Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: X, Issue: 20
June 6, 2011

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Other Microsoft Products
    • 1
    • Third Party Windows Apps
    • 3 (#1)
    • BSD
    • 1
    • Cross Platform
    • 11 (#2)
    • Web Application - SQL Injection
    • 1
    • Web Application
    • 4
    • Network Device
    • 5

*************************** Sponsored By SANS ****************************

Learn how to secure your network during the IPv6 transition at the Security Impact of IPv6 Summit July 15th in Washington DC and take advantage of the post-Summit IPv6 Essentials course July 16th. http://www.sans.org/info/79164

***************************************************************************

TRAINING UPDATE - -- SANS Rocky Mountain 2011, Denver, CO, June 25-30, 2011 8 courses. Bonus evening presentations include SANS Hacklab and Why End Users are Your Weakest Link http://www.sans.org/rocky-mountain-2011/ - -- SANSFIRE 2011, Washington, DC, July 15-24, 2011 41 courses. Bonus evening presentations include Ninja Developers: Penetration Testing and Your SDLC; and Are Your Tools Ready for IPv6? http://www.sans.org/sansfire-2011/ - -- SANS Boston 2011, Boston, MA, August 8-15, 2011 12 courses. Bonus evening presentations include Cost Effectively Implementing PCI through the Critical Controls; and More Practical Insights on the 20 Critical Controls http://www.sans.org/boston-2011/ - -- SANS Virginia Beach 2011, August 22- September 2, 2011 11 courses. Bonus evening presentations include SANS Hacklab; Offensive Countermeasures; and Evolving VoIP Threats http://www.sans.org/virginia-beach-2011/ - -- SANS Ottawa 2011, Ottawa, Ontario, August 28- September 2, 2011 5 courses. Bonus evening presentations include DNS Sinkhole: Peer Into Your Network While You Sleep; and I See What You Did There: Forensic Time Line Analysis http://www.sans.org/ottawa-2011/ - -- SANS Network Security 2011, Las Vegas, NV, September 17-26, 2011 43 courses. Bonus evening presentations include Securing the Kids; Who is Watching the Watchers?; and Emerging Trends in the Law of information Security and Investigations http://www.sans.org/network-security-2011/ - -- Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus London, Austin, Canberra and Ottawa all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php

***************************************************************************

Table Of Contents
Part I -- Critical Vulnerabilities from TippingPoint (www.tippingpoint.com)
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
    Other Microsoft Products
    Third Party Windows Apps
    BSD
    Cross Platform
    Web Application - SQL Injection
    Web Application
    Network Device
    PART I Critical Vulnerabilities

    Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

    *************************************************************

    Widely Deployed Software
    • (1) HIGH: HP 3COM/H3C Intelligent Management Center img recv Buffer Overflow
    • Affected:
      • current versions of H3C Intelligent Management Center
    • Description: In accordance with its 180-day deadline, the Zero Day Initiative has disclosed an 0-day vulnerability affecting current versions of H3C Intelligent Management Center, HP's network management platform. The vulnerable component, img.exe, listens by default on TCP port 8080. When handling user-controlled data, an integer overflow results in too much data being copied onto a fixed-length buffer on the heap. By sending a malicious request, an unauthenticated attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.

    • Status: vendor confirmed, updates not available

    • References:
    • (2) HIGH: IBM Tivoli Endpoint lcfd.exe opts Argument Remote Code Execution Vulnerability
    • Affected:
      • IBM Tivoli Management Framework 3.7.1, 4.1, 4.1.1, 4.3.1
    • Description: IBM has released a patch for its Tivoli Management Framework addressing a security vulnerability. IBM Tivoli Management Framework is designed for network administration. The vulnerable process, lfcd.exe, is a web server running on an endpoint. Virtual "endpoints" for Tivoli include laptops, servers, and point-of-sales devices managed by the framework. By sending an overly long "opts" parameter to the vulnerable process, which listens on port 9495 by default, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine with SYSTEM-level privileges. Authentication is required to exploit this vulnerability, but a built-in username can be used to trivially achieve authentication.

