what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

winsd.060700.txt

winsd.060700.txt
Posted Jun 8, 2000
Authored by winsd | Site win2000mag.com

Windows Security Update June 7, 2000 - In this issue: Internet Explorer-Compiled HTML Might Run Unauthorized Code, Protected Store Key Length, Media Encoder dos, SQL Server 7.0 SP1 and SP2 Expose Admin Password, Imate WebMail Denial of Service, Buffer Overrun in ITHouse Mail Server, Buffer Overrun in Sambar Server, News: Microsoft's New Security Server, Tip: Event Log Security ID Descriptions, Windows 2000 Security: Creating a Custom Password-Reset MMC, Writing Secure Code: Bind Basics, and the Havenco data storage facility.

tags | denial of service, overflow, magazine
systems | windows
SHA-256 | b5c531d0dc96258b829de1f3f2f95e1a6a5b7ffa391ae32eba71c9dc81852acc

winsd.060700.txt

Change Mirror Download

**********************************************************
WINDOWS 2000 MAGAZINE SECURITY UPDATE
**Watching the Watchers**
The weekly Windows 2000 and Windows NT security update newsletter
brought to you by Windows 2000 Magazine and NTSecurity.net.
http://www.win2000mag.net/Email/Index.cfm?ID=5
**********************************************************

This week's issue sponsored by
Trend Micro -- Your Internet VirusWall
http://www.antivirus.com/2kUPDTRJUNE.htm

FREE Intrusion Detection WebCast
http://www.win2000mag.com/jump.cfm?ID=32
(Below Security Roundup)

|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-
June 7, 2000 - In this issue:

1. IN FOCUS
- And Then Came HavenCo

2. SECURITY RISKS
- Protected Store Key Length
- Internet Explorer-Compiled HTML Might Run Unauthorized Code
- Media Encoder Denial of Service
- SQL Server 7.0 SP1 and SP2 Expose Admin Password
- Imate WebMail Denial of Service
- Buffer Overrun in ITHouse Mail Server
- Buffer Overrun in Sambar Server

3. ANNOUNCEMENTS
- Win2000mag.net--It's Like Spitting in the Ocean...
- Free Books Online

4. SECURITY ROUNDUP
- News: Microsoft's New Security Server

5. NEW AND IMPROVED
- Increased Security for Universities
- Simplify Access to Private Data and Applications

6. HOT RELEASES (ADVERTISEMENTS)
- New! Desktop Firewall for PCs with Windows NT/2000
- VeriSign - The Internet Trust Company

7. SECURITY TOOLKIT
- Book Highlight: Information Security: Protecting the Global
Enterprise
- Tip: Event Log Security ID Descriptions
- Windows 2000 Security: Creating a Custom Password-Reset MMC
- Writing Secure Code: Bind Basics

