======= SPONSORED BY VERISIGN - THE INTERNET TRUST COMPANY ========== Get VeriSign's FREE guide, "Securing Your Web Site for Business." You will learn everything you need to know about using SSL to encrypt your e-commerce transactions for serious online security. Click here! http://www.verisign.com/cgi-bin/go.cgi?a=n016002130008000 ===================================================================== November 29, 1999 - Security UPDATE Alert - Arne Vidstrom and Svante Sannmark have discovered a serious problem on Windows NT systems that have IE 5.0 installed. Because of changes to the Task Scheduler by an IE 5.0 installation process, the service is vulnerable to an attack that can lead to elevated user privileges under certain conditions. Microsoft is aware of the problem and has released a new version of Internet Explorer (5.1) along with a FAQ and Support Online article that detail the issues. Microsoft also reported a vulnerability in its Windows 9x operating systems caused by a legacy mechanism for caching network security credentials. The vulnerability could allow a user's plaintext network password to be retrieved from the cache. And, continuing their marathon of buffer overflow discoveries, USSRLabs has discovered such conditions in three more NT-based application services. Deerfield's WorldClient Server 2.0.0.0, BisonWare FTP Server, and Symantec's Mail-Gear were all discovered to be vulnerable to denial of service attacks, and possibly arbitrary code execution due to buffer overflows in the software. For complete details on all four of these newly discovered problems, please visit our Web site at the following URLs: * Win9x Legacy Psw Caching http://www.ntsecurity.net/go/load.asp?iD=/security/pswcaching.htm * IE 5.0 Task Scheduler http://www.ntsecurity.net/go/load.asp?iD=/security/tasksched.htm * Deerfield.com WorldClient Server http://www.ntsecurity.net/go/load.asp?iD=/security/worldc1.htm * BisonWare FTP Server http://www.ntsecurity.net/go/load.asp?iD=/security/bison1.htm * Symantec Mail-Gear http://www.ntsecurity.net/go/load.asp?iD=/security/mailgear1.htm Thanks for subscribing to Security UPDATE. Please tell your friends about this newsletter and alert list! Sincerely, The Security UPDATE Team security@ntsecurity.net ======================================================================= TO UNSUBSCRIBE from this alert list DO NOT REPLY, instead send e-mail to listserv@listserv.ntsecurity.net with the words "unsubscribe securityupdate" in the body of the message without the quotes. TO SUBSCRIBE to this alert list, send e-mail to the same address listed above with the words "subscribe securityupdate anonymous" in the body of the message without the quotes. ======================================================================= Security UPDATE is powered by LISTSERV(R) software http://www.lsoft.com/LISTSERV-powered.html ======================================================================= Copyright (c) 1999 Duke Communications Intl. Inc. - ALL RIGHTS RESERVED Forwarding this email is permitted, as long as the entire message body, the mail header, and this notice are included.