Internet Security Issues; Page 2


Menu
Safety Issues Associated With Being Online All The Time
Warning; Websites Can Mess With your System
Patch Available for "Malformed Telnet Argument" Vulnerability OR
Others Can Excute Code on Your Computer
Patch Available for "Set Cookie Header Caching" Vulnerability
Web Site Operators CAN Operate YOUR Computer
Now Someone Else is Reading Your Email?
Malicious Web Site Or E-mail Message Can Cause Win 95/98 Crash
Update for "Javascript Redirect" Vulnerability in Internet Explorer 5
Patch Available for 'File Access URL' Vulnerability
Microsoft Security Bulletin (MS00-033); Vulnerabilities and Patches
Look Out For Advertising Spyware
Patch and Tool Available for "Protected Store Key Length" Vulnerability
Patch Available for "HTML Help File Code Execution" Vulnerability
Patch Available for "SSL Certificate Validation" Vulnerabilities
Patch Available for "Remote Registry Access Authentication" Vulnerability
Patch Available for "DTS Password" Vulnerability
Patch Available for "SQL Server 7.0 Service Pack Password" Vulnerability
Patch Available for "Desktop Separation" Vulnerability


Safety Issues Associated With Being Online All The Time

If your machine is always connected to the Net, it gives hackers more opportunity for mayhem. Keep in mind that even if you want to stay online all the time, many ISPs knock you offline after 15 minutes or so of inactivity. But let's put aside the issue of being a Net hog for a moment. What you are really asking is: Are people with a constant connection to the Internet opening themselves up to hacking? The answer is yes. When you are on the Net, you're on a network, and in theory, anyone else on the network can try to gain access to your computer. That's why most corporations use firewall software to protect their internal networks from unauthorized access.

Home users are less at risk in general, because hackers just aren't very interested in the kinds of information people generally keep on their family computers. And most home users have dial-up Internet accounts with dynamic IP addresses. With this type of account, your ISP randomly assigns you an address from a pool it owns each time you log on. This provides you with limited protection, since hackers never know exactly where or when you're online.

If you have a static IP address -- one that's permanently assigned to you -- it's easier for people to find you. This is the type of connection most businesses have -- and the kind cable modems provide. Obviously, if your machine is always connected to the Net, it gives hackers more opportunity for mayhem.

Chat lines, ICQ, Mirc and online gaming:
Be aware that are all things leave you vulnerable



Warning; Websites Can Mess With your System

Microsoft Security Bulletin (MS99-031):
Frequently Asked Questions

Malicious Java Applet may be able to Read, Write, or Delete Files on the Computer of a Web Site Visitor

What's this bulletin about?
Microsoft Security Bulletin MS99-031 announces the availability of a patch that eliminates a vulnerability in Microsoft VM. The vulnerability could allow a Java program on a web page to take virtually any action on the computer of a user who visited the page. Microsoft takes security seriously, and is providing the bulletin to inform customers of the vulnerability and what they can do about it.

What's the scope of the vulnerabilities?
This is a privilege elevation vulnerability. A web-hosted Java program could take virtually any action against visitors to the web site: it could create, delete or modify files on the user's computer, reformat the hard drive, copy data to or from a web page, or take other desired action.

Are all Java programs affected by this vulnerability?
No. There are two general classes of Java programs: Java applications, which are hosted on a local machine and run like any other program, and Java applets, which are hosted on web sites and run when a web site visitor arrives at a particular page. Java applets are treated differently from Java applications. Because they are untrusted code, the virtual machine runs them in a "sandbox" that restricts what they are allowed to do. In general, the sandbox is designed to prevent a Java applet from making any changes to the data on the user's computer. The vulnerability at issue here involves the sandboxing function, and so affects only Java applets.

What's the vulnerability?
A scenario has been identified through which a Java applet could escape the sandbox and be able to perform normally-unauthorized functions on a user's computer. Exploiting the vulnerability would only be possible through a very carefully-managed series of steps, and could not happen accidentally. However, if a malicious web site operator hosted a Java applet that exploited this security vulnerability, it would be able to take virtually any action on the computer of a user who visited the site.

Does disabling Java applets in IE protect against this vulnerability?
Yes. If you've disabled Java applets, they cannot run and you cannot be affected by this vulnerability. Microsoft recommends that you consider applying the patch even if you have disabled Java applets in IE, as you may decide later to re-enable Java support.

