The list goes on

Discussion in 'Computer Security' started by SimonV, Nov 11, 2003.

  1. SimonV
    Honorary Member

    SimonV Petabyte Poster Gold Member

    6,651
    180
    258
    Buffer Overrun in Microsoft FrontPage Server Extensions
    Overview
    A security issue has been identified that could allow an attacker to cause a computer running Microsoft® Frontpage Server Extensions to become temporarily unresponsive. Microsoft Frontpage Server Extensions are enabled by default on Microsoft Windows® 2000 and can be added to Windows XP. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.

    View: Microsoft Security Bulletin MS03-051
    _____________________________________________




    Certificate Validation Flaw Could Enable Identity Spoofing

    The original version of this bulletin was released on 05 September 2002. The vulnerability identified in the original version of the bulletin could enable an attacker who had a valid end-entity certificate to issue a subordinate certificate that, although bogus, would nevertheless pass validation. Because CryptoAPI is used by a wide range of applications, this could enable a variety of identity spoofing attacks.

    Microsoft re-issued this security bulletin on November 11, 2003 to advise on the availability of an updated Microsoft Windows 2000 Service Pack 4 (SP4) security patch. This revised security patch corrects a regression that may occur during the installation of Microsoft Internet Explorer 6.0 Service Pack 1 on Windows 2000 SP4. This regression removes the update that is discussed in this bulletin and that is provided as part of Windows 2000 SP4. Customers who are using Windows 2000 SP4 and then installed Internet Explorer 6.0 Service Pack 1 should apply the updated Windows 2000 SP4 security patch to help protect from this vulnerability.

    View: Microsoft Security Bulletin MS02-050
    ______________________________________________



    Buffer Overrun in the Workstation Service

    A security vulnerability exists in the Workstation service that could allow remote code execution on an affected system. This vulnerability results because of an unchecked buffer in the Workstation service. If exploited, an attacker could gain System privileges on an affected system, or could cause the Workstation service to fail. An attacker could take any action on the system, including installing programs, viewing data, changing data, or deleting data, or creating new accounts with full privileges.

    Note: Only Windows 2000 and Window XP are affected. Other operating systems are not vulnerable to this attack.

    View: Security Bulletin
    _________________________________________________




    Nov. Cumulative Security Update for Internet Explorer 6 SP1
    Overview
    Security issues identified in Microsoft Internet Explorer could allow an attacker to compromise systems with Internet Explorer installed (even if Internet Explorer is not used as the Web browser). For example, an attacker could run programs on a computer used to view the attacker's Web site. Download this update from Microsoft to help protect your computer. After installation, you may have to restart your computer.

    View: Microsoft Security Bulletin MS03-048
    __________________________________________________
     
    Certifications: MOS Master 2003, CompTIA A+, MCSA:M, MCSE
    WIP: Keeping CF Alive...
  2. Jakamoko
    Honorary Member

    Jakamoko On the move again ...

    9,924
    74
    229
    $hooting them$elve$ in the foot ?
     
    Certifications: MCP, A+, Network+
    WIP: Clarity
  3. flex22

    flex22 Gigabyte Poster

    1,679
    0
    69
    Show me an OS that doesn't have flaws.

    It's the nature of programs.It'll always happen using current methods.
    :soz
     

Share This Page

Loading...
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.