Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: X, Issue: 15
April 21, 2011

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Other Microsoft Products
    • 2
    • Third Party Windows Apps
    • 3
    • Linux
    • 1
    • Novell
    • 1
    • Cross Platform
    • 9 (#1,#2)
    • Web Application - Cross Site Scripting
    • 5
    • Web Application - SQL Injection
    • 1
    • Web Application
    • 3
    • Hardware
    • 1

************************ Sponsored by SANS **********************

Don't Miss It! The 7th Annual Log Management Survey Webcasts Part I & II Part I, Monday, 4/25/11 at 1:00 PM EDT http://www.sans.org/info/76303 Sponsored By: ArcSight, LogLogic, LogRhythm, Splunk & Trustwave

Part II, Tuesday, 4/26/11 at 1:00 PM EDT http://www.sans.org/info/76308 Sponsored By: ArcSight, LogLogic, LogRhythm, Splunk & Trustwave

***************************************************************** TRAINING UPDATE -- SANS Northern Virginia 2011, Reston, VA, April 15-23, 2011 11 courses. Bonus evening presentations include Cyberwar or Business as Usual? The State of US Federal CyberSecurity Efforts http://www.sans.org/northern-virginia-2011/ -- SANS Security West 2011, San Diego, CA, May 3-12, 2011 23 courses. Bonus evening presentations include The Emerging Security Threat Panel Discussion; and Emerging Trends in Data Law and Investigation http://www.sans.org/security-west-2011/ -- SANS Cyber Guardian 2011, Baltimore, MD, May 15-22, 2011 8 courses. Bonus evening presentations include Windows Exploratory Surgery with Process Hacker and State of the Hack: Stuxnet. 8 courses. http://www.sans.org/cyber-guardian-2011/ -- SANS Rocky Mountain 2011, Denver, CO, June 25-30, 2011 7 courses. Bonus evening presentations include SANS Hacklab and Why End Users are Your Weakest Link http://www.sans.org/rocky-mountain-2011/ -- SANSFIRE 2011, Washington, DC, July 15-24, 2011 40 courses. Bonus evening presentations include Ninja developers: Penetration testing and Your SDLC; and Are Your Tools Ready for IPv6? http://www.sans.org/sansfire-2011/ -- SANS Boston 2011, Boston, MA, August 8-15, 2011 12 courses. Bonus evening presentations include Cost Effectively Implementing PCI through the Critical Controls; and More Practical Insights on the 20 Critical Controls http://www.sans.org/boston-2011/ -- Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Barcelona, Amsterdam, Brisbane, London and Austin all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php *****************************************************************

Table Of Contents
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
Other Microsoft Products
Third Party Windows Apps
Linux
Novell
Cross Platform
Web Application - Cross Site Scripting
Web Application - SQL Injection
Web Application
Hardware

************************ Sponsored Link: ************************ 1) New Paper in the SANS reading room: Implementing the 20 Critical Controls with Security Information Event Management Systems, by Senior SANS Analyst, James Tarala. http://www.sans.org/info/76313 *****************************************************************

PART I Critical Vulnerabilities

Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

*****************************

Widely Deployed Software
  • (1) HIGH: Google Chrome Multiple Security Vulnerabilities
  • Affected:
    • 10.0.648.205
  • Description: Google has released a patch for multiple security vulnerabilities affecting its Chrome web browser. The issues include a use-after-free vulnerability and a heap buffer overflow in the GPU process. Few technical details regarding the vulnerabilities are available, but it is likely that, by enticing a target to view a malicious site, an attacker can exploit them in order to execute arbitrary code on the target's machine.

  • Status: vendor confirmed, updates available

  • References:
Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
Week 15, 2011

Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11166 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________


  • 11.17.1 - CVE: Not Available
  • Platform: Other Microsoft Products
  • Title: Microsoft Internet Explorer Unspecified Remote Code Execution
  • Description: Internet Explorer is a browser for the Microsoft Windows operating system. Microsoft Internet Explorer is exposed to an unspecified remote code execution issue. Internet Explorer 9 is vulnerable; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/47345/info

  • 11.17.2 - CVE: Not Available
  • Platform: Other Microsoft Products
  • Title: Microsoft Windows Media Player ".ogg" File Remote Denial of Service
  • Description: Microsoft Windows Media Player is a multimedia application available for the Windows operating system. The application is exposed to a remote denial of service issue. Windows Media Player 11 is affected; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/47413/info

  • 11.17.3 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: Winamp ".wlz" File Remote Buffer Overflow
  • Description: Winamp is a multimedia player available for Microsoft Windows. The software is exposed to a buffer overflow issue because if fails to bound check user-supplied data before copying it into an insufficiently sized buffer. Specifically, the application fails to handle specially crafted ".wlz" files.Winamp 5.6.1 is affected.
  • Ref: http://www.securityfocus.com/bid/47334/info

  • 11.17.4 - CVE: CVE-2011-1426
  • Platform: Third Party Windows Apps
  • Title: Real Networks RealPlayer "OpenURLInDefaultBrowser()" Function Remote Code Execution
  • Description: Real Networks RealPlayer is a media player available for multiple platforms. The application is exposed to a remote code execution issue because of an error in the internal browser component. RealPlayer versions prior to 14.0.3 for Windows are affected.
  • Ref: http://service.real.com/realplayer/security/04122011_player/en/

