Microsoft Security Bulletin MS07-026: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (931832)

Interesting .. http://www.microsoft.com/technet/security/bulletin/ms07-026.mspx

This update resolves several newly discovered, privately reported vulnerabilities. Each vulnerability is documented in its own subsection in the Vulnerability Details section of this bulletin.

An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

We recommend that customers apply the update immediately.

Microsoft Exchange 2000 Server Service Pack 3 with the Exchange 2000 Post-Service Pack 3 Update Rollup of August 2004 — Download the update (KB931832)

Microsoft Exchange Server 2003 Service Pack 1 — Download the update (KB931832)

Microsoft Exchange Server 2003 Service Pack 2 — Download the update (KB931832)

Microsoft Exchange Server 2007 — Download the update (KB935490)

Outlook Web Access Script Injection Vulnerability
An information disclosure vulnerability exists in Microsoft Exchange in the way that Outlook Web Access (OWA) handles script-based attachments. An attached script could spoof content, disclose information, or take any action that the user could take within the context of the OWA session.

Affects:
Microsoft Exchange Server 2000 Service Pack 3    
Microsoft Exchange Server 2003 Service Pack 1
Microsoft Exchange Server 2003 Service Pack 2

Malformed iCal Vulnerability
A denial of service vulnerability exists in Microsoft Exchange Server because of the way that it handles calendar content requests. An attacker could exploit the vulnerability by sending an e-mail message with specially crafted iCal file to a Microsoft Exchange Server user account. An attacker successfully exploiting this vulnerability could cause the mail service to stop responding.    

Affects:
Microsoft Exchange Server 2000 Service Pack 3    
Microsoft Exchange Server 2003 Service Pack 1
Microsoft Exchange Server 2003 Service Pack 2
Microsoft Exchange Server 2007

MIME Decoding Vulnerability
A remote code execution vulnerability exists in Microsoft Exchange Server because of the way that it decodes specially crafted e-mail messages. An attacker could exploit the vulnerability by sending a specially crafted e-mail to a Microsoft Exchange Server user account. An attacker who successfully exploited this vulnerability could take complete control of an affected system.
    
Affects:
Microsoft Exchange Server 2000 Service Pack 3    
Microsoft Exchange Server 2003 Service Pack 1
Microsoft Exchange Server 2003 Service Pack 2
Microsoft Exchange Server 2007

IMAP Literal Processing Vulnerability
A denial of service vulnerability exists in Microsoft Exchange Server because of the way that it handles invalid IMAP requests. An attacker could exploit the vulnerability by sending a specially crafted IMAP command to a Microsoft Exchange Server configured as an IMAP server. An attacker successfully exploiting this vulnerability could cause the mail service to stop responding.

Affects:
Microsoft Exchange Server 2000 Service Pack 3    

Apple megapatch fixes multiple flaws

ooops


Source: http://www.theregister.co.uk/2007/03/14/apple_megapatch/

Apple has released a security update to its Mac OS X operating systems to plug multiple security holes. Bugs in third-party components have also been addressed by the security update.

The availability of Mac OS X 10.4.9 and Security Update 2007-003 on Tuesday follows a month in which the security of the OS was put under the spotlight by the Month of Apple Bugs project, which took place in January and November’s Month of Kernel Bugs.

Adobe Reader Multiple Vulnerabilities

How cool is this for a bug. Dead easy to replicate and potentially very deadly! Basically it is possible to pass parameters toa pdf doc to do things to it.  Check out this link (http://www.disenchant.ch/blog/hacking-with-browser-plugins/34)

Would seem it only affects Adobe Reader 6.x and 7.x. On  my vista machine it tells me of an issue loading the page and I get the option to reload it and that takes off everything after the #


Source: http://secunia.com/advisories/23483

Stefano Di Paola and Giorgio Fedon have discovered some vulnerabilities in Adobe Reader, which can be exploited by malicious people to conduct cross-site scripting attacks, cross-site request forgery attacks, cause a DoS (Denial of Service), or to compromise a user’s system.

1) Input passed to a hosted PDF file is not properly sanitised by the browser plug-in before being returned to users.


Try this to see if you need to patch your pdf reader: http://www.adobe.com/products/acrobat/pdfs/AdobePDFSecurityGuide.pdf#something=javascript:alert(window.navigator.userAgent)

Real-World Passwords

Be afraid, very afraid


Source: http://www.schneier.com/blog/archives/2006/12/realworld_passw.html and http://www.wired.com/news/columns/0,72300-0.html

… The attack was pretty basic. The attackers created a fake MySpace login page, and collected login information when users thought they were accessing their own account on the site. The data was forwarded to various compromised web servers, where the attackers would harvest it later.

MySpace estimates that more than 100,000 people fell for the attack before it was shut down. The data I have is from two different collection points, and was cleaned of the small percentage of people who realized they were responding to a phishing attack. I analyzed the data, and this is what I learned.

Common Passwords: The top 20 passwords are (in order): password1, abc123, myspace1, password, blink182, qwerty1, fuckyou, 123abc, baseball1, football1, 123456, soccer, monkey1, liverpool1, princess1, jordan23, slipknot1, superman1, iloveyou1 and monkey. (Different analysis here.)

The most common password, “password1,” was used in 0.22 percent of all accounts. The frequency drops off pretty fast after that: “abc123” and “myspace1” were only used in 0.11 percent of all accounts, “soccer” in 0.04 percent and “monkey” in 0.02 percent