Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES - July 1, 2005

Internet Explorer "javaprxy.dll" Memory Corruption Vulnerability

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
From remote

SOFTWARE:
Microsoft Internet Explorer 6.x
http://secunia.com/product/11/
Microsoft Internet Explorer 5.5
http://secunia.com/product/10/
Microsoft Internet Explorer 5.01
http://secunia.com/product/9/

DESCRIPTION:
SEC Consult has reported a vulnerability in Microsoft Internet
Explorer, which potentially can be exploited by malicious people to
compromise a user's system.

The vulnerability is caused due to the javaprxy.dll COM object being
instantiated incorrectly in Internet Explorer via the object tag.
This can be exploited via a malicious web site to cause a memory
corruption.

Successful exploitation may allow execution of arbitrary code.

The vulnerability has been reported in versions 5.01, 5.5, and 6.0.

SOLUTION:
The vendor recommends setting Internet and Local intranet security
zone settings to "High".

PROVIDED AND/OR DISCOVERED BY:
sk0L and Martin Eiszner, SEC Consult.

http://secunia.com/advisories/15891/

Discussion is locked
You are posting a reply to: VULNERABILITIES - July 1, 2005
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES - July 1, 2005
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Prevx Pro 2005 Intrusion Prevention Feature Bypass

In reply to: VULNERABILITIES - July 1, 2005

TITLE:
Prevx Pro 2005 Intrusion Prevention Feature Bypass

SECUNIA ADVISORY ID:
SA15885

VERIFY ADVISORY:
http://secunia.com/advisories/15885/

CRITICAL:
Less critical

IMPACT:
Security Bypass

WHERE:
Local system

SOFTWARE:
Prevx Pro 2005 1.x
http://secunia.com/product/5317/

DESCRIPTION:
Tri Huynh has discovered two vulnerabilities in Prevx Pro 2005, which
can be exploit to bypass security features provided by the product.

1) Incorrect handling of memory mapped files allows protected files
that are mapped into memory using "MapViewOfFile()" to be written.
This can be exploited to bypass the product's file protection
security feature.

2) The driver does not validate the sender of received device I/O
control codes. This allows a user-space program to bypass the
product's security features by sending specific I/O control codes to
the driver.

The vulnerabilities have been confirmed in version 1.0. Other
versions may also be affected.

SOLUTION:
Do not run untrusted programs.

PROVIDED AND/OR DISCOVERED BY:
Tri Huynh

Collapse -
Microsoft Windows NTFS Information Disclosure

In reply to: VULNERABILITIES - July 1, 2005

Matthew Murphy reported in SecurityFocus Bugtraq that there is an error in the NTFS driver's code causes the file system to incorrectly assign disk blocks to files before they have been initialized. Following a recovery from a system shutdown, uninitialized data may be visible in files from previously allocated disk blocks.

The impact as per Murphy is a local unprivileged users may gain access to confidential information that is stored on affected systems. This may allow access to unrelated services such as web accounts, or further compromise of the affected system's host network.

Affected Systems:
* Microsoft Windows 2000
* Microsoft Windows XP
* Microsoft Windows Server 2003

A service pack fix from Microsoft will be issued as per the report.

Collapse -
Phishing problems on MSN

In reply to: VULNERABILITIES - July 1, 2005

Giovanni Delvecchio discovered a multiple phishing problems exist on support.msn.com, permitting to a possible attacker to conduct phishing attack against a user.

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

GRAMMYS 2019

Here's Everything to Know About the 2019 Grammys

Find out how to watch the Grammy Awards if you don't have cable and more.