    • Status: vendor confirmed, updates available

    • References:
    Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
    Week 20, 2011

    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11347 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________


    • 11.23.1 - CVE: Not Available
    • Platform: Other Microsoft Products
    • Title: Microsoft Internet Explorer Cross Zone Local Cookie File Access Security Bypass
    • Description: Microsoft Internet Explorer is a web browser. Microsoft Internet Explorer is exposed to a cross zone security bypass issue because the application fails to properly enforce the same origin policy for certain local files. Specifically, an attacker may obtain cookie data through iframe "src" tags that point to a specific local cookie. Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9 are affected.
    • Ref: http://www.securityfocus.com/bid/47989/info


    • 11.23.3 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: Poison Ivy Unspecified Remote Buffer Overflow
    • Description: Poison Ivy is a remote administration tool. The application is exposed to an unspecified remote buffer overflow issue because it fails to perform adequate boundary checks on user-supplied data. Poison Ivy version 2.3.2 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48039/discuss

    • 11.23.4 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: HP 3COM/H3C Intelligent Management Center "img.exe" Remote Heap Buffer Overflow
    • Description: HP 3COM/H3C Intelligent Management Center is a network management application. The application is exposed to a remote heap based buffer overflow issue in the "img.exe" process. Specifically, the application fails to perform adequate boundary checks on user supplied data sent to TCP port 8800. All versions of HP 3COM/H3C Intelligent Management Center are affected.
    • Ref: http://www.securityfocus.com/bid/48065/discuss

    • 11.23.5 - CVE: CVE-2011-2168
    • Platform: BSD
    • Title: OpenBSD libc glob "GLOB_APPEND" and "GLOB_DOOFFS" Flags Multiple Integer Overflow Vulnerabilities
    • Description: libc in OpenBSD is exposed to multiple integer overflow issues that affect the glob implementation. Specifically, the issues arise because of integer overflow errors in the implementation of "GLOB_APPEND" and "GLOB_DOOFFS" flags. These issues occur when processing specially crafted strings passed to the affected flags. OpenBSD versions prior to 4.9 are affected.
    • Ref: http://www.securityfocus.com/bid/48004/discuss

    • 11.23.6 - CVE: Not Available
    • Platform: Cross Platform
    • Title: Sybase EAServer Unspecified Directory Traversal
    • Description: Sybase EAServer is an application used for custom deployments. Sybase EAServer is exposed to a directory traversal vulnerability because it fails to sufficiently sanitize unspecified user-supplied input. EAServer 6.3.1 and earlier are affected.
    • Ref: http://www.sybase.com/detail?id=1093216

    • 11.23.7 - CVE: CVE-2011-0730
    • Platform: Cross Platform
    • Title: Eucalyptus SOAP Interface Remote Arbitrary Command Injection
    • Description: Eucalyptus is an open source software platform that implements IaaS style cloud computing. Eucalyptus is exposed to a remote command injection issue because it fails to adequately validate user-supplied data. Specifically, this issue occurs when processing SOAP requests. Eucalyptus versions 2.0.2 and prior are affected.
    • Ref: http://open.eucalyptus.com/wiki/esa-02

    • 11.23.8 - CVE: Not Available
    • Platform: Cross Platform
    • Title: Wing FTP Server LDAP Authentication Security Bypass
    • Description: Wing FTP Server is a secure multi-protocol file server for Windows, Linux, Mac, FreeBSD, and Solaris. The software is exposed to a security bypass issue because it does not properly verify user credentials when using the LDAP protocol for authentication. An attacker can exploit this issue by entering an empty password. Versions prior to Wing FTP Server 3.8.7 are affected.
    • Ref: http://www.securityfocus.com/bid/47998/discuss

    • 11.23.9 - CVE: CVE-2011-1910
    • Platform: Cross Platform
    • Title: ISC BIND 9 Large RRSIG RRsets Remote Denial of Service
    • Description: ISC BIND is exposed to a remote denial of service issue. Specifically, querying a domain with large RRSIG resource record sets (RRsets) will trigger an assertion failure and cause the name server process to crash due to an off by one error in a buffer size check. ISC BIND 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later are affected.
    • Ref: http://www.isc.org/software/bind/advisories/cve-2011-1910

    • 11.23.10 - CVE: Not Available
    • Platform: Cross Platform
    • Title: Asterisk SIP "REGISTER" Request User Enumeration Weakness
    • Description: Asterisk is a private branch exchange (PBX) application available for Linux, BSD, and Mac OS X platforms. Asterisk is exposed to a user enumeration weakness. This issue occurs because the application responds differently when enumerating valid and invalid SIP usernames using the "REGISTER" request. This issue affects Asterisk version 1.8.4.1 and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48008/discuss

