBSD/amd64 versions.

Solution:
Update FreeBSD or apply patches.

2008-08-21 09:58:18 UTC (RELENG_7, 7.0-STABLE)
2008-09-03 19:09:47 UTC (RELENG_7_0, 7.0-RELEASE-p4)
2008-09-03 19:09:47 UTC (RELENG_6, 6.4-PRERELEASE)
2008-09-03 19:09:47 UTC (RELENG_6_3, 6.3-RELEASE-p4)

Patch:
http://security.FreeBSD.org/patches/SA-08:07/amd64.patch

Provided and/or discovered by:
The vendor credits Nate Eldredge.

Original Advisory:
http://security.freebsd.org/advisories/FreeBSD-SA-08:07.amd64.asc

Collapse -
Astaro Security Gateway DNS Cache Poisoning
by Marianna Schmudlach / September 4, 2008 1:28 AM PDT

Secunia Advisory: SA31742
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: Spoofing

Where: From remote

Solution Status: Vendor Patch


OS: Astaro Security Linux 6.x

Description:
Astaro has acknowledged a vulnerability in Astaro Security Gateway, which can be exploited by malicious people to poison the DNS cache.

The vulnerability is caused due to the application not sufficiently randomising the DNS query port number, which can be exploited to poison the DNS cache.

Solution:
Apply Up2Date package 6.314.

Provided and/or discovered by:
Dan Kaminsky, IOActive

Original Advisory:
http://up2date.astaro.com/2008/09/up2date_6314_released.html

Collapse -
IBM AIX "swcons" Command Privilege Escalation Vulnerability
by Marianna Schmudlach / September 4, 2008 1:30 AM PDT

Secunia Advisory: SA31739
Release Date: 2008-09-04


Critical:
Not critical
Impact: Privilege escalation

Where: Local system

Solution Status: Vendor Patch


OS: AIX 5.x
AIX 6.x

Description:
A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to an error in the "swcons" command, which can be exploited to create files that are owned by root and have insecure permissions.

Successful exploitation allows execution of arbitrary code with root privileges, but requires that an attacker is member of the "system" group.

Solution:
Apply fixes or APARs as soon as they become available.

Original Advisory:
http://aix.software.ibm.com/aix/efixes/security/swcons_advisory.asc

http://www.ibm.com/support/docview.wss?uid=isg1IZ18335
http://www.ibm.com/support/docview.wss?uid=isg1IZ18339
http://www.ibm.com/support/docview.wss?uid=isg1IZ18338
http://www.ibm.com/support/docview.wss?uid=isg1IZ18334
http://www.ibm.com/support/docview.wss?uid=isg1IZ18341
http://www.ibm.com/support/docview.wss?uid=isg1IZ28943

Collapse -
Slackware update for php
by Marianna Schmudlach / September 4, 2008 1:31 AM PDT

Secunia Advisory: SA31738
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: Unknown
Exposure of sensitive information
DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: Slackware Linux 11.0

Description:
Slackware has issued an update for php. This fixes some vulnerabilities, where some have an unknown impact and others can potentially be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

Solution:
Apply updated packages.

Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware...ckages/php-4.4.9-i486-1_slack10.2.tgz

Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware...ckages/php-4.4.9-i486-1_slack11.0.tgz

Original Advisory:
http://slackware.com/security/viewer....=2008&m=slackware-security.369588

Other References:
SA31409:
http://secunia.com/advisories/31409/

Collapse -
SUSE update for IBMJava5-JRE and java-1_5_0-ibm
by Marianna Schmudlach / September 4, 2008 1:32 AM PDT

Secunia Advisory: SA31736
Release Date: 2008-09-04


Critical:
Highly critical
Impact: Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
System access

Where: From remote

Solution Status: Vendor Patch


OS: SUSE Linux Enterprise Server 10
SUSE Linux Enterprise Server 9



Software: Novell Open Enterprise Server 1.x

Description:
SUSE has issued an update for IBMJava5-JRE and java-1_5_0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

Solution:
Updated packages are available via YaST Online Update and the SUSE FTP Server.

