Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2003.0592 -- Macromedia Security Zone Bulletins MPSB03-05 - Patch and workaround for Dreamweaver MX, DRK, and UltraDev Server Behaviors 22 August 2003 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Dreamweaver MX DevNet Resource Kit (DRK) vol. 2 DevNet Resource Kit (DRK) vol. 4 UltraDev Publisher: Macromedia Impact: Reduced Security Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IMPORTANT: A security issue that may affect Macromedia Dreamweaver, UltraDev, and DRK customers has come to our attention. To learn about this new issue and what actions you can take to address it, please visit the Security Zone: http://www.macromedia.com/security ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ MPSB03-05 - Patch and workaround for Dreamweaver MX, DRK, and UltraDev Server Behaviors Originally posted: August 19, 2003 Last updated: August 19, 2003 ~~~~~~~ SUMMARY: Recently, Macromedia became aware of a security issue with some of the server behaviors present in Dreamweaver MX, all versions of UltraDev, and two extensions that shipped as part of the DevNet Resource Kit (DRK) vol. 2 and vol. 4. If exploited, it is possible for an attacker to gain access to certain site-specific cookie and session information. ~~~~~~~ SOLUTION: Macromedia has issued downloadable patches for Dreamweaver MX and the effected DRK Extensions. These fixes will be incorporated into all future releases of Dreamweaver. After updating your product, you will need to reapply the server behaviors to the pages that use them, and redeploy those pages to your server. To download the patches for Dreamweaver MX and the effected DevNet Resource Kit Extensions, please visit TechNote 18839: http://www.macromedia.com/go/0819032593b For information on how to resolve this issue in UltraDev, please visit TechNote 18839: http://www.macromedia.com/go/0819032593a For concerns or questions regarding this specific security bulletin, please send an e-mail to: DWMPSB0305@macromedia.com. ~~~~~~~ SEVERITY RATING: Macromedia categorizes this issue as an important update and recommends that users update their product with the respective patch. ~~~~~~~ ISSUE: Macromedia has learned that the behavior issues, present in Dreamweaver MX, all versions of UltraDev, and two extensions included as part of the DRK vol. 2 and vol. 4 contain a flaw that if exploited may allow an attacker to gain access to certain site-specific cookie and session information. This situation arises because the server behavior uses a redirect based on a variable, but the variable is not URL encoded. This allows an attacker to write script which may ultimately be executed on a user's browser. Since the script is still subject to normal browser security, this vulnerability does not allow arbitrary access to the data on the user's machine, nor allow arbitrary code to run. Further, this does not allow access to information on the server, nor does it allow any code to be executed on the server. For a list of behaviors affected in Dreamweaver/DRK Server Behaviors, please visit TechNote 18838: http://www.macromedia.com/go/0819032593b For a list of behaviors affected in UltraDev, please visit TechNote 18839: http://www.macromedia.com/go/0819032593a ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Reporting Security Issues: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Macromedia is committed to addressing security issues and providing customers with the information on how they can protect themselves. If you identify what you believe may be a security issue with a Macromedia product, please send an e-mail to secure@macromedia.com. We will work to appropriately address and communicate the issue. ~~~~~~~ Receiving Security Bulletins: When Macromedia becomes aware of a security issue that we believe significantly affects our products or customers, we will notify customers when appropriate. Typically, this notification will be in the form of a security bulletin explaining the issue and the response. Macromedia customers who would like to receive notification of new security bulletins when they are released can sign up for our security notification service at: http://www.macromedia.com/security For additional information on security issues at Macromedia, please visit the Security Zone at: http://www.macromedia.com/security ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THE INFORMATION PROVIDED BY MACROMEDIA IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY OF NON-INFRINGEMENT, TITLE, OR QUIET ENJOYMENT. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS INTERRUPTION OR THE LIKE, OR LOSS OF BUSINESS DAMAGES, BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF CONTRACT, BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF MACROMEDIA, INC. OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. (USA ONLY) SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM STATE TO STATE. Macromedia reserves the right to update the information in this document with current information. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQaE1SSh9+71yA2DNAQKArAP/TBduLbUaLflV6kEAbQE6r5+6Ypjynmpt naFFXzAwBonqwJa5YRyHavB7yo2txdsyTGmtgu8EtDuM6pXKThzfboW7pHFhd4D/ j6D1CYFIzKExvG9oZBp9QxC6HiKikrc4bjy0oelWhm5f80EaK350RJ7jr9v/bwhR pTYN7NRWiPQ= =h15U -----END PGP SIGNATURE-----