    • 11.23.11 - CVE: Not Available
    • Platform: Cross Platform
    • Title: NetVault SmartDisk "libnvbasics.dll" Remote Denial of Service
    • Description: NetVault SmartDisk is an application used to provide backup service. The application is exposed to a remote denial of service issue. Specifically, the issue occurs due to an integer overflow condition in the "libnvbasics.dll" file when specially crafted data is sent to the application's TCP port 37452. NetVault SmartDisk versions 1.2.2 and prior are affected.
    • Ref: http://www.securityfocus.com/bid/48029/discuss

    • 11.23.12 - CVE: CVE-2011-2173
    • Platform: Cross Platform
    • Title: IBM WebSphere Portal "OutputMediator" Objects Denial of Service
    • Description: IBM WebSphere Portal provides portal solutions. IBM WebSphere Portal is exposed to a remote denial of service issue. This issue occurs when "OutputMediator" objects are not properly cleaned up at the end of a request. IBM WebSphere Portal 6.0.1.7, and 7.0.0.1 before CF002 are affected.
    • Ref: https://www-304.ibm.com/support/docview.wss?uid=swg24029452

    • 11.23.13 - CVE: Not Available
    • Platform: Cross Platform
    • Title: Fetchmail STARTTLS Remote Denial of Service
    • Description: Fetchmail is a freely available, open source, mail retrieval utility. Fetchmail is exposed to a remote denial of service issue because the application fails to properly handle SSL/TLS negotiation. Fetchmail versions 5.9.9 up to and including 6.3.19 are vulnerable.
    • Ref: http://gitorious.org/fetchmail/fetchmail/blobs/legacy_63/fetchmail-SA-2011-01.tx
      t

    • 11.23.14 - CVE: CVE-2011-1220
    • Platform: Cross Platform
    • Title: IBM Tivoli Management Framework "opts" Argument Stack Buffer Overflow
    • Description: IBM Tivoli Management Framework provides tools for managing large numbers of remote locations or devices. The application is exposed to a remote stack based buffer overflow issue because it fails to perform adequate boundary checks on user supplied input. Specifically, this issue occurs when sending a specially crafted HTTP request with an "opts" argument larger than 256 bytes, causing a stack based buffer overflow. IBM Tivoli Management Framework versions 4.1, 4.1.1 and 4.3.1 are affected.
    • Ref: https://www-304.ibm.com/support/docview.wss?uid=swg21499146

    • 11.23.15 - CVE: CVE-2011-1126
    • Platform: Cross Platform
    • Title: Red Hat Xen Hypervisor Implementation Local Guest Denial of Service
    • Description: Xen is an open source hypervisor or virtual machine monitor. The implementation of Xen Hypervisor included in Red Hat Linux is exposed to a denial of service issue. This issue occurs because a 64 bit guest user account can place one of its "vcpus" into user mode without providing a valid non-kernel page table. RedHat Enterprise Linux 5 server and Red Hat Enterprise Linux Desktop 5 clients are affected.
    • Ref: http://www.securityfocus.com/bid/48058/discuss

    • 11.23.16 - CVE: CVE-2011-0082
    • Platform: Cross Platform
    • Title: Mozilla Firefox SSL Certificate Validation Security Weakness
    • Description: Mozilla Firefox is a browser available for multiple platforms. The software is exposed to a security weakness because it fails to properly validate SSL certificates under certain circumstances. This issue occurs when a user validates a self-signed X.509 certificate for a single session; subsequent visits to the site do not require revalidation as expected because the page contents are loaded from the browser cache. Users are not given the opportunity to reconfirm the exception. Firefox versions 4.0.x are affected.
    • Ref: https://bugzilla.mozilla.org/show_bug.cgi?id=660749

    • 11.23.17 - CVE: CVE-2011-1328
    • Platform: Web Application - SQL Injection
    • Title: Radvision iVIEW SCOPIA Management Suite Unspecified SQL Injection
    • Description: iVIEW SCOPIA Management Suite is a network management tool. The application is exposed to an unspecified SQL injection issue because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Versions prior to iVIEW SCOPIA Management Suite 7.5 are vulnerable.
    • Ref: http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000030.html

    • 11.23.18 - CVE: Not Available
    • Platform: Web Application
    • Title: Drupal Multiple Vulnerabilities
    • Description: Drupal is a PHP based content manager. The application is exposed to multiple issues. 1) A security bypass issue when handling private files with the node module. 2) A cross-site scripting issue because it fails to sanitize user-supplied input, specifically the issue affects the error handler. 3) The "color" module for Drupal is exposed to an HTML injection issue because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Drupal versions 7.x and 6.x are affected.
    • Ref: http://drupal.org/node/1168756

