START A PETITION 27,000,000 members: the world's largest community for good
START A PETITION
x
 
 
Vulnerabilities of Popular winUTILS; August 30, 2004 12:17 AM

In presumption that majority of active Care2 members are commonly - SMBs/SOHO/Personal users. In lieu of these, I have decided to post Windows 'Vulnerabilities' that involves popular UTILITIES (either Win-spawned or 3rd-parties') to help you PPLs avoid the pitfalls & danger lurking within your default OS. -Regards Indicated fixes that involves 'Patches' are dwnloadable from Microsoft's http://v4.windowsupdate.microsoft.com or click open your 'Start' button @desktop & look for Windows Update. Point your browser & click that to connect via the Net (of course, you should have your broadband up & running). Fixes that denote "MSxx-%#&!*%" are MS's Knowleadge Base Articles & can be search thru MS Update's URL address. For fixes that involves 'registry' changes or too technical for your comfort, DO PLEASE refer to your friendly neighbourhood ghostbusters (re: win-Geeks) for extended assistance. DO NOT ATTEMPT to do those unless you understand what you're involved in! Popular Win & 3rd-party Utils w/ vulnerabilities are listed within this discussion folder. Utilities that involved the newer XP-OS shall be posted under previous discussion folder 'Critical...'. Furthermore, win-OS that are 'asterisk-suffixed' indicates most commonly used OS by SMBs/SOHO users.  [ send green star]
 
... Eudora Hidden Attachment Execution; August 30, 2004 12:44 AM

class: Unknown cve: CAN-2001-1326 remote: Yes local: No published: May 29, 2001 updated: Jul 24, 2002 Vulnerable: Qualcomm Eudora v5.1 - Microsoft Windows 2000 Professional *** - Microsoft Windows 2000 Professional SP1 *** - Microsoft Windows 2000 Professional SP2 *** - Microsoft Windows 95 - Microsoft Windows 98 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 SP1 - Microsoft Windows NT 4.0 SP2 - Microsoft Windows NT 4.0 SP3 - Microsoft Windows NT 4.0 SP4 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP6a Also, Eudora v5.1.1 How? Eudora contains a vulnerability which may make it open for attackers to execute arbitrary code on a remote system even if 'allow executables in HTML content' is disabled...when the 'Use Microsoft viewer' option is enabled. The attack can be carried out if the recipient of a maliciously crafted email 'submits' a form in the message. This may lead to remote attackers gaining access to victim hosts. V5.1.1 is also stated as being vulnerable to this issue. The problem stems from Eudora not treating files of '.MHTML' extension with caution. Recommended Fixes - A workaround is to disable the 'Use Microsoft Viewer' option. Another workaround suggested by Doug Monroe is to change the following "registry" key: HKEY_CURRENT_USER/software/qualcomm/eudora/launchmanager/path#2 from "c:windowsapplication dataqualcommeudoraembedded" or "c:program filesqualcommeudora proembedded" to a different folder. Ensure this folder exists before restarting Eudora. Above Report is Credited to: (d_monroe) monwel@interhack.net -2002  [ send green star]
 