  • 11.17.5 - CVE: CVE-2011-1655, CVE-2011-1653, CVE-2011-1654
  • Platform: Third Party Windows Apps
  • Title: Computer Associates Total Defense Remote Code Execution and SQL Injection
  • Description: Computer Associates Total Defense is a suite of security applications. The application is exposed to the following issues: a remote code execution issue exists in the "CA.Itm.Server.ManagementWS.dll" component, a remote code execution issue exists in the "management.asmx" module of the UNCWS web service, and multiple SQL injection issues. Total Defense version r12 is affected; other versions may also be affected.
  • Ref: https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={CD065CEC-AF
    E2-4D9D-8E0B-BE7F6E345866}

  • 11.17.6 - CVE: Not Available
  • Platform: Linux
  • Title: Linux Kernel CIFS Local Security Bypass
  • Description: The Linux kernel is the core of the Linux operating system. It is exposed to a local security bypass issue. The issue occurs when a user mounts a CIFS share with authentication and another user is able to mount the same share without needing the correct password. Kernel versions 2.6.x up to 2.6.37 is affected.
  • Ref: http://www.securityfocus.com/bid/47381

  • 11.17.7 - CVE: CVE-2011-0988
  • Platform: Novell
  • Title: SUSE Pure-FTPd Local Insecure File Permissions
  • Description: Pure-FTPd is an FTP server application. The software is exposed to a local insecure file permissions issue when running OES Netware extensions. Pure-ftpd 1.0.22 on SLES 10 SP3 and SP4 and SLED 10 SP3 and SP4 are affected
  • Ref: http://www.securityfocus.com/bid/47425/references

  • 11.17.8 - CVE: Not Available
  • Platform: Cross Platform
  • Title: TOTVS ERP Microsiga Protheus Denial of Service
  • Description: TOTVS ERP Microsiga Protheus is an application server. The software is exposed to a denial of service issue due to a memory corruption error. User-supplied input passed as an unspecified "size" parameter is used in a "memmove()" function without adequate validation. TOTVS ERP Microsiga Protheus version 8 and 10 are affected.
  • Ref: http://www.securityfocus.com/archive/1/517465

  • 11.17.9 - CVE: Not Available
  • Platform: Cross Platform
  • Title: SAP GUI "saplogon.ini" File Buffer Overflow
  • Description: SAP GUI is a client interface for accessing various SAP applications. The software is exposed to a buffer overflow issue because it fails to perform adequate checks on user-supplied input. SAP GUI version 7.1 and 7.2 are affected, other versions may also be affected.
  • Ref: http://dsecrg.com/pages/vul/show.php?id=317

  • 11.17.10 - CVE: CVE-2011-1095
  • Platform: Cross Platform
  • Title: "glibc" Library Local Privilege Escalation
  • Description: glibc is an implementation of the GNU C library. The library is exposed to a local privilege escalation issue because it fails to perform adequate boundary checks on user-supplied data. glibc versions before 2.13 are affected.
  • Ref: http://sourceware.org/bugzilla/show_bug.cgi?id=11904

  • 11.17.11 - CVE: CVE-2011-1302,CVE-2011-1301,CVE-2011-130010.0.648.205 are affected.
  • Platform: Cross Platform
  • Title: Google Chrome Multiple Memory Corruption and Heap Overflow
  • Description: Google Chrome is a web browser for multiple platforms. The software is exposed to multiple security issues. An off-by-three memory corruption issue affects the GPU process. A use-after-free memory corruption issue affects the GPU process. A heap-based overflow issue affects the GPU process. Google Chrome Versions prior to Chrome
  • Ref: http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html

  • 11.17.12 - CVE: CVE-2011-1142
  • Platform: Cross Platform
  • Title: Wireshark Multiple Denial of Service and Buffer Overflow
  • Description: Wireshark (formerly Ethereal) is an application for analyzing network traffic. The application is exposed to multiple remote issues. A denial of service issue affects the NFS dissector. A denial of service issue affects the X.509if dissector. A buffer overflow issue affects the DECT dissector. Wireshark versions 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4 are affected.
  • Ref: http://www.wireshark.org/security/wnpa-sec-2011-06.html

  • 11.17.13 - CVE: CVE-2011-1589
  • Platform: Cross Platform
  • Title: Mojolicious Directory Traversal
  • Description: Mojolicious is a web framework for the PERL programming language. The application is exposed to a directory traversal issue because it fails to sufficiently sanitize user-supplied input. Mojolicious versions prior to 1.16 are affected.
  • Ref: http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.16/Changes

  • 11.17.14 - CVE: CVE-2011-1717
  • Platform: Cross Platform
  • Title: Skype Insecure File Permissions Information Disclosure
  • Description: Skype is a peer-to-peer communications application that supports Internet based voice communications. The software for Android is exposed to an information disclosure issue because the application sets insecure file permissions on the cached profile information. All versions of Skype for Android are affected.
  • Ref: http://blogs.skype.com/security/2011/04/privacy_vulnerability_in_skype.html


