Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VULNERABILITIES - January 11, 2006

Jan 10, 2006 11:10PM PST

TITLE:
QuickTime Multiple Image/Media File Handling Vulnerabilities

SECUNIA ADVISORY ID:
SA18370

VERIFY ADVISORY:
http://secunia.com/advisories/18370/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

SOFTWARE:
Apple QuickTime 7.x
http://secunia.com/product/5090/

DESCRIPTION:
Some vulnerabilities have been reported in Apple QuickTime, which can
be exploited by malicious people to cause a DoS (Denial of Service)
and potentially to compromise a user's system.

1) A boundary error in the handling of QTIF images can be exploited
to cause a heap-based buffer overflow. This may allow arbitrary code
execution when a malicious QTIF image is viewed.

2) Some boundary and integer overflow/underflow errors in the
handling of TGA images can be exploited to cause a buffer overflow.
This may allow arbitrary code execution when a malicious TGA image is
viewed.

3) An integer overflow error exists in the handling of TIFF images.
This can potentially be exploited to execute arbitrary code when a
malicious TIFF image is viewed.

4) A boundary error in the handling of GIF images can be exploited to
cause a heap-based buffer overflow. This may allow arbitrary code
execution when a malicious GIF image is viewed.

5) A boundary error in the handling of certain media files can be
exploited to cause a heap-based buffer overflow. This may allow
arbitrary code execution when a malicious media file is viewed.

The vulnerabilities affect both the Mac OS X and the Windows
platforms.

SOLUTION:
Update to version 7.0.4.

Mac OS X (version 10.3.9 or later):
http://www.apple.com/support/downloads/quicktime704.html

Windows 2000/XP:
http://www.apple.com/quicktime/download/win.html

PROVIDED AND/OR DISCOVERED BY:
1) Varun Uppal, Kanbay.
2-3) Dejun Meng, Fortinet.
4-5) Karl Lynn, eEye Digital Security.

ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=303101

Discussion is locked

- Collapse -
Symantec Norton SystemWorks Protected Recycle Bin Weakness
Jan 10, 2006 11:15PM PST

TITLE:
Symantec Norton SystemWorks Protected Recycle Bin Weakness

SECUNIA ADVISORY ID:
SA18402

VERIFY ADVISORY:
http://secunia.com/advisories/18402/

CRITICAL:
Not critical

IMPACT:
Security Bypass

WHERE:
Local system

SOFTWARE:
Symantec Norton SystemWorks 2005
http://secunia.com/product/4847/
Symantec Norton SystemWorks 2006
http://secunia.com/product/6636/

DESCRIPTION:
A weakness has been reported in Norton SystemWorks, which can be
exploited by malicious, local users, or by malware, to bypass certain
security restrictions.

The weakness is caused due to a design error in SystemWorks in which
files within the NProtect directory of the Norton Protected Recycle
Bin are hidden from the "FindFirst/FindNext" Windows APIs. This
prevents virus scanning software from detecting malicious or
virus-infected files that are placed in the directory. On-access
virus scanners reportedly are still able to detect the malicious
files when they are accessed.

The weakness has been reported in the following versions.
* Norton SystemWorks 2005/2006
* Norton SystemWorks Premier 2005/2006

SOLUTION:
Apply the patch by running LiveUpdate.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Mark Russinovich of Sysinternals and the F-Secure
Blacklight team.

ORIGINAL ADVISORY:
http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html

- Collapse -
Microsoft Visual Studio User Control Load Event Code Executi
Jan 11, 2006 12:40AM PST

TITLE:
Microsoft Visual Studio User Control Load Event Code Execution
Vulnerability

SECUNIA ADVISORY ID:
SA18409

VERIFY ADVISORY:
http://secunia.com/advisories/18409/

CRITICAL:
Less critical

IMPACT:
System access

WHERE:
From remote

SOFTWARE:
Microsoft Visual Studio 2005
http://secunia.com/product/6779/

DESCRIPTION:
priestmaster has discovered a vulnerability in Microsoft Visual
Studio, which can be exploited by malicious people to compromise a
user's system.

The vulnerability is caused due to a design error that allows program
code within the "Load" event of a user-defined control to be
automatically executed when a project containing a form that uses the
malicious control is opened. This can be exploited to execute
arbitrary program code.

Successful exploitation requires that the user is e.g. tricked into
opening a Solution file in a malicious Visual Studio project.

The vulnerability has been confirmed in Microsoft Visual C# 2005
Express Edition. Other versions may also be affected.

SOLUTION:
Do not open Visual Studio project files from untrusted sources.

PROVIDED AND/OR DISCOVERED BY:
priestmaster