How do I know if I have a version of the Microsoft VM that requires a patch?
The Microsoft VM ships as part of a number of Microsoft products, but by far the most prevalent ship vehicle is Internet Explorer. If you have Internet Explorer 4.0 or 5 on your machine, you definitely have an affected version of Microsoft VM and should consider applying the patch.

However, the Microsoft VM also ships as part of a small number of other products, such as Microsoft Visual Studio. If you have installed such a product, you could have an affected version of the Microsoft VM even if you do not have IE 4.0 or 5 on your machine. If you suspect that this may be the case, you can consult the build number of Microsoft VM on your machine and determine whether you have an affected build or not. Here's how to do this:

Choose "Start", then "Run", then "CMD" and hit the enter key.
At the command prompt, type "JVIEW" and hit the enter key.
The version information will be at the right of the topmost line. It will have a format like "5.00.xxxx", where the "xxxx" is the build number. For example, if the version number is 5.00.1234, you have build number 1234.

Here's what the build information means:

If you have a build number of 1520 or lower, you are not affected by this vulnerability.
If you have a build number higher than 1520, you are affected by this vulnerability. The build number for the patched version is 3186.

What should customers do?
Microsoft recommends that customers assess the risk that this vulnerability poses to their safe computing and determine whether or not to apply the patch. The download location for the patch is provided in the security bulletin.

I'd like to verify that I installed the correct patch. How can I do this?
Just verify that you now have build 3186 of the Microsoft VM:

Choose "Start", then "Run", then "CMD" and hit the enter key.
At the command prompt, type "JVIEW" and hit the enter key.
The version information will be at the right of the topmost line.

It will have a format like "5.00.xxxx", where the "xxxx" is the build number. If the last four digits are 3186, you have the patch installed correctly.

What is Microsoft doing about this issue?
Microsoft has developed a patch that eliminates the vulnerability.
Microsoft has provided a security bulletin and this FAQ to provide customers with a detailed understanding of the vulnerability and the patch.
Microsoft has sent copies of the security bulletin to all subscribers to the Microsoft Product Security Notification Service, a free e-mail service that customers can use to stay up to date with Microsoft security bulletins.
Microsoft has issued a Knowledge Base article explaining the vulnerability and patch in more detail.

Where can I learn more about best practices for security?
The Microsoft Security Advisor web site is the best to place to get information about Microsoft security.

Where can I learn more about the Microsoft VM?
The Microsoft Technologies for Java web site is the best to place to get information about Microsoft's Java development efforts. A very good overview of the Microsoft VM is available at http://www.microsoft.com/java/resource/vm.htm

How do I get technical support on this issue?
Information on contacting Microsoft Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.



Others Can Excute Code on Your Computer

The Telnet client that ships as part of Windows 95 and 98 has an unchecked buffer. A  specially-malformed argument could be passed to the client via a web page in order to cause  arbitrary code to execute on the computer via a classic buffer overrun technique.

Affected Software Versions
==========================
 - Microsoft Windows 95
 - Microsoft Windows 98
 - Microsoft Windows 98 Second Edition

Patch Availability
==================
 - Microsoft Windows 95
http://www.microsoft.com/windows95/downloads/contents/
WUCritical/Telnet/Default.asp
 - Microsoft Windows 98 and Windows 98 Second Edition
http://www.microsoft.com/windows98/downloads/contents/
WUCritical/Telnet/Default.asp

Based on:
Buffer Overrun in Telnet in Windows 98 Poses a Security Risk
http://support.microsoft.com/support/kb/articles/q240/1/63.asp

Patch Available for "Set Cookie Header Caching" Vulnerability

Affected Software Versions
==========================
 - Microsoft Site Server 3.0
 - Microsoft Site Server 3.0 Commerce Edition
 - Microsoft Commercial Internet System 2.0 and 2.5

Patch Availability
==================
ftp://ftp.microsoft.com/bussys/sitesrv/sitesrv-public/fixes/usa/
siteserver3/Hotfixes-PostSP2/ProxyCache/

Proxy Caching Can Cause Multiple Clients to Receive the Same GUID
http://support.microsoft.com/support/kb/articles/q238/6/47.asp



Web Site Operators CAN Operate YOUR Computer

IE 5 includes a feature that allows users to export a list of their favorite web sites to a file, or to import a file containing a list of favorite sites. The method that is used to perform this function, ImportExportFavorites(), should only allow particular types of files to be written, and only to specific locations on the drive.