8. HOT THREADS
- Windows 2000 Magazine Online Forums
IIS and NTFS Security--ASP Problem
- Win2KSecAdvice Mailing List
Released: LibnetNT by eEye Digital Security
- HowTo Mailing List
Event Viewer Query

~~~~ SPONSOR: TREND MICRO -- YOUR INTERNET VIRUSWALL ~~~~
Stop viruses like LOVELETTER, NEWLOVE, RESUME and other malicious
content from jamming up your network. Trend Micro ScanMail for
Microsoft Exchange provides enterprise-strength antivirus and content
security. ScanMail implements uniform virus and content security policy
across the enterprise. The optional eManager plug-in stops SPAM.
ScanMail is fully compatible with Windows 2000 and can automatically
scan either on-demand or at prescheduled intervals. Software, Scan
engine and virus pattern updates distribute automatically to each
networked Exchange Server. Keep viruses out of your Exchange servers
with Trend Micro.
http://www.antivirus.com/2kUPDTRJUNE.htm

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Want to sponsor Windows 2000 Magazine Security UPDATE? Contact Jim
Langone (Western Advertising Sales Manager) at 800-593-8268 or
jim@win2000mag.com, OR Tanya T. TateWik (Eastern and International
Advertising Sales Manager) at 877-217-1823 or ttatewik@win2000mag.com.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

1. ========== IN FOCUS ==========

Hello everyone,

Although fending off network-based intruders is a formidable task, you
can achieve it. But how do you protect your data from physical system
access? The obvious answer is by using adequate guards against physical
premise access, which can be expensive. As a result, many companies co-
locate data or servers at offsite locations.
For example, you might rent an entire cage or set of racks within a
cage from a major ISP. The cage or racks come with high-speed
bandwidth. Or you might simply rent a secure e-commerce site from a Web
service provider and let the provider worry about premise-access
concerns. The ultimate solution obviously depends on your needs. The
more sensitive the data, the more sheltered the final solution needs to
be.
Today, hundreds of companies around the world offer various secured
co-location or data-hosting services. When it comes to security, there
are all kinds of boasts and guarantees, but none can match the claim I
heard about this week.
Companies come and companies go, but then came HavenCo. Located on a
tiny man-made island 7 miles off the coast of Great Britain, HavenCo
has a most unique claim to security fame: It not only operates a secure
network co-location center, it operates an entire sovereign country!
Let me explain.
During World War II, Britain built several gun platforms off its
coast to help fend off Nazi warplanes. One of the platforms, named
Roughs Tower, was only 10 by 25 yards and was built on two cement
caissons off the coast of Britain in what was then international
waters.
After the war, Britain dismantled all the platforms except Roughs
Tower, which sat abandoned until 1967 when former English major Paddy
Roy Bates and his family took up residence on the man-made island.
Bates proclaimed the island his own state and bestowed upon himself the
title of Prince--his wife took the title of Princess--to reign over
their newly formed Principality of Sealand.
After several legal encounters over the island, the English court
eventually ruled it had no jurisdiction over Sealand, and Sealand
became formally recognized as its own country. Today, the Bates family
has moved off the island and turned over operation of the property and
the Sealand government to the newly formed HavenCo business.
In a nutshell, HavenCo offers Sealand as a country in which to
operate a business. You can buy a server, bandwidth, and complete
security solution direct from HavenCo and have that business totally
based in Sealand, which provides protection from overly strict data
traffic laws, foreign subpoenas, and other outside interference.
According to HavenCo, Sealand has no laws governing data traffic,
and the terms of HavenCo's agreement with Sealand provide that no data
traffic laws will ever be enacted. You might think HavenCo will soon
become a haven for less-than-favorable network users, such as system
crackers, porn peddlers, and spammers, but perhaps that won’t happen.
The HavenCo acceptable use policy clearly states that it prohibits "the
distribution of child pornography from its servers, and prohibits use
of the network to send bulk unsolicited communications or launch
digital attacks against other computers or networks." Only time will
tell how well HavenCo enforces its guidelines. After all, Sealand has
few laws, and probably none would force HavenCo to take any specific
action other than to terminate a company's service.
I'm not sure what to think about HavenCo. The company professes to
offer a pretty darn secure solution package, but I think it's too soon
to form a solid opinion. Sealand, a country with almost no laws, lets
anyone run a business. Even more interesting is Sealand's claim about
protection from foreign subpoena. According to HavenCo, you can set up
an email system or other service type on its network, and keep it safe
from search and seizure. Microsoft could have used that service to help
fend off the US Department of Justice (DOJ).
