todays AUSCERT alert, filename.rules.conf tweak

Julian Field MailScanner at ecs.soton.ac.uk
Tue Jan 4 15:11:39 GMT 2005


    [ The following text is in the "ISO-8859-1" character set. ]
    [ Your display is set for the "US-ASCII" character set.  ]
    [ Some characters may be displayed incorrectly. ]

They will be in the next release.

Jeff A. Earickson wrote:

> Gang,
>
> See the AUSCERT bulletin below, if you haven't already.  In light of
> this,
> I added the following to my filename.rules.conf file:
>
> #---added per AUSCERT bulletin AL-2005.001, Jan 4, 2005
> deny|\.bmp$|Windows bitmap file|Possible buffer overflow in
> Explorer/Outlook
> deny|\.ico$|Windows icon file|Possible buffer overflow in
> Explorer/Outlook
> deny|\.ani$|Windows animated cursor file|Possible buffer overflow in
> Explorer/Outlook
> deny|\.cur$|Windows cursor file|Possible buffer overflow in
> Explorer/Outlook
> deny|\.hlp$|Windows Help file|Possible buffer overflow in
> Explorer/Outlook
>
> I replaced tabs with the pipe symbol (|) for this email.  Maybe this
> should be rolled into the next edition of MailScanner?
>
> ---------- Forwarded message ----------
> Date: Tue, 4 Jan 2005 05:34:25 UT
> From: auscert at auscert.org.au
> Reply-To: national-alerts at auscert.org.au
> To: national-alerts at auscert.org.au
> Subject: [NATIONAL-ALERTS] (AUSCERT AL-2005.001) Three vulnerabilities in
>     Microsoft Windows and Internet Explorer
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ===========================================================================
>
> A  U  S  C  E  R  T                                           A  L  E
> R  T
>
>                        AL-2005.001 -- AUSCERT ALERT
>      Three vulnerabilities in Microsoft Windows and Internet Explorer
>                               4 January 2005
>
> ===========================================================================
>
>
>         AusCERT Alert Summary
>         ---------------------
>
> Product:           Microsoft Internet Explorer
>                    Microsoft Outlook
>                    Microsoft Outlook Express
>                    Microsoft Windows
> Operating System:  Windows
> Impact:            Execute Arbitrary Code/Commands
>                    Denial of Service
> Access:            Remote/Unauthenticated
> CVE Names:         CAN-2004-1305 CAN-2004-1306
>
>
> SUMMARY:
>
>        This alert describes three vulnerabilities in Microsoft Internet
>        Explorer and other Windows components that may allow the remote
>        execution of arbitrary code and denial of service.
>

--
Julian Field
www.MailScanner.info
Buy the MailScanner book at www.MailScanner.info/store

PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).

Support MailScanner development - buy the book off the website!




More information about the MailScanner mailing list