  • 11.17.16 - CVE: CVE-2011-1421
  • Platform: Cross Platform
  • Title: EMC NetWorker Unspecified File Remote Code Execution
  • Description: EMC NetWorker is a centralized data protection system available for multiple operating systems. The software is exposed to a potential issue due to incorrect permissions in certain unspecified files. EMC NetWorker 7.6.x and 7.5.x are affected.
  • Ref: http://www.securityfocus.com/archive/1/517532

  • 11.17.17 - CVE: CVE-2011-0286
  • Platform: Web Application - Cross Site Scripting
  • Title: BlackBerry Enterprise Server Web Desktop Manager Component Cross-Site Scripting
  • Description: Blackberry Enterprise Server is communications middleware for Research In Motion Blackberry devices. The software is exposed to a cross-site scripting issue because it fails to sufficiently sanitize user-supplied input. BlackBerry Enterprise Server before 5.0.2 MR5 and 5.0.3 before MR1 are affected.
  • Ref: http://www.blackberry.com/btsc/dynamickc.do?externalId=KB26296&sliceID=1&
    ;command=show&forward=nonthreadedKC&kcId=KB26296

  • 11.17.18 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: SAP Netweaver Multiple Unspecified Cross-Site Scripting and Information Disclosure Vulnerabilities
  • Description: SAP NetWeaver is an integration platform for enterprise applications. The software is exposed to a cross-site scripting issue and an information disclosure issue. NetWeaver up to 7.30 and SAP Web Application Server up to 7.0.10 are affected
  • Ref: http://www.securityfocus.com/bid/47391/info


  • 11.17.20 - CVE: CVE-2011-1422
  • Platform: Web Application - Cross Site Scripting
  • Title: EMC Adaptive Authentication Flash Shockwave File Cross Domain Scripting
  • Description: EMC Adaptive Authentication is an authentication platform. The software is exposed to a cross-domain scripting issue. Adaptive Authentication (On-Premise) versions 2.x, 5.7.x and 6.x are affected.
  • Ref: http://www.securityfocus.com/archive/1/517534

  • 11.17.21 - CVE: CVE-2011-0898,CVE-2011-0897, CVE-2011-1534
  • Platform: Web Application - Cross Site Scripting
  • Title: HP Network Node Manager i Unspecified Cross Site Scripting and Unauthorized Access
  • Description: HP OpenView Network Node Manager i (NNMi) is a fault management application for IP networks. The software is exposed to the following issues: an unspecified cross-site scripting issue because it fails to adequately sanitize user-supplied input, a local unauthorized access issue caused by an unspecified error and a local security-bypass issue. HP Open View Network Node Manager i version 9.00 is affected.
  • Ref: http://www.securityfocus.com/archive/1/517471

  • 11.17.22 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: TinyBB "viewthread.php" SQL Injection Vulnerability
  • Description: TinyBB is a bulletin board application implemented in PHP. The software is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data passed to the "post" parameter of the "inc/viewthread.php"script.TinyBB 1.4 is affected.
  • Ref: http://www.securityfocus.com/bid/47346/info

  • 11.17.23 - CVE: CVE-2010-3260
  • Platform: Web Application
  • Title: Orbeon Forms XML Injection
  • Description: Orbeon Forms is a web-based application used to build and deploy web forms. The application is exposed to an XML injection issue because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Orbeon Forms versions prior to 3.9 are affected.
  • Ref: http://wiki.orbeon.com/forms/doc/developer-guide/release-notes/39#TOC-Security

  • 11.17.24 - CVE:CVE-2011-1690,CVE-2011-1689,CVE-2011-1688,CVE-2011-1687,CVE-2011-1686,CVE-2011-1685
  • Platform: Web Application
  • Title: RT Multiple Remote Vulnerabilities
  • Description: RT (Request Tracker) is a bug tracking application. RT is exposed to multiple remote vulnerabilities. RT Versions prior to 3.6.11 and 3.8.10 are affected.
  • Ref: http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000188.html

  • 11.17.25 - CVE: Not Available
  • Platform: Web Application
  • Title: MyBB Information Disclosure and SQL Injection
  • Description: MyBB is a PHP-based forum application. MyBB is exposed to an SQL injection issue.and an information disclosure issue. MyBB versions prior to 1.6.3 and 1.4.16 are affected.
  • Ref: http://blog.mybb.com/2011/04/17/mybb-1-6-3-and-1-4-16-security-update/

  • 11.17.26 - CVE: Not Available
  • Platform: Hardware
  • Title: Technicolor THOMSON TG585v7 Wireless Router "url" Parameter Cross-Site Scripting
  • Description: THOMSON TG585v7 is a wireless router device. The device is exposed to a cross-site scripting issue because its web interface fails to properly sanitize user-supplied input. Firmware versions prior to 8.2.7.6 are affected.
  • Ref: http://www.securityfocus.com/archive/1/517526

(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. For a free subscription or to update a current subscription, visit http://portal.sans.org/