With its professed strong physical and network security and fat
bandwidth, HavenCo offers an intriguing solution. It will be
interesting to see who winds up using the services. But it will be even
more interesting to see how world governments react to Sealand's new
data haven. That reaction will depend on how HavenCo's customers use
its multifaceted protected services.
Be sure to stop by the HavenCo Web site (http://www.havenco.com/)
and read about its service offerings as well as the history of Sealand.
I'm sure you'll find it as interesting as I did. Until next time, have
a great week.

Sincerely,
Mark Joseph Edwards, News Editor
mark@ntsecurity.net

2. ========== SECURITY RISKS =========
(contributed by Mark Joseph Edwards, mark@ntsecurity.net)

* PROTECTED STORE KEY LENGTH
By design, the Protected Store in Windows 2000 should always encrypt
information using the strongest cryptography available on the system.
However, the Win2K implementation uses a 40-bit key to encrypt the
Protected Store even if stronger cryptography is installed on the
system. The 40-bit key encryption weakens the protection on the
Protected Store, which lets an intruder more easily crack the key to
gain access to the Protected Store.
http://www.ntsecurity.net/go/load.asp?iD=/security/win2k4-5.htm

* INTERNET EXPLORER-COMPILED HTML MIGHT RUN UNAUTHORIZED CODE
According to a Microsoft security bulletin, if a malicious Web site
references an Internet Explorer (IE)-compiled HTML Help file (which has
a .chm extension), the site can potentially launch code on a visiting
user's computer without the user's approval. Such code can take any
actions that the user can take, including adding, changing, or deleting
data or communicating with a remote Web site.
http://www.ntsecurity.net/go/load.asp?iD=/security/ie517.htm

* MEDIA ENCODER DENIAL OF SERVICE
Microsoft's Media Encoder contains a bug whereby an intruder can send a
particular malformed request to an affected encoder, causing it to deny
formatted content to the Windows Media Server. The vulnerability
primarily affects real-time streaming media providers. Microsoft made a
patch available but then removed the patch for reasons unknown at the
time of this writing.
http://www.ntsecurity.net/go/load.asp?iD=/security/media4-2.htm

* SQL SERVER 7.0 SP1 AND SP2 EXPOSE ADMIN PASSWORD
According to Microsoft, when SQL Server 7.0 Service Pack 1 (SP1) or SP2
is installed on a machine configured to perform authentication using
Mixed Mode, the password for the SQL Server standard security System
Administrator account is recorded in plain text in the file
\%TEMP%\sqlsp.log. The file's default permissions let any user that can
log on interactively to the server read the file. Microsoft has updated
SP2 to help guard against the risk.
http://www.ntsecurity.net/go/load.asp?iD=/security/sql7-5.htm

* IMATE WEBMAIL DENIAL OF SERVICE
A malicious user can crash Imate's SMTP mail service by sending a
string of 1119 characters as a parameter to the HELO command. The
vendor, Concatus, is aware of the problem and has made a patch
available through its support department.
http://www.ntsecurity.net/go/load.asp?iD=/security/imate25-1.htm

* BUFFER OVERRUN IN ITHOUSE MAIL SERVER
A malicious user can crash ITHouse's SMTP mail service by sending a
string of 2270 characters as a parameter to the RCPT TO command. During
the crash, characters beyond 2270 overwrite the EIP Register making it
possible to run arbitrary code on the remote system.
http://www.ntsecurity.net/go/load.asp?iD=/security/ithouse1.htm

* BUFFER OVERRUN IN SAMBAR SERVER
A user can crash the Sambar Server by using the default finger and
whois scripts provided with the Sambar Server software. By sending a
long string of 32,290 characters to either of the scripts, a malicious
user can overflow an unchecked buffer in the sambar.dll file and cause
arbitrary code to run on the machine.
http://www.ntsecurity.net/go/load.asp?iD=/security/sambar1.htm

3. ========== ANNOUNCEMENTS ==========

* WIN2000MAG.NET--IT'S LIKE SPITTING IN THE OCEAN...
You can't miss with our new portal for IT professionals. Access
technical remedies, certification advice, vendor solutions, and
professional development tools, or post a question in our technical
forums. Surely one of our 500,000 monthly Web visitors has solved the
same problem you face now. Raise Your IT IQ at
http://www.win2000mag.net/.

* FREE BOOKS ONLINE
Now online--a technical reference library specifically for Windows IT
professionals. Windows IT Library, a member of the Windows 2000
Magazine Network, provides the information you need when you need it.
For your source of free books and other technical content, visit
http://WindowsITLibrary.com/.

4. ========== SECURITY ROUNDUP ==========

* NEWS: MICROSOFT'S NEW SECURITY SERVER
On June 6, Microsoft released Beta 3 of its new Internet Security and
Acceleration (ISA) Server 2000. Designed for Windows 2000 Server
platforms, ISA Server is an application-level firewall with data-aware
filtering capabilities, IP packet filtering functionality, and Active
Directory (AD) support. Administrators can use ISA Server to control
access by user and group, application, content type, and schedule.
http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=147&TB=news