Original Advisory:
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html

Other References:
SA31010:
http://secunia.com/advisories/31010/

Collapse -
Celerondude Uploader "username" Cross-Site Scripting Vulnera
by Marianna Schmudlach / September 4, 2008 1:33 AM PDT

Secunia Advisory: SA31735
Release Date: 2008-09-04


Critical:
Less critical
Impact: Cross Site Scripting

Where: From remote

Solution Status: Unpatched


Software: Celerondude Uploader 6.x

Description:
A vulnerability has been discovered in Celerondude Uploader, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed via the "username" parameter to account.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is confirmed in version 6.1. Other versions may also be affected.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
Xc0re Security Reasearch Group

Original Advisory:
http://packetstorm.linuxsecurity.com/0809-exploits/uploader6-xss.txt

Collapse -
Cisco Secure ACS EAP Packet Denial of Service
by Marianna Schmudlach / September 4, 2008 1:34 AM PDT

Secunia Advisory: SA31731
Release Date: 2008-09-04


Critical:
Less critical
Impact: DoS

Where: From local network

Solution Status: Vendor Patch


OS: Cisco Secure ACS Solution Engine 3.x
Cisco Secure ACS Solution Engine 4.x



Software: Cisco Secure ACS 3.x
Cisco Secure ACS 4.x

Description:
A vulnerability has been reported in Cisco Secure Access Control Server (ACS), which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an input validation error in Cisco Secure ACS, which can be exploited to crash the "CSRadius" and "CSAuth" processes by sending a specially crafted EAP packet containing an overly large "length" value.

Successful exploitation may require knowledge of the RADIUS shared secret.

Solution:
Apply patches. Please see the vendor advisory for details.

Provided and/or discovered by:
Gabriel Campana and Laurent Butti, France Telecom / Orange

Original Advisory:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sr-20080903-csacs.shtml

Gabriel Campana and Laurent Butti:
http://archives.neohapsis.com/archives/bugtraq/2008-09/0033.html

Collapse -
Cisco ASA and PIX Security Appliances Multiple Vulnerabiliti
by Marianna Schmudlach / September 4, 2008 1:36 AM PDT

Secunia Advisory: SA31730
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: Exposure of sensitive information
DoS

Where: From remote

Solution Status: Vendor Patch


OS: Cisco Adaptive Security Appliance (ASA) 7.x
Cisco Adaptive Security Appliance (ASA) 8.x
Cisco PIX 7.x
Cisco PIX 8.x

Description:
Some vulnerabilities have been reported in Cisco ASA and PIX appliances, which can be exploited by malicious people to disclose sensitive information, and by malicious users and malicious people to cause a DoS (Denial of Service).

Solution:
Update to fixed versions (please see the vendor's advisory for details).

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20080903-asa.shtml

Collapse -
Django Authentication Cross-Site Request Forgery
by Marianna Schmudlach / September 4, 2008 1:37 AM PDT

Secunia Advisory: SA31729
Release Date: 2008-09-04


Critical:
Less critical
Impact: Cross Site Scripting
Manipulation of data

Where: From remote

Solution Status: Vendor Patch


Software: Django 0.x



Description:
A vulnerability has been reported in Django, which can be exploited by malicious people to conduct cross-site request forgery attacks.

The vulnerability is caused due to the Django administration application not performing any validity checks to verify requests when re-authenticating the user. This can be exploited to delete and edit data when a not logged-in user e.g. visits a malicious web site and is then enticed to log in to the application.

The vulnerability is reported in 0.91.x versions prior to 0.91.3, 0.95.x versions prior to 0.95.4, and 0.96.x versions prior to 0.96.3.

Solution:
Update to version 0.91.3, 0.95.4, or 0.96.3.

Provided and/or discovered by:
The vendor credits Simon Willison.

Original Advisory:
http://www.djangoproject.com/weblog/2008/sep/02/security/

Collapse -
Ubuntu update for libxml2
by Marianna Schmudlach / September 4, 2008 1:39 AM PDT

Secunia Advisory: SA31728
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: DoS

Where: From remote

Solution Status: Vendor Patch


OS: Ubuntu Linux 6.06
Ubuntu Linux 7.04
Ubuntu Linux 7.10
Ubuntu Linux 8.04

Description:
Ubuntu has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

Solution:
Apply updated packages.

Original Advisory:
https://lists.ubuntu.com/archives/ubu...y-announce/2008-September/000745.html

Other References:
SA31558:
http://secunia.com/advisories/31558/

Collapse -
Living Local Website "r" SQL Injection Vulnerability
by Marianna Schmudlach / September 4, 2008 1:40 AM PDT

Secunia Advisory: SA31696
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: Living Local Website 1.x

Description:
Hussin X has reported a vulnerability in Living Local Website, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "r" parameter in listtest.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.1. Other versions may also be affected.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
Hussin X

Original Advisory:
http://milw0rm.com/exploits/6361

Collapse -
PageR Enterprise Directory Traversal Vulnerability
by Marianna Schmudlach / September 4, 2008 1:41 AM PDT

Secunia Advisory: SA31693
Release Date: 2008-09-04


Critical:
Less critical
Impact: Exposure of system information
Exposure of sensitive information

Where: From remote

Solution Status: Vendor Patch


Software: PageR Enterprise 5.x

Description:
A vulnerability has been reported in PageR Enterprise, which can be exploited by malicious users to disclose potentially sensitive information.