However, it is possible for a web site to invoke this method, bypass this restriction and write files that could be used to execute system commands.  The net result is that a malicious web site operator potentially could take any action on the computer that the user would be capable of taking.

This vulnerability would chiefly affect workstations that are connected to the Internet. As an immediate measure, customers can prevent the ImportExportFavorites function from operating by disabling Active Scripting, as discussed in the FAQ. A patch that restores correct operation is under development and will be delivered shortly.

Affected Software Versions
=====================
 - Microsoft Internet Explorer 5

Workaround
==========
The vulnerability can be prevented by disabling Active Scripting. The FAQ contains details on how  to do this.

Please see the following references for more information related to this issue.
- Microsoft Security Bulletin MS99-037: Frequently Asked Questions
http://www.microsoft.com/security/bulletins/MS99-037faq.asp
- Microsoft Security Advisor web site
http://www.microsoft.com/security/default.asp



Now Someone Else is Reading Your Email?

By Sandra Underhill

Government has a global surveillance system called Echelon in place that intercepts email, Internet telephony, chatrooms, instant
messaging, etc!

Yikes! Recent headlines are shouting that the government has gone too far. A global surveillance system called Echelon is in place that intercepts transmissions of your email, Internet telephone conversations, faxes, instant messages, chatroom chatter and possibly even your surfing habits!¹

The governments of the United States, Canada, Britain, Australia and New Zealand have coordinated a cooperative eavesdropping effort. This effort is called Echelon. It is a global network of satellites and computerized monitoring stations that scan and intercept communications containing pre-programmed buzzwords.

Many world governments support Echelon and are involved in the approval of this global surveillance system. Memorandums have been agreed to by the United States, its allies and the European Union that dictate that, even if third world countries do not agree with Echelon, they will still have their communications monitored.

If you were wondering how much of your communication is subject to satellite surveillance, consider the level of technology today as compared to when the Echelon was first put into service decades ago.

The NSA (National Security Agency) of the United States is documented as having placed surveillance satellites, called Intelsats, in orbit as early as 1971. These early behemoths were heavy and limited in their ability to monitor communications using the technology of the day.

NSA sent more technologically advanced satellites capable of broader surveillance methods into orbit around the earth during the 1980's and l990's.

Additional elements of the Echelon surveillance system involve land-based, or under-sea systems of communications that use cables or microwave tower networks.

Echelon has always used buzzwords from an ever-evolving glossary comprised of keywords, phrases, people, places, or items of special interest based on the current political climate.

Couple this knowledge with the fact that computer users were denied the use of super-encryption technology last year, and you'd have to wonder if the implementation of this new encryption code was too costly to implement into the Echelon surveillance system

Today's technology is far more advanced. It allows the monitoring stations across the globe to sift through enormous volumes of communications much more thoroughly than in earlier years.

Anyone who uses a communications device, including Internet users, mobile PC users and users of cell phones who engage in questionable conversations, can pretty much count on being subjected to scrutiny. Scrutiny from investigating sources can involve accessing not only the content of the questionable conversation(s), but extends to all "associated data".

Associated data includes communications made before and after a questionable conversation. Despite what we have seen on movies, even connections that are not completed are recorded for evaluation.

We all know that our employers can read our email and record our telephone conversations. And we know that our Internet Service Providers can read our email and keep all records for a period of time.

We also know that our government can read our mail and listen, too, in a continuing effort to fight crime and to protect national security. Echelon has been in place for decades.

Privacy issues drive emotions through the roof. Revelation of the depth and breadth of privacy loss is a surprise only to the uninformed.

Union Tribune

For more information on Echelon
http://www.privacy.org/pi/activities/taping/statewatch_tap_297.html
http://jya.com/ic2000-dc.htm
http://www.gn.apc.org/duncan
http://jya.com/echelon-dc.htm#echelon
http://www.ncoic.com
http://europarl.eu.int



Malicious Web Site Or E-mail Message Can Cause Win 95/98 Crash

Microsoft has released a patch that eliminates a vulnerability in Microsoft Windows 95 or Windows 98. The vulnerability could allow a malicious web site or e-mail message to cause the Windows machine to crash, or to run arbitrary code.

Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bulletins/MS99-049faq.asp

Issue
=====
There is a buffer overflow in the Windows 95 and Windows 98 networking software that processes file name strings. If the networking software were provided with a very long random string as input, it could crash the machine. If provided with a specially-malformed argument, it could be used to run arbitrary code on the machine via a classic buffer overrun attack.

