-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2003.0592 -- Macromedia Security Zone Bulletins
  MPSB03-05 - Patch and workaround for Dreamweaver MX, DRK, and UltraDev
                             Server Behaviors
                              22 August 2003

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Dreamweaver MX
                        DevNet Resource Kit (DRK) vol. 2
                        DevNet Resource Kit (DRK) vol. 4
                        UltraDev
Publisher:              Macromedia
Impact:                 Reduced Security
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IMPORTANT:

A security issue that may affect Macromedia Dreamweaver,
UltraDev, and DRK customers has come to our attention.

To learn about this new issue and what actions you can
take to address it, please visit the Security Zone:
http://www.macromedia.com/security
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

MPSB03-05 - Patch and workaround for Dreamweaver MX,
DRK, and UltraDev Server Behaviors

Originally posted: August 19, 2003
Last updated: August 19, 2003

~~~~~~~

SUMMARY:

Recently, Macromedia became aware of a security issue
with some of the server behaviors present in Dreamweaver MX,
all versions of UltraDev, and two extensions that shipped as
part of the DevNet Resource Kit (DRK) vol. 2 and vol. 4.
If exploited, it is possible for an attacker to gain access
to certain site-specific cookie and session information.

~~~~~~~

SOLUTION:

Macromedia has issued downloadable patches for Dreamweaver MX
and the effected DRK Extensions. These fixes will be
incorporated into all future releases of Dreamweaver. After
updating your product, you will need to reapply the server
behaviors to the pages that use them, and redeploy those pages
to your server. To download the patches for Dreamweaver MX and
the effected DevNet Resource Kit Extensions, please visit
TechNote 18839:
http://www.macromedia.com/go/0819032593b

For information on how to resolve this issue in UltraDev,
please visit TechNote 18839:
http://www.macromedia.com/go/0819032593a

For concerns or questions regarding this specific security
bulletin, please send an e-mail to:
DWMPSB0305@macromedia.com.

~~~~~~~

SEVERITY RATING:

Macromedia categorizes this issue as an important update
and recommends that users update their product with
the respective patch.

~~~~~~~

ISSUE:

Macromedia has learned that the behavior issues, present
in Dreamweaver MX, all versions of UltraDev, and two
extensions included as part of the DRK vol. 2 and vol. 4
contain a flaw that if exploited may allow an attacker to
gain access to certain site-specific cookie and session
information. This situation arises because the server
behavior uses a redirect based on a variable, but the
variable is not URL encoded. This allows an attacker to
write script which may ultimately be executed on a user's
browser.

Since the script is still subject to normal browser security,
this vulnerability does not allow arbitrary access to the
data on the user's machine, nor allow arbitrary code to run.
Further, this does not allow access to information on the
server, nor does it allow any code to be executed on the
server.

For a list of behaviors affected in Dreamweaver/DRK Server
Behaviors, please visit TechNote 18838:
http://www.macromedia.com/go/0819032593b

For a list of behaviors affected in UltraDev, please visit
TechNote 18839:
http://www.macromedia.com/go/0819032593a


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Reporting Security Issues:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Macromedia is committed to addressing security issues and
providing customers with the information on how they can
protect themselves. If you identify what you believe may
be a security issue with a Macromedia product, please
send an e-mail to secure@macromedia.com. We will work to
appropriately address and communicate the issue.

~~~~~~~

Receiving Security Bulletins:

When Macromedia becomes aware of a security issue that we
believe significantly affects our products or customers,
we will notify customers when appropriate. Typically, this
notification will be in the form of a security bulletin
explaining the issue and the response. Macromedia customers
who would like to receive notification of new security
bulletins when they are released can sign up for our
security notification service at:
http://www.macromedia.com/security

For additional information on security issues at Macromedia,
please visit the Security Zone at:

http://www.macromedia.com/security

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE INFORMATION PROVIDED BY MACROMEDIA IN THIS BULLETIN
IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND.
MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES,
WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY OF
NON-INFRINGEMENT, TITLE, OR QUIET ENJOYMENT. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED
WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.

IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT
LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS
INTERRUPTION OR THE LIKE, OR LOSS OF BUSINESS DAMAGES,
BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF
CONTRACT, BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE),
PRODUCT LIABILITY OR OTHERWISE, EVEN IF MACROMEDIA, INC.
OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF
LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE
ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND
YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM STATE
TO STATE.

Macromedia reserves the right to update the information in
this document with current information.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business
                hours which are GMT+10:00 (AEST).  On call after hours
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQaE1SSh9+71yA2DNAQKArAP/TBduLbUaLflV6kEAbQE6r5+6Ypjynmpt
naFFXzAwBonqwJa5YRyHavB7yo2txdsyTGmtgu8EtDuM6pXKThzfboW7pHFhd4D/
j6D1CYFIzKExvG9oZBp9QxC6HiKikrc4bjy0oelWhm5f80EaK350RJ7jr9v/bwhR
pTYN7NRWiPQ=
=h15U
-----END PGP SIGNATURE-----