======= SPONSORED BY VERISIGN - THE INTERNET TRUST COMPANY ==========
Get VeriSign's FREE guide, "Securing Your Web Site for Business."
You will learn everything you need to know about using SSL to
encrypt your e-commerce transactions for serious online security.
Click here! http://www.verisign.com/cgi-bin/go.cgi?a=n016002130008000
=====================================================================

November 29, 1999 - Security UPDATE Alert - Arne Vidstrom and Svante
Sannmark have discovered a serious problem on Windows NT systems that
have IE 5.0 installed. Because of changes to the Task Scheduler by an
IE 5.0 installation process, the service is vulnerable to an attack
that can lead to elevated user privileges under certain conditions.

Microsoft is aware of the problem and has released a new version of
Internet Explorer (5.1) along with a FAQ and Support Online article
that detail the issues.

Microsoft also reported a vulnerability in its Windows 9x operating
systems caused by a legacy mechanism for caching network security
credentials. The vulnerability could allow a user's plaintext network
password to be retrieved from the cache.

And, continuing their marathon of buffer overflow discoveries,
USSRLabs has discovered such conditions in three more NT-based
application services. Deerfield's WorldClient Server 2.0.0.0,
BisonWare FTP Server, and Symantec's Mail-Gear were all discovered to
be vulnerable to denial of service attacks, and possibly arbitrary
code execution due to buffer overflows in the software.

For complete details on all four of these newly discovered problems,
please visit our Web site at the following URLs:

  * Win9x Legacy Psw Caching
    http://www.ntsecurity.net/go/load.asp?iD=/security/pswcaching.htm

  * IE 5.0 Task Scheduler
    http://www.ntsecurity.net/go/load.asp?iD=/security/tasksched.htm

  * Deerfield.com WorldClient Server
    http://www.ntsecurity.net/go/load.asp?iD=/security/worldc1.htm

  * BisonWare FTP Server
    http://www.ntsecurity.net/go/load.asp?iD=/security/bison1.htm

  * Symantec Mail-Gear
    http://www.ntsecurity.net/go/load.asp?iD=/security/mailgear1.htm

Thanks for subscribing to Security UPDATE.

Please tell your friends about this newsletter and alert list!

Sincerely,
The Security UPDATE Team
security@ntsecurity.net

=======================================================================
TO UNSUBSCRIBE from this alert list DO NOT REPLY, instead send e-mail
to listserv@listserv.ntsecurity.net with the words "unsubscribe
securityupdate" in the body of the message without the quotes.

TO SUBSCRIBE to this alert list, send e-mail to the same address listed
above with the words "subscribe securityupdate anonymous" in the body
of the message without the quotes.
=======================================================================
             Security UPDATE is powered by LISTSERV(R) software
                 http://www.lsoft.com/LISTSERV-powered.html
=======================================================================
Copyright (c) 1999 Duke Communications Intl. Inc. - ALL RIGHTS RESERVED
Forwarding this email is permitted, as long as the entire message body,
the mail header, and this notice are included.