Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VULNERABILITIES - January 10, 2006

Jan 9, 2006 8:54PM PST

TITLE:
ClamAV Unspecified UPX File Handling Vulnerability

SECUNIA ADVISORY ID:
SA18379

VERIFY ADVISORY:
http://secunia.com/advisories/18379/

CRITICAL:
Moderately critical

IMPACT:
Unknown

WHERE:
From remote

SOFTWARE:
Clam AntiVirus (clamav) 0.x
http://secunia.com/product/2538/

DESCRIPTION:
A vulnerability has been reported in ClamAV, which potentially can be
exploited by malicious people with an unknown impact.

The vulnerability is caused due to an unspecified boundary error in
"libclamav/upx.c". This can potentially be exploited to cause a
heap-based buffer overflow via a specially-crafted UPX packed file.

SOLUTION:
Update to version 0.88.
http://www.clamav.net/stable.php#pagestart

PROVIDED AND/OR DISCOVERED BY:
The vendor credits 3Com's Zero Day Initiative.

ORIGINAL ADVISORY:
http://www.clamav.net/doc/0.88/ChangeLog

Discussion is locked

- Collapse -
Microsoft Windows Embedded Web Fonts Arbitrary Code Executio
Jan 10, 2006 5:04AM PST

TITLE:
Microsoft Windows Embedded Web Fonts Arbitrary Code Execution
Vulnerability

SECUNIA ADVISORY ID:
SA18365

VERIFY ADVISORY:
http://secunia.com/advisories/18365/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
From remote

OPERATING SYSTEM:
Microsoft Windows 2000 Advanced Server
http://secunia.com/product/21/
Microsoft Windows 2000 Datacenter Server
http://secunia.com/product/1177/
Microsoft Windows 2000 Professional
http://secunia.com/product/1/
Microsoft Windows 2000 Server
http://secunia.com/product/20/
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows XP Professional
http://secunia.com/product/22/

DESCRIPTION:
A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a memory corruption error when
handling malformed embedded Web fonts. This can be exploited to
execute arbitrary code when a user visits a malicious website or
views an e-mail message that contains a specially-crafted embedded
Web font.

SOLUTION:
Apply patches.

Microsoft Windows 2000 (requires Service Pack 4):
http://www.microsoft.com/downloads/details.aspx?FamilyId=DC6C2FE8-3C81-4661-994B-4146775BF590

Microsoft Windows XP (requires Service Pack 1 or 2):
http://www.microsoft.com/downloads/details.aspx?FamilyId=6DAEA2AF-3723-4CDF-B5BD-B21AC75B5243

Microsoft Windows XP Professional x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1990B2CF-AE88-4849-AEAB-3F833969E197

Microsoft Windows Server 2003 (with or without Service Pack 1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=5FC12654-486F-45BF-8D34-BDF0998869C5

Microsoft Windows Server 2003 (Itanium) (with or without SP1):
http://www.microsoft.com/downloads/details.aspx?FamilyId=E39D2E29-8934-4AA1-844D-11EFA57D9CC5

Microsoft Windows Server 2003 x64 Edition:
http://www.microsoft.com/downloads/details.aspx?FamilyId=80B05C56-5BCE-4262-8142-AF0D8A7BC388

See vendor's advisory for information about Microsoft Windows 98,
Microsoft Windows 98 Second Edition (SE), and Microsoft Windows
Millennium Edition (ME).

PROVIDED AND/OR DISCOVERED BY:
The vendor credits eEye Digital Security.

ORIGINAL ADVISORY:
MS06-002 (KB908519):
http://www.microsoft.com/technet/security/Bulletin/MS06-002.mspx

- Collapse -
Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code Ex
Jan 10, 2006 6:01AM PST

TITLE:
Microsoft Outlook / Exchange TNEF Decoding Arbitrary Code Execution
Vulnerability

SECUNIA ADVISORY ID:
SA18368

VERIFY ADVISORY:
http://secunia.com/advisories/18368/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
From remote

SOFTWARE:
Microsoft Exchange 2000 Enterprise Server
http://secunia.com/product/42/
Microsoft Exchange 5
http://secunia.com/product/177/
Microsoft Exchange 5.5
http://secunia.com/product/148/
Microsoft Exchange Server 2000
http://secunia.com/product/41/
Microsoft Outlook 2000
http://secunia.com/product/33/
Microsoft Outlook 2002
http://secunia.com/product/34/
Microsoft Outlook 2003
http://secunia.com/product/3292/

DESCRIPTION:
A vulnerability has been reported in Microsoft Outlook / Exchange,
which can be exploited by malicious people to compromise a vulnerable
system.

The vulnerability is caused due to boundary error when decoding the
Transport Neutral Encapsulation Format (TNEF) MIME attachment. This
can be exploited to execute arbitrary code when the user opens or
previews a specially crafted TNEF email message or when the Microsoft
Exchange Server Information Store processes the message.

SOLUTION:
Apply patches.

-- Microsoft Office 2000 Service Pack 3 --

Microsoft Outlook 2000:
http://www.microsoft.com/downloads/details.aspx?FamilyId=64D0336D-F962-4AB1-A724-9F6BA2108CB9

Microsoft Office 2000 MultiLanguage Packs:
http://www.microsoft.com/downloads/details.aspx?FamilyId=2C0FA7C7-91AA-49B4-9731-9E83E3E0823D

Microsoft Outlook 2000 English MultiLanguage Packs:
http://www.microsoft.com/downloads/details.aspx?FamilyId=2C0FA7C7-91AA-49B4-9731-9E83E3E0823D

-- Microsoft Office XP Service Pack 3 --

Microsoft Outlook 2002:
http://www.microsoft.com/downloads/details.aspx?FamilyId=9A85CEBB-0D9A-465D-A4BC-AF501562772D

Microsoft Office XP Multilingual User Interface Packs:
http://www.microsoft.com/downloads/details.aspx?FamilyId=CCA9399A-6DA3-4163-8398-C58DC328182B

-- Microsoft Office 2003 Service Pack 1 and Service Pack 2 --

Microsoft Outlook 2003:
http://www.microsoft.com/downloads/details.aspx?FamilyId=1D156043-B041-4305-8442-3C4E3B832788

Microsoft Office 2003 Multilingual User Interface Packs:
http://www.microsoft.com/downloads/details.aspx?FamilyId=D69554AD-196F-4789-91E5-B2A753EED854

Microsoft Office 2003 Language Interface Packs:
http://www.microsoft.com/downloads/details.aspx?FamilyID=db080de8-8193-4c32-9019-9980ecd6874a

-- Microsoft Exchange Server --

Microsoft Exchange Server 5.0 Service Pack 2:
http://www.microsoft.com/downloads/details.aspx?FamilyId=0A8DF1C3-ABF9-4A21-9B49-81FA362B251F

Microsoft Exchange Server 5.5 Service Pack 4:
http://www.microsoft.com/downloads/details.aspx?FamilyId=EC6BD30E-12DE-4CA1-9432-D2E73AF62427

Microsoft Exchange 2000 Server Pack 3 (with the Exchange 2000
Post-Service Pack 3 Update Rollup of August 2004):
http://www.microsoft.com/downloads/details.aspx?FamilyId=372FF07F-C3CA-4301-8559-9B90344EDC02

Note: Microsoft Exchange Server 2003 SP1/SP2 are not affected.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits John Heasman and Mark Litchfield of NGS Software.

ORIGINAL ADVISORY:
MS06-003 (KB902412):
http://www.microsoft.com/technet/security/Bulletin/MS06-003.mspx