[Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems'

Notification of New Vulnerabilties to Windows Systems Fixlet Messages winvulns-announcements at bigmail.bigfix.com
Wed Jan 27 05:21:12 PST 2016


Fixlet Site - 'Vulnerabilities to Windows Systems'
Current Version: 471	Published: Tue, 26 Jan 2016 17:47:26  GMT

New Fixlets:
============

***************************************************************
Title: Retired Site: Vulnerabilities to Windows - BETA
Severity: <Unspecified>
Fixlet ID: 12

Fixlet Description: The listed computers are subscribed to the retired "Vulnerabilities to Windows Systems BETA" Fixlet site. The site has been replaced by the "Vulnerabilities to Windows Systems" Fixlet site and will no longer be updated or supported by BigFix. Please contact your BigFix sales representative for information on how to migrate to the new site. You will be asked to unsubscribe from the BETA site and subscribe to the new "Vulnerabilities to Windows Systems" Fixlet site.

***************************************************************
Title: Internet Explorer Memory Corruption Vulnerability – CVE-2015-6066 (MS15-112)
Severity: High
Fixlet ID: 37602
Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A376
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6066
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6070, CVE-2015-6071, CVE-2015-6074, CVE-2015-6076, and CVE-2015-6087.

***************************************************************
Title: MS Exchange / OWA NTLM Authentication Vulnerability
Severity: Medium
Fixlet ID: 47701
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval477.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0904
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Exchange 2003 and Outlook Web Access (OWA), when configured to use NTLM authentication, does not properly reuse HTTP connections, which can cause OWA users to view mailboxes of other users when Kerberos has been disabled as an authentication method for IIS 6.0, e.g. when SharePoint Services 2.0 is installed.

***************************************************************
Title: MS Word 97 Macro Names Buffer Overflow
Severity: High
Fixlet ID: 58501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval585.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0820
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.

***************************************************************
Title: MS Word 98 Macro Names Buffer Overflow
Severity: High
Fixlet ID: 58601
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval586.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0820
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.

***************************************************************
Title: MS FrontPage Server Extensions SmartHTML Denial of Service (Test 4)
Severity: Medium
Fixlet ID: 62501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval625.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0824
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.

***************************************************************
Title: MS Excel 97 Malicious Macro Security Bypass Vulnerability
Severity: High
Fixlet ID: 67501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval675.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0821
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.

***************************************************************
Title: MS FrontPage Server Extensions SmartHTML Denial of Service (Test 5)
Severity: Medium
Fixlet ID: 76201
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval762.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0824
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.

***************************************************************
Title: MS Windows Media Service Denial of Service
Severity: Medium
Fixlet ID: 84201
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval842.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0905
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Unknown vulnerability in Windows Media Station Service and Windows Media Monitor Service components of Windows Media Services 4.1 allows remote attackers to cause a denial of service (disallowing new connections) via a certain sequence of TCP/IP packets.

***************************************************************
Title: Server 2003 RPCSS DCOM Buffer Overflow
Severity: Medium
Fixlet ID: 89401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval894.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0813
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities.

***************************************************************
Title: Server 2003 RPCSS Service DCOM Activation Denial of Service
Severity: Medium
Fixlet ID: 95701
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval957.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0116
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: An Activation function in the RPCSS Service involved with DCOM activation for Microsoft Windows 2000, XP, and 2003 allows remote attackers to cause a denial of service (memory consumption) via an activation request with a large length field.

***************************************************************
Title: Veritas Backup Exec RestrictAnonymous Forced Misconfiguration Vulnerability
Severity: Medium
Fixlet ID: 103601
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval1036.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1117
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Veritas Backup Exec 8.5 and earlier requires that the "RestrictAnonymous" registry key for Microsoft Exchange 2000 must be set to 0, which enables anonymous listing of the SAM database and shares.

***************************************************************
Title: Crystal Reports Business Objects Directory Traversal
Severity: High
Fixlet ID: 115701
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval1157.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0204
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.

***************************************************************
Title: Excel 2002 File Handler Code Execution Vulnerability
Severity: High
Fixlet ID: 422601
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval4226.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0846
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Unknown vulnerability in Microsoft Excel 2000, 2002, 2001 for Mac, and v.X for Mac allows remote attackers to execute arbitrary code via a malicious file containing certain parameters that are not properly validated.



More information about the WinVulns-Announcements mailing list