Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Microsoft Sept Patches and Weblogic vulnerability SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Microsoft Sept Patches and Weblogic vulnerability
Microsoft released 2 security bulletin today

Microsoft has released 2 updates today - MS04-027 and MS04-028.



MS04-027 - This vulnerability affects Microsoft Office, the vulnerability is in the WordPerfect converter of MS Office. Microsoft assigned the serverity as "important" for this vulnerability.



MS04-028 - There is a buffer overflow vulnerability in Microsoft's GDI+ - a graphical component in Windows operating system which handles JPEG processing. This vulnerability affects most Microsoft's software that has that ability to process JPEG on Windows platform (Office, IE...). Microsoft assigned the serverity as "critical" for this vulnerability. If a remote attacker can trick a user to browse/view a malicious JPEG file, malicious code embeded in the JPEG will be executed with the possibility to compromise the machine.


ISC Handler Donald Smith pointed out that if you have installed any of the affected programs or affected components listed in this bulletin, you should install the requiredsecurity update for each of the affected programs or affected components. This may require the installation of multiple security
updates. The non-affected versions of Windows do not natively contain the
vulnerable component. However, the vulnerable component is installed on
these non-affected operating systems when you install any of the
software programs or components that are listed in the Affected Software
and Affected Components sections of this bulletin. See the FAQ section
of this bulletin for more information.
Weblogic vulnerability


BEA have released 9 vulnerability alerts for Weblogic server. These vulnerabilities affect versions from 6.1 to 8.1. If you are running BEA Weblogic server, it's time to deploy patches. These alerts can be found at the following URL,

http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp




Wordlist for cracking


We have recent reports that some bots and other hacking tools are using the wordlist located at http://www.weblinxorz.com/wordlists/ for password cracking attempts. It would be a good idea to feed this wordlist to your own cracker before the attackers do.



--- Handler on duty - Jason Lam, jason AT networksec.orgI will be teaching next: Defending Web Applications Security Essentials - SANS Rocky Mountain Spring: Virtual Edition 2021

Jason

93 Posts
ISC Handler
Sep 15th 2004

Sign Up for Free or Log In to start participating in the conversation!