Spyware, Viruses, & Security forum

General discussion

VULNERABILITIES - September 14, 2004

by Marianna Schmudlach / September 14, 2004 6:18 AM PDT

Microsoft Office WordPerfect Converter Buffer Overflow Vulnerability

CRITICAL:
Moderately critical

IMPACT:
System access

WHERE:
From remote

SOFTWARE:
Microsoft Works Suite 2002
http://secunia.com/product/2144/
Microsoft Works Suite 2001
http://secunia.com/product/2145/
Microsoft Word 2002
http://secunia.com/product/2150/
Microsoft Word 2000
http://secunia.com/product/2149/
Microsoft Publisher 2002
http://secunia.com/product/30/
Microsoft Publisher 2000
http://secunia.com/product/29/
Microsoft Office XP
http://secunia.com/product/23/
Microsoft Office 2003 Student and Teacher Edition
http://secunia.com/product/2278/
Microsoft Office 2003 Standard Edition
http://secunia.com/product/2275/
Microsoft Office 2003 Small Business Edition
http://secunia.com/product/2277/
Microsoft Office 2003 Professional Edition
http://secunia.com/product/2276/
Microsoft Office 2000
http://secunia.com/product/24/
Microsoft Frontpage 2002
http://secunia.com/product/26/
Microsoft Frontpage 2000
http://secunia.com/product/27/
Microsoft Works Suite 2003
http://secunia.com/product/2143/
Microsoft Works Suite 2004
http://secunia.com/product/3897/

DESCRIPTION:
Peter Winter-Smith has reported a vulnerability in various Microsoft
Office products, which can be exploited by malicious people to
compromise a user's system.

The vulnerability is caused due to a boundary error within the
WordPerfect Converter and can be exploited to cause a buffer overflow
if a user opens a malicious document.

Successful exploitation may allow execution of arbitrary code with
the users privileges.

The vulnerability affects WordPerfect Converter 5.x, which is
included in various Microsoft Office products.

SOLUTION:
Microsoft has released updates.

More: http://secunia.com/advisories/12529/

Discussion is locked
You are posting a reply to: VULNERABILITIES - September 14, 2004
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VULNERABILITIES - September 14, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Microsoft Multiple Products JPEG Processing Buffer Overflow
by Marianna Schmudlach / September 14, 2004 6:20 AM PDT

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
From remote

OPERATING SYSTEM:
Microsoft Windows Server 2003 Datacenter Edition
http://secunia.com/product/1175/
Microsoft Windows Server 2003 Enterprise Edition
http://secunia.com/product/1174/
Microsoft Windows Server 2003 Standard Edition
http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition
http://secunia.com/product/1176/
Microsoft Windows XP Home Edition
http://secunia.com/product/16/
Microsoft Windows XP Professional
http://secunia.com/product/22/


MORE: http://secunia.com/advisories/12528/

Collapse -
Mozilla Multiple Vulnerabilities
by Marianna Schmudlach / September 14, 2004 6:30 AM PDT

CRITICAL:
Highly critical

IMPACT:
Cross Site Scripting, Manipulation of data, Exposure of sensitive
information, System access

WHERE:
From remote

SOFTWARE:
Mozilla Thunderbird 0.x
http://secunia.com/product/2637/
Mozilla Firefox 0.x
http://secunia.com/product/3256/
Mozilla 1.7.x
http://secunia.com/product/3691/
Mozilla 1.6
http://secunia.com/product/3101/
Mozilla 1.5
http://secunia.com/product/2478/
Mozilla 1.4
http://secunia.com/product/1481/
Mozilla 1.3
http://secunia.com/product/1480/
Mozilla 1.2
http://secunia.com/product/3100/
Mozilla 1.1
http://secunia.com/product/98/
Mozilla 1.0
http://secunia.com/product/97/
Mozilla 0.x
http://secunia.com/product/772/

DESCRIPTION:
Details have been released about several vulnerabilities in Mozilla,
Mozilla Firefox, and Thunderbird. These can potentially be exploited
by malicious people to conduct cross-site scripting attacks, access
and modify sensitive information, and compromise a user's system.

1) Various boundary errors in "nsMsgCompUtils.cpp" can be exploited
to cause heap-based buffer overflows when a specially crafted e-mail
is forwarded.

Successful exploitation can potentially lead to execution of
arbitrary code.

2) Insufficient restrictions on script generated events on text
fields can be exploited to read and write content from and to the
clipboard.

3) Boundary errors in the "writeGroup()" function in "nsVCardObj.cpp"
can be exploited to cause stack-based buffer overflows by sending an
e-mail containing a specially crafted vcard.

Successful exploitation may allow execution of arbitrary code but
requires that the malicious e-mail is opened in preview.

4) Some boundary errors in "nsPop3Protocol.cpp", which handles POP3
mail communication, can be exploited to cause buffer overflow by a
malicious POP3 mail server when sending specially crafted responses.


Successful exploitation may potentially allow execution of arbitrary
code.

5) A problem with overly long links containing a non-ASCII characters
can be exploited via a malicious website or e-mail to cause a buffer
overflow, which potentially can lead to execution of arbitrary code.

6) An integer overflows when parsing and displaying BMP files can
potentially be exploited to execute arbitrary code by supplying an
overly wide malicious BMP image via a malicious website or in an
e-mail.

7) Mozilla allows dragging links to another window or frame. This can
e.g be exploited by tricking a user on a malicious website to drag a
specially crafted javascript link to another window.

Successful exploitation can cause script code to execute in context
of that window. Further exploitation can in combination with another
unspecified vulnerability lead to execution of arbitrary code.

These vulnerabilities reportedly affect versions prior to the
following:
- Mozilla 1.7.3
- Firefox 1.0PR
- Thunderbird 0.8

SOLUTION:
The vulnerabilities have reportedly been fixed in:
- Mozilla 1.7.3
- Firefox 1.0PR
- Thunderbird 0.8

MORE: http://secunia.com/advisories/12526/

Collapse -
McAfee VirusScan System Scan Privilege Escalation
by Donna Buenaventura / September 14, 2004 7:16 AM PDT

Vulnerability

Release Date: 2004-09-14

Critical: Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Vendor Patch
Software: McAfee VirusScan 4.x

Ian Vitek has reported a vulnerability in McAfee VirusScan, which can be exploited by malicious, local users to gain escalated privileges on a vulnerable system.

The vulnerability is caused due to the process not dropping its privileges before accessing the "System Scan" properties via the system tray, which makes it possible to execute an arbitrary program with these privileges.

Successful exploitation allows execution of arbitrary commands with SYSTEM privileges.

The vulnerability has been reported in version 4.5.1. Prior versions may also be affected.

Solution: Reportedly, the vulnerability does not affect later versions.

http://secunia.com/advisories/12506/

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

Does BMW or Volvo do it best?

Pint-size luxury and funky style

Shopping for a new car this weekend? See how the BMW X2 stacks up against the Volvo XC40 in our side-by-side comparison.