Spyware, Viruses, & Security forum

General discussion

Vulnerablities December 17, 2004

by roddy32 / December 16, 2004 10:55 PM PST

TITLE:
Roxio Toast Format String Vulnerability

SECUNIA ADVISORY ID:
SA13476

VERIFY ADVISORY:
http://secunia.com/advisories/13476/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

SOFTWARE:
Roxio Toast 6.x
http://secunia.com/product/4383/

DESCRIPTION:
fintler has reported a vulnerability in Roxio Toast, which can be
exploited by malicious, local users to gain escalated privileges.

The vulnerability is caused due to a format string error in the
argument handling. This can be exploited by supplying a specially
crafted argument.

Successful exploitation can lead to execution of arbitrary code with
escalated privileges.

SOLUTION:
Remove the setuid bit from "/Library/Application
Support/Roxio/TDIXSupport". This may affect the functionality.

PROVIDED AND/OR DISCOVERED BY:
fintler

Discussion is locked
You are posting a reply to: Vulnerablities December 17, 2004
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: Vulnerablities December 17, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Symantec Brightmail Denial of Service Vulnerabilities
by roddy32 / December 16, 2004 10:57 PM PST

TITLE:
Symantec Brightmail Denial of Service Vulnerabilities

SECUNIA ADVISORY ID:
SA13489

VERIFY ADVISORY:
http://secunia.com/advisories/13489/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
From remote

SOFTWARE:
Symantec Brightmail Anti-Spam 6.x
http://secunia.com/product/3656/

DESCRIPTION:
Two vulnerabilities have been reported in Symantec Brightmail, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

1) The Sieve module fails to recognise malformed RFC 822 MIME
attachment boundaries. Processing several attachments with malformed
boundaries causes the bmserver to consume large amounts of memory,
which can be exploited to consume all available memory and crash the
service.

2) Spamhunter fails to convert certain valid character encoding sets
to UTF. Reportedly, this causes the engine to crash and core dump.

Brightmail AntiSpam 6.0.1 has been reported vulnerable.

SOLUTION:
Apply patch 134:
ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/Patch134.zip

PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.

ORIGINAL ADVISORY:
ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p134_notes.htm

Collapse -
Windows XP Firewall Dial-Up Security Issue
by Donna Buenaventura / December 17, 2004 2:39 AM PST

OS: Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

A security issue has been reported in Windows XP SP2, which erroneously causes the firewall to allow connections from the Internet.

The problem is caused by the way certain dialers configure the routing table and how local subnets are interpreted when the "My network (subnet) only" option is used in the Microsoft Windows Firewall.

This issue only affects Windows XP with Service Pack 2 in combination with a dial-up network connection.

Solution:
Apply update: http://www.microsoft.com/downloads/details.aspx?familyid=da66a0ac-55ca-4591-b3e6-d78695899141&displaylang=en

http://secunia.com/advisories/13492/

Collapse -
Adobe Acrobat/Acrobat Reader ETD File Parser Format String
by Donna Buenaventura / December 17, 2004 8:14 AM PST

Vulnerability

Vulnerable
Adobe Acrobat 6.0
Adobe Acrobat 6.0.1
Adobe Acrobat 6.0.2
Adobe Acrobat Reader 6.0
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 6.0.2

Not vulnerable
Adobe Acrobat 6.0.3
Adobe Acrobat Reader 6.0.3

Adobe Acrobat/Acrobat Reader is reported prone to a remote format string vulnerability. The vulnerability is present in the ETD file parser when processing tag values. Reports indicate that the values supplied for certain tags are used as the format string in an unspecified formatted output function. Because an attacker can control the format string and the variables passed to the formatted output function, this vulnerability may be exploited to write to arbitrary locations within the memory of the process.

The vendor has released the following updates to address this vulnerability:

Adobe Acrobat 6.0:

Adobe Upgrade Acrobat 6.0.3 update for Windows
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2677

Adobe Upgrade Acrobat 6.0.3 update for Mac
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2676

Adobe Acrobat Reader 6.0:

Adobe Upgrade Acrobat Reader 6.0.3 update for Windows
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679

Adobe Upgrade Acrobat Reader 6.0.3 update for Mac
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2680

Adobe Acrobat Reader 6.0.1:

Adobe Upgrade Acrobat Reader 6.0.3 update for Windows
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679

Adobe Upgrade Acrobat Reader 6.0.3 update for Mac
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2680

Adobe Acrobat 6.0.1:

Adobe Upgrade Acrobat 6.0.3 update for Windows
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2677

Adobe Upgrade Acrobat 6.0.3 update for Mac
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2676

Adobe Acrobat 6.0.2:

Adobe Upgrade Acrobat 6.0.3 update for Windows
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2677

Adobe Upgrade Acrobat 6.0.3 update for Mac
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2676

Adobe Acrobat Reader 6.0.2:

Adobe Upgrade Acrobat Reader 6.0.3 update for Windows
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2679

Adobe Upgrade Acrobat Reader 6.0.3 update for Mac
http://www.adobe.com/support/downloads/detail.jsp?ftpID=2680

http://www.securityfocus.com/bid/11934/discussion/

Collapse -
I think this
by roddy32 / December 17, 2004 9:02 AM PST

is along the same line as what I reported for a different vulnerability a couple of days ago so those people that updated to v6.0.3 then should be ok as it says earlier in your post Donna that 6.0.3 is not vulnerable. The download links are the same. I'm only bringing this up so those , like myself that already updated a couple of days ago don't panic again today LOL.

http://reviews.cnet.com/5208-6132-0.html?forumID=32&threadID=51306&messageID=610940

Collapse -
(NT) (NT) No panic here... already had solution couple days ago ;
by glenn30 / December 17, 2004 9:15 AM PST
In reply to: I think this
Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

GIVEAWAY

Turn up the volume with our Apple Byte sweeps!

Two lucky winners will take home the coveted smart speaker that lets Siri help you around your connected house. This sweepstake ends Feb. 25, 2018.