~~~~ SPONSOR: FREE INTRUSION DETECTION WEBCAST ~~~~
AXENT(R)'s "Everything You Need to Know About Intrusion Detection"
WebCast teaches you how to protect yourself against intruders with
AXENT’s Prowler Series (NetProwler(tm) and Intruder Alert(tm)) by
transparently monitoring traffic in real-time and instantly reacting to
attempted attacks. Space is limited - register today at
http://www.win2000mag.com/jump.cfm?ID=32 to reserve your spot.
AXENT is the leading provider of e-security solutions for your
business, delivering integrated products and expert services to 45 of
the Fortune 50 companies.

5. ========== NEW AND IMPROVED ==========
(contributed by Judy Drennen, products@win2000mag.com)

* INCREASED SECURITY FOR UNIVERSITIES
WebTrends announced the Secure University Program, offering a free
version of WebTrends Security Analyzer Professional Edition and a
discount on Security Analyzer Enterprise Edition to any qualified
university. With the Secure University Program, WebTrends wants to
bring increased security to universities and raise security awareness,
given the recent Distributed Denial of Service (DDoS) attacks in some
of the world's largest education systems. For more information, go to
http://www.webtrends.com/secureuniversityprogram.htm.

* SIMPLIFY ACCESS TO PRIVATE DATA AND APPLICATIONS
Jela Company released OnlyYou 1.1, software that lets Windows NT and
Windows 9x users protect their IDs and passwords. Press the OnlyYou hot
key and identify yourself to extract your password from 128-bit
encrypted storage. OnlyYou 1.1 costs $23.50 for a single-user license.
Network and volume licenses are available. For more information,
contact Jela Company at 800-275-0097 or go to the Web site.
http://www.jelaco.com/

6. ========== HOT RELEASES (ADVERTISEMENTS) ==========

* NEW! DESKTOP FIREWALL FOR PCS WITH WINDOWS NT/2000
CyberwallPLUS-WS is a desktop firewall for PCs running Windows NT 4.0
or Windows 2000. It protects against network attacks with an ICSA-
certified packet filter that provides access controls, intrusion
detection and traffic logs.
Free Evaluation: http://www.network-1.com/WSeval/index.htm

* VERISIGN - THE INTERNET TRUST COMPANY
Protect your servers with 128-bit SSL encryption! Get VeriSign's FREE
guide, "Securing Your Web Site for Business." You will learn everything
you need to know about using SSL to encrypt your e-commerce
transactions for serious online security. Click here!
http://www.verisign.com/cgi-bin/go.cgi?a=n016007870003000

7. ========== SECURITY TOOLKIT ==========

* BOOK HIGHLIGHT: INFORMATION SECURITY: PROTECTING THE GLOBAL
ENTERPRISE
By Donald Pipkin
Online Price: $39.99
Softcover; 300 pages
Published by Prentice Hall, May 2000
ISBN 0130173231

IT security expert Donald Pipkin addresses every aspect of information
security: the business issues, the technical-process issues, and the
legal issues, including the personal liabilities of corporate officers
in protecting information assets.
To order this book, go to
http://www.fatbrain.com/shop/info/0130173231?from=win2000mag
or visit the Windows 2000 Magazine Network Bookstore at
http://www1.fatbrain.com/store.cl?p=win2000mag&s=97772.

* TIP: EVENT LOG SECURITY ID DESCRIPTIONS
(contributed by Mark Joseph Edwards, http://www.ntsecurity.net/)

You use event logs to audit security events on your systems, but do you
always know what a given event ID code represents? It's hard to
remember details about each event ID because Microsoft lists more than
50 different security event ID codes. Microsoft article Q174074 lists
dozens of event ID codes along with detailed examples of what those
event log entries will look like. You might want to bookmark or print
the page for future reference.
http://www.microsoft.com/technet/support/kb.asp?ID=174074

* WRITING SECURE CODE: BIND BASICS
In his latest Web exclusive column, David LeBlanc points out that to
understand how to bind a TCP socket to a port, you need to look at the
arguments for the bind() function. One of these arguments (the second)
is a pointer to a sockaddr structure. For IP applications, that pointer
is typically a sockaddr_in structure that contains the numeric IP
address and port that you want to bind to locally. If you can't easily
identify what interfaces are available, you can simply bind to all
available local interfaces by specifying INADDR_ANY as the address.
One security risk that you need to be aware of is that users can bind
two sockets to the same port using a socket option known as
SO_REUSEADDR. In other words, two different applications can answer
connections on the same port. Be sure to read the rest of David's
column on our Web site.
http://www.ntsecurity.net/go/seccode.asp

8. ========== HOT THREADS ==========

* WINDOWS 2000 MAGAZINE ONLINE FORUMS

The following text is from a recent threaded discussion on the Windows
2000 Magazine online forums (http://www.win2000mag.net/forums/).