The vulnerability is caused due to an input validation error within the web-based interface. This can be exploited to read arbitrary files on the system via directory traversal attacks.

The vulnerability is reported in versions prior to 5.0.7.

Solution:
Update to version 5.0.7.

Provided and/or discovered by:
Corey LeBleu and r@b13$ from Digital Defense, Inc. Vulnerability Research Team

Original Advisory:
DDIVRT-2008-13:
http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064227.html

Collapse -
Wireshark Denial of Service Vulnerabilities
by Marianna Schmudlach / September 4, 2008 1:42 AM PDT

Secunia Advisory: SA31674
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: DoS

Where: From remote

Solution Status: Vendor Patch


Software: Wireshark (formerly Ethereal) 0.x
Wireshark 1.x

Description:
Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

Solution:
Update to version 1.0.3.
http://www.wireshark.org/download.html

Provided and/or discovered by:
1) Reported by Thomas Nielsen in a Wireshark bug report.

Original Advisory:
http://www.wireshark.org/security/wnpa-sec-2008-05.html

Collapse -
Najdi.si Toolbar Buffer Overflow Vulnerability
by Marianna Schmudlach / September 4, 2008 1:43 AM PDT

Secunia Advisory: SA31671
Release Date: 2008-09-04


Critical:
Highly critical
Impact: System access

Where: From remote

Solution Status: Unpatched


Software: Najdi.si Toolbar 2.x



Description:
shinnai has discovered a vulnerability in Najdi.si Toolbar, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the Najdi.si Toolbar when processing overly long strings assigned to e.g. "document.location". This can be exploited to cause a stack-based buffer overflow by tricking a user into visiting a malicious website.

The vulnerability is confirmed in version 2.0.4.1. Other versions may also be affected.

Solution:
Disable the toolbar.

Provided and/or discovered by:
shinnai

Original Advisory:
http://milw0rm.com/exploits/6327

Collapse -
CMSbright "id_rub_page" SQL Injection Vulnerability
by Marianna Schmudlach / September 4, 2008 1:45 AM PDT

Secunia Advisory: SA31669
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: CMSbright

Description:
BorN To K!LL has reported a vulnerability in CMSbright, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "id_rub_page" parameter in public/page.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
BorN To K!LL

Original Advisory:
http://milw0rm.com/exploits/6343

Collapse -
Words tag "word" SQL Injection Vulnerability
by Marianna Schmudlach / September 4, 2008 1:46 AM PDT

Secunia Advisory: SA31653
Release Date: 2008-09-04


Critical:
Moderately critical
Impact: Manipulation of data

Where: From remote

Solution Status: Unpatched


Software: Words tag 1.x

Description:
Hussin X has reported a vulnerability in Words tag, which can be exploited by malicious people to conduct SQL injection attacks.

Input passed to the "word" parameter in index.php (when "command" is set to "claim") is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 1.2. Other versions may also be affected.

Solution:
Edit the source code to ensure that input is properly sanitised.

Provided and/or discovered by:
Hussin X

Original Advisory:
http://milw0rm.com/exploits/6336

Collapse -
*** shop_v50 / shop_v52 Cross-Site Scripting Vulnerability
by Marianna Schmudlach / September 4, 2008 1:47 AM PDT

Secunia Advisory: SA31652
Release Date: 2008-09-04


Critical:
Less critical
Impact: Cross Site Scripting

Where: From remote

Solution Status: Vendor Patch


Software: *** shop_v50 3.x
*** shop_v52 2.x



Description:
A vulnerability has been reported in *** shop_v50 and shop_v52, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to unspecified parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website.

The vulnerabilities are reported in *** shop_v50 version 3.0 and earlier and shop_v52 version 2.0 and earlier. Other versions may also be affected.

Solution:
The vendor has issued an updated version.

Provided and/or discovered by:
JVN credits Mr. Syuuya Ueki.

Original Advisory:
http://jvn.jp/jp/JVN79914432/index.html

Collapse -
aspWebAlbum Multiple Vulnerabilities
by Marianna Schmudlach / September 4, 2008 1:48 AM PDT

Secunia Advisory: SA31649
Release Date: 2008-09-04


Critical:
Highly critical
Impact: Cross Site Scripting
Manipulation of data
System access

Where: From remote

Solution Status: Unpatched


Software: aspWebAlbum 3.x

Description:
Alemin_Krali has reported some vulnerabilities in aspWebAlbum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks or compromise a vulnerable system.

