Spyware, Viruses, & Security forum

General discussion

Vulnerability - April 21, 2004

by Donna Buenaventura / April 21, 2004 1:27 AM PDT

Internet Explorer Object Element Data Denial Of Service Vulnerability

A denial of service vulnerability has been reported in Microsoft Internet Explorer. This condition may occur when a malicious web page specifies an Object element with a data property that has a value of "?" or "#" in addition to specifying a type property that refers to an image type. The vulnerability will reportedly cause the browser to crash

http://www.securityfocus.com/bid/10167

Discussion is locked
You are posting a reply to: Vulnerability - April 21, 2004
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: Vulnerability - April 21, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Multiple systems affected by a vulnerability in TCP
by Marianna Schmudlach / April 21, 2004 6:15 AM PDT

Madrid, April 21, 2004 - US-CERT/CC has published, at
http://www.us-cert.gov/cas/techalerts/TA04-111A.html, an advisory about a
vulnerability in TCP that could allow a malicious user to carry out denial
of service attacks.

This is a serious problem, as multiple implementations of the BGP (Border
Gateway Protocol) rely on TCP to maintain permanent unauthenticated network
sessions. Therefore, the vulnerability detected could allow remote attackers
to terminate network sessions.

Although BGP (designed to exchange information between routers and other
devices) has been identified as vulnerable, the problem could affect any
other protocol or service that rely on persistent TCP connections.

Some manufacturers, such as Cisco (*), have already published advisories
about the impact of this vulnerability on their systems.

As a workaround, users are recommended to implement and use
cryptographically secure protocols. Similarly, users are advised to keep
informed about the updates published by the manufacturers of affected
products.

(*) The advisories published by Cisco are available at:
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml

Collapse -
Symantec Security Response: Symantec Client Firewall Denial of Service Vulnerability
by Donna Buenaventura / April 21, 2004 1:24 PM PDT

Risk Impact
High

Overview
eEye Digital Security notified Symantec Corporation of a severe Denial of Service vulnerability they discovered in the Symantec Client Firewall products for Windows. By properly exploiting this issue, an attacker could render the targeted system inoperable.

Affected Components
Consumer:
Symantec Norton Internet Security and Professional 2003, 2004
Symantec Norton Personal Firewall 2003, 2004
Corporate:
Symantec Client Firewall 5.01, 5.1.1
Symantec Client Security 1.0 and 1.1

Details
eEye Digital Security notified Symantec of a Denial of Service vulnerability they found during product testing against Symantec's client firewall applications. By directing a specifically formatted TCP attack against a target system running a vulnerable Symantec application, an attacker can cause a complete system halt. As a result, the targeted system would require a system reboot to clear the problem.

Symantec Response
Symantec confirmed the vulnerability reported by eEye Digital Security. Symantec product engineers have developed fixes for the issue and released patches for all impacted products through Symantec LiveUpdate and technical support channels.

Clients using retail versions of Symantec Norton Internet Security and Symantec Norton Personal Firewall who regularly run Symantec LiveUpdate should already be protected against this issue. However, to be sure they are fully protected, customers should run Symantec LiveUpdate manually to ensure all available updates are installed.
Open any installed Symantec product
Click on LiveUpdate in the toolbar
Run LiveUpdate until Symantec LiveUpdate indicated that all installed Symantec products are up-to-date

Clients running corporate versions of Symantec Client Firewall or Symantec Client Security should download and apply patches obtained through their appropriate support channels.

Symantec is not aware of any active attempts against or customer impact from this issue.

http://www.symantec.com/avcenter/security/Content/2004.04.20.html

Collapse -
Eeye: "Yahoo! Mail" Account Filter Overflow Hijack
by Donna Buenaventura / April 21, 2004 2:33 PM PDT

Release Date:
April 19, 2004

Date Reported:
March 10, 2004

Severity:
High

Vendor:
Yahoo!

Description:
"Yahoo! Mail" is one of the Internet's most popular web based email solutions. They provide free email and large capacity storage, as well as subscription-based services such as mail forwarding, expanded storage and personalized email addresses.

eEye Digital Security has discovered a security hole in "Yahoo! Mail" which allows a remote attacker to take over an account remotely by sending a specially crafted email.

Protection:
Yahoo! Mail is a hosted, web based service, hence users do not need to patch.

Vendor Status:
Yahoo! has been notified and has rectified the issue.

Credit:
Drew Copley, eEye Digital Security, Research Engineer
thanks to "http-equiv" for additional research

http://www.eeye.com/html/Research/Advisories/AD20040419.html

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

FALL TV PREMIERES

Your favorite shows are back!

Don’t miss your dramas, sitcoms and reality shows. Find out when and where they’re airing!