Symantec pcAnywhere Denial of Service

A buffer overflow has been resolved in Symantec pcAnywhere that could lead to a Denial of Service. The buffer overflow occurs prior to authentication and can lead to termination of the pcAnywhere component. pcAnywhere must be restarted to function as designed.


Affected Product(s):  Symantec pcAnyware 11.0.1 and 11.5.1


Note: This vulnerability affects all 32-bit versions of pcAnywhere. Updates are available for supported versions only. Users of versions prior to 11.0.1, are encouraged to upgrade to a supported version


Symantec Response
Patches for this issue can be downloaded from the following locations:


For consumer versions of Symantec pcAnywhere:
http://www.symantec.com/techsupp/files/pca/index.html


For enterprise versions of Symantec pcAnywhere:
http://www.symantec.com/techsupp/enterprise/products/spca/files.html


Select your supported version of Symantec pcAnywhere and follow the instructions to download the appropriate update.


Symantec is not aware of any active attempts against or customers impacted by this issue.


As a part of normal best practices, users should keep vendor-supplied patches for all application software and operating systems up-to-date. Symantec strongly recommends any affected customers update their product immediately to protect against these types of threats.


 

Apple released Security Update 2005-009

Apple released the Security Update 2005-009 affecting Apple operating systems (client and server) and Safari browser.


Affected products:
Mac OS X 10.4 through 10.4.3
Mac OS X 10.3.9
Safari


View the security advisory by Apple at http://docs.info.apple.com/article.html?artnum=302847


Ensure to install the following updates for your system:
Apple Security Updates:



The above updates delivers a number of security enhancements and is recommended for all Macintosh users.

Hacked Server Exposes Brokerage Customers’ Data

Online brokerage Scottrade says a server compromise at a service provider may have exposed the financial details of its customers, including banking account information and Social Security numbers. The security breach follows warnings from U.S. securities regulators that hackers and phishing fraudsters have stepped up their targeting of online investors, prompting enhanced education efforts by brokerage firms and the U.S. government.


Scottrade, which has 1.4 million customers, said it was notified Oct. 25 that a hacker had compromised a server at eCheck Secure, an electronic payment service provided by The Troy Group Inc. “As a result, some of your personal information, including your name, driver’s license or state ID number, date of birth, phone number, bank name, bank code, bank number, bank routing number, bank account number and Scottrade account number may have been compromised,” read the message to investors.


The Troy Group said it had reported the intrusion to the FBI, and hired a professional forensic analysis firm to aid in the investigation.  — NetCraft

Microsoft Partner Program Restructures the Security Solutions Competency

According to Thomas Dawkins, group product manager and the person responsible for Microsoft’s security partner strategy, the revised Security Solutions Competency is a direct response to many discussions Microsoft has had with industry partners, analysts, field sales staff and others, who made specific recommendations on ways to make the program more useful to partners who work with products, services or solutions based around security.


“Our partners want business opportunities, a relationship that supports the development and growth of their security business, and meaningful program requirements that help position them as trusted advisers to customers,” Dawkins says. “Most importantly, they want technical information, support and guidance to assist them in the field, where they need us the most.”


The result is the first Microsoft Partner Program competency to include both the rigorous and sought-after third party validation from ISACA and (ISC)2, as well as the relevant Microsoft certifications as core elements. The restructured competency features two new specializations, one focused on security management, for those partners who focus on more “technology agnostic” services such as security policy, governance, compliance, risk assessment, risk management and auditing. The other is focused on infrastructure security — the technical side of the equation.


“We wanted to ensure that our partner program took an industry leading approach to being effective for the security industry as a whole,” Dawkins says. “Whether you’re working with Microsoft technology or providing security products, services or solutions — across the enterprise we want them to have a home in this program. As we grow our security product portfolio, this is one of those rare opportunities where a partner can grow with us.”


Complete details at Microsoft

FTC Study Shows Technology Gaining in the Battle Against Spam

According to a new study released today by the Federal Trade Commission, spammers continue to harvest email addresses from public areas of the Internet, but Internet Service Providers’ anti-spam technologies can block the vast majority of spam sent to these email addresses. The FTC staff report also found that consumers who must post their e-mail addresses on the Internet can prevent them from being harvested by using a technique known as “masking.”


http://www.ftc.gov/opa/2005/11/spam3.htm
Document: Email Address Harvesting and the Effectiveness of Anti-Spam Filters (requires PDF viewer)

Windows SynAttackProtect Predictable Hash Remote DoS Vulnerability

Microsoft Windows is prone to a denial of service vulnerability.


The vulnerability arises due to a design error in the function responsible for the hash table management for ‘SynAttackProtect’. Reports indicate that the affected function used by the TCP/IP stack creates a predictable hash, allowing an attacker to send a large number of SYN packets with an identical hash value.


A successful attack can eventually lead to a denial of service condition due to the lookup algorithm becoming very inefficient at performing searches.


Vulnerable:  
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows 2000 Server SP4
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server


It has been reported that Windows 2003 SP1 and Windows 2000 SP4 with Update Roll-Up are not vulnerable to this issue. This was not confirmed by Symantec.


http://www.securityfocus.com/bid/15613/discuss

Sun Java JRE Sandbox Security Bypass Vulnerabilities

Sun Java JRE Sandbox Security Bypass Vulnerabilities


Affected Software: 
Sun Java JDK 1.5.x
Sun Java JRE 1.3.x
Sun Java JRE 1.4.x
Sun Java JRE 1.5.x / 5.x
Sun Java SDK 1.3.x
Sun Java SDK 1.4.x


Some vulnerabilities have been reported in Sun Java JRE (Java Runtime Environment), which can be exploited by malicious people to compromise a user’s system.


1) An unspecified error may be exploited by a malicious, untrusted applet to read and write local files or execute local applications.


The vulnerability has been reported in JDK/JRE 5.0 Update 3 and prior on Windows, Solaris and Linux platforms. SDK/JRE 1.4.2_xx and prior, and 1.3.1_xx releases are not affected.


2) Three unspecified vulnerabilities with the use of “reflection” APIs error may be exploited by a malicious, untrusted applet to read and write local files or execute local applications.


The following releases are affected by one or more of the three vulnerabilities on Windows, Solaris and Linux platforms:
* SDK and JRE 1.3.1_15 and prior.
* SDK and JRE 1.4.2_08 and prior.
* JDK and JRE 5.0 Update 3 and prior.


3) An unspecified error in the JMX (Java Management Extensions) implementation included with the JRE may be exploited by a malicious, untrusted applet to read and write local files or execute local applications.


The vulnerability has been reported in JDK/JRE 5.0 Update 3 and prior on Windows, Solaris and Linux platforms. SDK/JRE 1.4.2_xx and prior, and 1.3.1_xx releases are not affected.


Solution: Update to the fixed versions.


http://secunia.com/advisories/17748/