Solution:
Filter malicious characters and character sequences using a proxy. Restrict access to the image upload functionality.

Provided and/or discovered by:
Alemin_Krali

Original Advisory:
http://milw0rm.com/exploits/6357

Collapse -
AVTECH PageR Enterprise Directory Traversal
by Marianna Schmudlach / September 4, 2008 1:50 AM PDT

Summary
PageR Enterprise is a centralized device / server event monitoring system. The PageR Enterprise server web interface is vulnerable to a common web directory traversal attack. Successful eploitation will result in arbitrary read-only file access outside of the PageR Enterprise web root.

Credit:
The information has been provided by DDI_Vulnerability_Alert.

http://www.securiteam.com/windowsntfocus/5QP0315PFW.html

Collapse -
Microsoft Security Bulletin Advance Notification for Septemb
by Marianna Schmudlach / September 4, 2008 4:38 AM PDT

Microsoft Security Bulletin Advance Notification for September 2008

This is an advance notification of security bulletins that
Microsoft is intending to release on September 9, 2008.

The full version of the Microsoft Security Bulletin Advance
Notification for September 2008 can be found at
http://www.microsoft.com/technet/security/bulletin/ms08-sep.mspx.

This bulletin advance notification will be replaced with the
September bulletin summary on September 9, 2008. For more information
about the bulletin advance notification service, see
http://www.microsoft.com/technet/security/Bulletin/advance.mspx.

To receive automatic notifications whenever
Microsoft Security Bulletins are issued, subscribe to Microsoft
Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

Microsoft will host a webcast to address customer questions on
these bulletins on Wednesday, September 10, 2008,
at 11:00 AM Pacific Time (US & Canada). Register for the September
Security Bulletin Webcast at
http://www.microsoft.com/technet/security/bulletin/summary.mspx.

Microsoft also provides information to help customers prioritize
monthly security updates with any non-security, high-priority
updates that are being released on the same day as the monthly
security updates. Please see the section, Other Information.

This advance notification provides the software subject as the
bulletin identifier, because the official Microsoft Security
Bulletin numbers are not issued until release. The bulletin summary
that replaces this advance notification will have the proper
Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the
bulletin identifier. The security bulletins for this month are as
follows, in order of severity:


Critical Security Bulletins
============================

Windows Media Player Bulletin

- Affected Software:
- Windows Media Player 11 on
Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows Media Player 11 on
Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Media Player 11 on
Windows Vista and
Windows Vista Service Pack 1
- Windows Media Player 11 on
Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Media Player 11 on
Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation not affected)
- Windows Media Player 11 on
Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation not affected)

- Impact: Remote Code Execution
- Version Number: 1.0

Windows Bulletin

- Affected Software:
- Microsoft Internet Explorer 6 on
Microsoft Windows 2000 Service Pack 4
- Microsoft .NET Framework 1.0 Service Pack 3 on
Microsoft Windows 2000 Service Pack 4
- Microsoft .NET Framework 1.1 Service Pack 1 on
Microsoft Windows 2000 Service Pack 4
- Microsoft .NET Framework 2.0 on
Microsoft Windows 2000 Service Pack 4
- Microsoft .NET Framework 2.0 Service Pack 1 on
Microsoft Windows 2000 Service Pack 4
- Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition and
Windows 2003 Server x64 Edition Service Pack 2
- Windows Server 2003 with SP1 for Itanium-based Systems and
Windows Server 2003 with SP2 for Itanium based Systems
- Windows Vista and
Windows Vista Service Pack 1
- Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation not affected)
- Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation not affected)
- Windows Server 2008 for Itanium-based Systems
- Microsoft Office XP Service Pack 3
- Microsoft Office 2003 Service Pack 2
- 2007 Microsoft Office System
- Microsoft Visio 2002 Service Pack 2
- Microsoft Office PowerPoint Viewer 2003
- Microsoft Works 8
- Microsoft Digital image Suite 2006
- QFE update for SQL 2000 Reporting Services Service Pack 2
when installed on Microsoft Windows 2000 Service Pack 4
- GDR update for SQL Server 2005 Service Pack 2
- QFE update for SQL Server 2005 Service Pack 2
- GDR update for SQL Server 2005 x64 Edition Service Pack 2
- QFE update for SQL Server 2005 x64 Edition Service Pack 2
- GDR update for SQL Server 2005 for Itanium-based Systems
Service Pack 2
- QFE update for SQL Server 2005 for Itanium-based Systems
Service Pack 2
- Microsoft Visual Studio .NET 2002 Service Pack 1
- Microsoft Visual Studio .NET 2003 Service Pack 1
- Microsoft Visual Studio 2005 Service Pack 1
- Microsoft Visual Studio 2008
- Microsoft Report Viewer 2005 Service Pack 1
Redistributable Package when installed on
Microsoft Windows 2000 Service Pack 4
- Microsoft Report Viewer 2008
Redistributable Package when installed on
Microsoft Windows 2000 Service Pack 4
- Microsoft Visual FoxPro 8.0 Service Pack 1
when installed on Microsoft Windows 2000 Service Pack 4
- Microsoft Visual FoxPro 9.0 Service Pack 1
when installed on Microsoft Windows 2000 Service Pack 4
- Microsoft Visual FoxPro 9.0 Service Pack 2
when installed on Microsoft Windows 2000 Service Pack 4
- Microsoft Platform SDK Redistributable: GDI+
- Microsoft Forefront Client Security 1.0 when installed on
Microsoft Windows 2000 Service Pack 4