    • 11.23.19 - CVE: CVE-2011-1077
    • Platform: Web Application
    • Title: Apache Archiva Multiple Unspecified Cross-Site Scripting and HTML Injection Vulnerabilities
    • Description: Apache Archiva is data repository management software. The application is exposed to multiple cross-site scripting and HTML injection issues because it fails to properly sanitize certain unspecified user-supplied input before using it in dynamically generated content. Versions prior to Apache Archiva 1.3.5 are vulnerable.
    • Ref: http://archiva.apache.org/security.html

    • 11.23.20 - CVE: CVE-2010-4807
    • Platform: Web Application
    • Title: IBM Web Content Management Race Condition Denial of Service
    • Description: IBM Web Content Management is a web content manager for enterprises. The application is exposed to a remote denial of service issue because it fails to prevent a race condition. The problem is due to a "StackOverflowError" exception. IBM Web Content Management versions 7.0.0.1 before CF003 are vulnerable; other versions may also be affected.
    • Ref: https://www-304.ibm.com/support/docview.wss?uid=swg24029452

    • 11.23.21 - CVE: Not Available
    • Platform: Web Application
    • Title: Anymacro Mail System Web Interface Directory Traversal
    • Description: Anymacro Mail System is a mail server application. The application is exposed to a directory traversal issue that can be exploited by providing directory traversal strings in the URI. Anymacro Mail System G4X is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48063/discuss

    • 11.23.22 - CVE: Not Available
    • Platform: Network Device
    • Title: Vordel Gateway Directory Traversal
    • Description: Vordel Gateway is designed to accelerate, secure and integrate all types of traffic on the SOA network. The application is exposed to a directory traversal issue because it fails to sufficiently sanitize user-supplied input passed to the "/manager" page. Vordel Gateway version 6.0.3 is vulnerable and other versions may also be affected.
    • Ref: https://www.upsploit.com/index.php/advisories/view/UPS-2011-0023


    • 11.23.24 - CVE: CVE-2011-1645, CVE-2011-0766, CVE-2011-1646
    • Platform: Network Device
    • Title: Cisco RVS4000/WRVS4400N Web Management Interface Multiple Vulnerabilities
    • Description: Cisco RVS4000 and WRVS4400N routers are gigabit networking devices that have IPsec VPN, firewall, and intrusion-prevention capabilities. Cisco RVS4000 and WRVS4400N routers are exposed to multiple issues. 1) An information disclosure issue that affects the web-based management interface. 2) An information disclosure issue that affects the web-management interface. This issue is due to an error that may allow attackers to gain access to the administrator's SSL certificate's private and public keys used for connecting to a VPN network. 3) A remote command injection issue that affects the web-based management interface. Specifically, arbitrary commands may be injected through ping "test" and traceroute "test" parameters. Cisco RVS4000 Gigabit Security Router v1 and v2, Cisco WRVS4400N Wireless-N Gigabit Security Router V1.0, V1.1 and V2 which prior to the first fixed release are affected.
    • Ref: http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7f190.s
      html

    • 11.23.25 - CVE: Not Available
    • Platform: Network Device
    • Title: WebDefend Enterprise Manager Appliance Hard Coded Authentication Security Bypass
    • Description: WebDefend is a security appliance. WebDefend Enterprise Manager Appliance is exposed to a security bypass issue. This issue occurs because the application stores hard coded MySQL username and password credentials. Trustwave WebDefend Enterprise Manager Appliance versions 5.0 (7.01.903) and 4.0 (6.45.659) are affected.
    • Ref: http://www.securityfocus.com/bid/48002/discuss

    • 11.23.26 - CVE: CVE-2011-0767
    • Platform: Network Device
    • Title: Imperva SecureSphere Web Application Firewall And MX Management Server HTML Injection Vulnerability
    • Description: Imperva SecureSphere Web Application Firewall and MX Management Server are firewall applications. The applications are exposed to an HTML injection issue because they fail to properly sanitize user-supplied input to the management GUI. SecureSphere Web Application Firewall 6.2 MX Management Server (all 6.2 releases), 7.x MX Management Server (all 7.x releases) and 8.x MX Management Server (all 8.x releases) are affected.
    • Ref: http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html

    (c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

    Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account