... win-Media Players (1/2); August 30, 2004 12:52 AM

(Note: Suffixed asterisk indicates most commonly used OS by SMBs & SOHO users) win-Media Player Automatic File Download & Execution. bugtraq: id 7640 class: Failure to Handle Exceptional Conditions cve: CVE-MAP-NOMATCH remote: Yes local: No published: May 21, 2003 updated: Oct 09, 2003 Vulnerable: Internet Explorer 6.0 SP1 Internet Explorer 6.0 - Microsoft Windows 2000 Advanced Server - Microsoft Windows 2000 Advanced Server SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Datacenter Server - Microsoft Windows 2000 Datacenter Server SP1 - Microsoft Windows 2000 Datacenter Server SP2 - Microsoft Windows 2000 Pro *** - Microsoft Windows 2000 Pro SP1 *** - Microsoft Windows 2000 Pro SP2 *** - Microsoft Windows 2000 Server *** - Microsoft Windows 2000 Server SP1 *** - Microsoft Windows 2000 Server SP2 *** - Microsoft Windows 2000 Terminal Services - Microsoft Windows 2000 Terminal Services SP1 - Microsoft Windows 2000 Terminal Services SP2 - Microsoft Windows 98 - Microsoft Windows 98SE *** - Microsoft Windows ME *** - Microsoft Windows NT Enterprise Server 4.0 SP6a - Microsoft Windows NT Server 4.0 SP6a - Microsoft Windows NT Workstation 4.0 SP6a + Microsoft Windows Server 2003 Datacenter + Microsoft Windows Server 2003 Datacenter 64-bit + Microsoft Windows Server 2003 Enterprise + Microsoft Windows Server 2003 Enterprise 64-bit + Microsoft Windows Server 2003 Standard Edition *** + Microsoft Windows Server 2003 Web Edition *** + Microsoft Windows XP Home *** + Microsoft Windows XP Professional *** Windows Media Player 7.0 - Microsoft Windows 2000 Pro *** - Microsoft Windows 2000 Pro SP1 *** - Microsoft Windows 2000 Pro SP2 *** - Microsoft Windows 95 - Microsoft Windows 98 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 SP1 - Microsoft Windows NT 4.0 SP2 - Microsoft Windows NT 4.0 SP3 - Microsoft Windows NT 4.0 SP4 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP6a Windows Media Player 7.1 - Microsoft Windows 98 - Microsoft Windows ME *** - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 SP1 - Microsoft Windows NT 4.0 SP2 - Microsoft Windows NT 4.0 SP3 - Microsoft Windows NT 4.0 SP4 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP6a NOT vulnerable; Microsoft Windows Media Player 9.0 + Microsoft Windows Server 2003 Datacenter + Microsoft Windows Server 2003 Datacenter 64-bit + Microsoft Windows Server 2003 Enterprise + Microsoft Windows Server 2003 Enterprise 64-bit + Microsoft Windows Server 2003 Standard Edition + Microsoft Windows Server 2003 Web Edition How? ...ctnd  [ send green star]
 
... win-Media Players (2/2); August 30, 2004 1:00 AM

ctnd... How? Windows Media Player reportedly allows for the automatic downloading and execution of files. This is done using a specifically crafted XMLNS (XML Name Space) URI embedded within an HTML email message. This is combined with the vulnerability described in BID 5543 to allow Windows Media Player to download and execute the referenced file without user intervention. Recommended Fixes - MS03-040 from Microsoft Knowledge Base article has addresses this particular IE Explorer issue. Goto MS's Update/Dwnload website for particulars. MS's Internet Explorer 6.0 SP1: MS Patch, Cumulative Patch for IE (828750) http://www.microsoft.com/windows/ie/downloads/critical/828750/default.asp All versions of Internet Explorer except for IE6.0 on Windows 2003. MS Patch Cumulative Patch for IE (828750) http://www.microsoft.com/windows/ie/downloads/critical/828750s/default.asp Internet Explorer 6.0 for Windows Server 2003. MS's Internet Explorer 6.0: MS Patch Cumulative Patch for IE (828750) http://www.microsoft.com/windows/ie/downloads/critical/828750/default.asp All versions of Internet Explorer except for IE6.0 on Windows 2003. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Above Report are Referenced frm: http://www.securityfocus.com/archive/1/322114 -2003  [ send green star]
 
:::Addendum/Supplementals::: August 30, 2004 8:00 PM

Refer To Above previous posting - Posted: 12:17am Re: ...Vulnerabilities of Popular winUTILS Addendum Ref: Paragraph five (5) "MSxx - *&^%$" SHOULD BE, "MSxx - xxxx". 'x' indicates numerics, based on article number conventions of MS's Knowledge Base library that also denotes 'patches or Hotfixes'. General Notes: Per my knowledge of MS's security fixes, 'Hotfixes' denotes Temporary Fixes wherein near-future cummulative or permanent 'patches' would be presented for dwnloads. So when you folks, dwnload 'Hotfixes', do L@@K OUT for the so called 'Cummulative' or 'RollUP' patches for a permanent solution to your OS's risks! 'Cummulative/RollUp' patches contain the sum of related previous Hotfixes 'released piecemeal' by MicroSofts. For every indicated update-dwnloads on WindowsUpdate site, there is an individual link as "Read More...", in blue. Click that & additional info of such patch & type are available.  [ send green star]
 
  New Topic              Back To Topics Read Code of Conduct

 

This group:
How To Harmonize Networking Chores via Optimization.
33 Members

View All Topics
New Topic

Track Topic
Mail Preferences