- Impact: Remote Code Execution
- Version Number: 1.0


Windows Media Encoder Bulletin

- Affected Software:
- Windows Media Encoder 9 Series on
Microsoft Windows 2000 Service Pack 4
- Windows Media Encoder 9 Series on
Windows XP Service Pack 2 and
Windows XP Service Pack 3
- Windows Media Encoder 9 Series on
Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Media Encoder 9 Series x64 Edition on
Windows XP Professional x64 Edition and
Windows XP Professional x64 Edition Service Pack 2
- Windows Media Encoder 9 Series on
Windows Server 2003 Service Pack 1 and
Windows Server 2003 Service Pack 2
- Windows Media Encoder 9 Series on
Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Windows Media Encoder 9 Series x64 Edition on
Windows Server 2003 x64 Edition and
Windows Server 2003 x64 Edition Service Pack 2
- Windows Media Encoder 9 Series on
Windows Vista and
Windows Vista Service Pack 1
- Windows Media Encoder 9 Series on
Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Media Encoder 9 Series x64 Edition on
Windows Vista x64 Edition and
Windows Vista x64 Edition Service Pack 1
- Windows Media Encoder 9 Series on
Windows Server 2008 for 32-bit Systems
(Windows Server 2008 Server Core installation not affected)
- Windows Media Encoder 9 Series on
Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation not affected)
- Windows Media Encoder 9 Series x64 Edition on
Windows Server 2008 for x64-based Systems
(Windows Server 2008 Server Core installation not affected)

- Impact: Remote Code Execution
- Version Number: 1.0

Office Bulletin

- Affected Software:
- Microsoft Office XP Service Pack 3
- Microsoft Office 2003 Service Pack 2
- Microsoft Office 2003 Service Pack 3
- 2007 Microsoft Office System
- 2007 Microsoft Office System Service Pack 1
- Microsoft Office OneNote 2007
- Microsoft Office OneNote 2007 Service Pack 1

- Impact: Remote Code Execution
- Version Number: 1.0


Other Information
=================

Microsoft Windows Malicious Software Removal Tool:
==================================================
Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services, and the Download Center.

Non-Security, High-Priority Updates on MU, WU, and WSUS:
========================================================
For information about non-security releases on Windows Update and
Microsoft
update, please see:
* http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
Article 894199, Description of Software Update Services and
Windows Server Update Services changes in content for 2008.
Includes all Windows content.
* http://technet.microsoft.com/en-us/wsus/bb466214.aspx: New,
Revised, and Released Updates for Microsoft Products Other Than
Microsoft Windows

Collapse -
Wireshark 1.0.3 released
by Marianna Schmudlach / September 4, 2008 10:15 AM PDT

Published: 2008-09-04,
Last Updated: 2008-09-04 18:18:29 UTC
by Chris Carboni

Wireshark 1.0.3 has been released and fixes several vulnerabilities that affect versions 0.9.7 to 1.0.2 inclusive.

The NCP dissector was susceptible to a number of problems, including buffer overflows and an infinite loop.
Versions affected: 0.9.7 to 1.0.2

Wireshark could crash while uncompressing zlib-compressed packet data.
Versions affected: 0.10.14 to 1.0.2

Wireshark could crash while reading a Tektronix .rf5 file.
Versions affected: 0.99.6 to 1.0.2

More: http://isc.sans.org/

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

HOLIDAY GIFT GUIDE 2017

Cameras that make great holiday gifts

Let them start the new year with a step up in photo and video quality from a phone.