The vulnerability could be exploited remotely in cases where a file:// URL or a Universal Naming Convention (UNC) string on a remote web site included a long file name or where a long file name was included in an e-mail message.

Affected Software Versions
==========================
The buffer overrun is present in the networking software in all versions of Windows 95 and Windows 98.

Patch Availability
==================
Windows 95:
http://download.microsoft.com/download/win95/update/245729/
w95/en-us/245729us5.exe

Windows 98:
http://download.microsoft.com/download/win98/update/245729/
w98/en-us/245729us8.exe



Microsoft Security Bulletin (MS00-033); Vulnerabilities and Patches

Patch Available for "Frame Domain Verification", "Unauthorized Cookie Access", and "Malformed Component Attribute" Vulnerabilities

Originally Posted: May 17, 2000

Summary
=======
Microsoft has released a comprehensive patch that eliminates three security vulnerabilities in Microsoft(r) Internet Explorer 4 and 5:

- The "Frame Domain Verification" vulnerability, which could allow a malicious web site operator to read, but not change or add, files on the computer of a visiting user.

- The "Unauthorized Cookie Access" vulnerability, which could allow a malicious web site operator to access "cookies" belonging to a visiting user.

- The "Malformed Component Attribute" vulnerability, which could allow a malicious web site operator to run code of his choice on the computer of a visiting user.

Issue
=====
The three security vulnerabilities eliminated by this patch are unrelated to each other except by the fact that they all occur in the same .dll. We have packaged them together for customer convenience.

The vulnerabilities are:

- "Frame Domain Verification" vulnerability. When a web server opens a frame within a window, the IE security model should only allow the parent window to access the data in the frame if they are in the same domain. However, two functions available in IE do not properly perform domain checking, with the result that the parent window could open a frame that contains a file on the local computer, then read it. This could allow a malicious web site operator to view files on the computer of a visiting user. The web site operator would need to know (or guess) the name and location of the file, and could only view file types that can be opened in a browser window.

- "Unauthorized Cookie Access" vulnerability. By design, the IE security model restricts cookies so that they can be read only by sites within the originator's domain. However, by using a specially-malformed URL, it is possible for a malicious web site operator to gain access to another site's cookie and read, add or change them. A malicious web site operator would need to entice a visiting user into clicking a link in order to access each cookie, and could not obtain a listing of the cookies available on the visitor's system. Even after recovering a cookie, the type and amount of personal information would depend on the privacy practices followed by the site that placed it there.

- "Malformed Component Attribute" vulnerability. The code used to invoke ActiveX components in IE has an unchecked buffer and could be exploited by a malicious web site operator to run code on the computer of a visiting user. The unchecked buffer is only exposed when certain attributes are specified in conjunction with each other.

The patch also eliminates a new variant of the previously-addressed WPAD Spoofing vulnerability (http://www.microsoft.com/technet/security/bulletin/ms99-054.asp).

Affected Software Versions
==========================
- Microsoft Internet Explorer 4.0
- Microsoft Internet Explorer 4.01
- Microsoft Internet Explorer 5.0
- Microsoft Internet Explorer 5.01

Patch Availability
==================
- http://www.microsoft.com/windows/ie/download/critical/patch6.htm

Note: The patches require IE 4.01 Service Pack 2 or IE 5.01 to install. Customers using versions prior to these may receive a message reading "This update does not need to be installed on this system". This message is incorrect. More information is available in KB article Q262509.

Note: Additional security patches are available at the Microsoft Download Center

More Information
================
Please see the following references for more information related to this issue.

- Frequently Asked Questions: Microsoft Security Bulletin MS00-033, http://www.microsoft.com/technet/security/bulletin/fq00-033.asp

- Microsoft Knowledge Base article Q262509 discusses the overall patch and will be available soon.

- Microsoft Knowledge Base articles Q251108 and 255676 discuss the "Frame Domain Verification" vulnerability and will be available soon.

- Microsoft Knowledge Base article Q258430 discusses the "Unauthorized Cookie Access" vulnerability and will be available soon.

- Microsoft Knowledge Base article Q261257 discusses the "Malformed Component Attribute" vulnerability and will be available soon.

- Microsoft Knowledge Base (KB) article Q247333, Web Proxy Auto-Discovery "Spoofing" May Change Proxy Settings, http://www.microsoft.com/technet/support/kb.asp?ID=247333

- Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp


  • Back To The Top    • Back To Home