IIS and NTFS Security--ASP Problem
Scenario: IIS 4 with SP6a. I attempted to apply RX security to the OS
file system. While HTML still served up, no ASP pages would work. After
extensive search on Microsoft's site, I came up empty-handed, and had
to allow the Change perms on NTFS. I ensured that the anonymous user
had NTFS read and execute permissions to the entire file system. Any
suggestions?

Thread continues at
http://www.win2000mag.net/Forums/Application/Thread.cfm?CFApp=64&Thread_ID=38701&mc=2.

* WIN2KSECADVICE MAILING LIST
Each week we offer a quick recap of some of the highlights from the
Win2KSecAdvice mailing list. The following thread is in the spotlight
this week.

Released: LibnetNT by eEye Digital Security
Libnet for UNIX is used in many of today's popular security programs
because of how easy it is to implement low-level packet functionality
into a program. Now that same ease-of-use development API is available
for Windows NT platforms.
http://www.ntsecurity.net/go/w.asp?A2=IND0006A&L=WIN2KSECADVICE&P=89

Follow this link to read all threads for June, Week 1:
http://www.ntsecurity.net/go/w.asp?A1=ind0006a&L=win2ksecadvice

* HOWTO MAILING LIST
Each week we offer a quick recap of some of the highlights from the
HowTo for Security mailing list. The following thread is in the
spotlight this week.

Event Viewer Query
This is going to seem like a strange question, but it has me a bit
baffled. If you have a standalone server with full auditing enabled on
it, how does the Event ID 528 (as seen in the Event Viewer) apply?
Because the standalone server is not capable of authentication, then
this should mean that someone physically went to the standalone server
and logged on, and if done locally, then it should be indicated under
Domain, which it isn't. However, it does list "MachineTwo" as the
workstation name where the logon was successful. What remote logon will
trigger this Event ID?
http://www.ntsecurity.net/go/L.asp?A2=IND0006a&L=HOWTO&P=159

Follow this link to read all threads for June, Week 1:
http://www.ntsecurity.net/go/l.asp?A1=ind0006a&L=howto

|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-

WINDOWS 2000 MAGAZINE SECURITY UPDATE STAFF
News Editor - Mark Joseph Edwards (mje@win2000mag.com)
Ad Sales Manager (Western) - Jim Langone (jim@win2000mag.com)
Ad Sales Manager (Eastern) - Tanya T. TateWik (ttatewik@win2000mag.com)
Associate Publisher/Network - Martha Schwartz (mschwartz@win2000mag.com)
Editor - Gayle Rodcay (gayle@win2000mag.com)
New and Improved - Judy Drennen (products@win2000mag.com)
Copy Editor - Judy Drennen (jdrennen@win2000mag.com)

|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-

========== GET UPDATED! ==========
Receive the latest information about the Windows 2000 and Windows NT
topics of your choice, including Win2K Pro, Exchange Server, thin-
client, training and certification, SQL Server, IIS administration,
XML, application service providers, and more. Subscribe to our other
FREE email newsletters at
http://www.win2000mag.com/sub.cfm?code=up00inxwnf.
|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-|-+-

Thank you for reading Security UPDATE.

SUBSCRIBE
To subscribe send a blank email to
subscribe-Security_UPDATE@list.win2000mag.net.

UNSUBSCRIBE
To unsubscribe, send an email to U-A3.15.87030@list.win2000mag.net. Or
click http://go.win2000mag.net:80/UM/U.ASP?A3.15.87030 and you will be
removed from the list. Thank you!

If you have questions or problems with your UPDATE subscription, please
contact securityupdate@win2000mag.com.
___________________________________________________________
Copyright 2000, Windows 2000 Magazine







Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close