Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: X, Issue: 25
July 14, 2011

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Windows
    • 3 (#1)
    • Third Party Windows Apps
    • 6 (#2)
    • Linux
    • 1
    • HP-UX
    • 1
    • Cross Platform
    • 7
    • Web Application
    • 3
    • Network Device
    • 5

*********************** Sponsored By McAfee, Inc. ***********************

McAfee and Brocade release results of 2011 Data Center survey: "Critical Challenges of the Virtualized Data Center." This recent survey of IT professionals highlights current requirements and challenges associated with hybrid (virtualized plus physical) data centers including a focus on creating and maintaining hybrid trust boundaries with Next Generation Firewalls and Network Intrusion Prevention.

http://www.sans.org/info/82034 ************************************************************************* TRAINING UPDATE --SANSFIRE 2011, Washington, DC, July 15-24, 2011 42 courses. Bonus evening presentations include Ninja Developers: Penetration Testing and Your SDLC; and Are Your Tools Ready for IPv6? http://www.sans.org/sansfire-2011/ --SANS Boston 2011, Boston, MA, August 8-15, 2011 12 courses. Bonus evening presentations include When Prevention Fails: Extending IR and Digital Forensics Capabilities to the Corporate Network; and More Practical Insights on the 20 Critical Controls http://www.sans.org/boston-2011/ --SANS Virginia Beach 2011, August 22- September 2, 2011 11 courses. Bonus evening presentations include SANS Hacklab; Offensive Countermeasures; and Evolving VoIP Threats http://www.sans.org/virginia-beach-2011/ --SANS Ottawa 2011, Ottawa, Ontario, August 28- September 2, 2011 6 courses. Bonus evening presentations include DNS Sinkhole: Peer Into Your Network While You Sleep; and I See What You Did There: Forensic Time Line Analysis http://www.sans.org/ottawa-2011/ --SANS Network Security 2011, Las Vegas, NV, September 17-26, 2011 45 courses. Bonus evening presentations include Securing the Kids; Who is Watching the Watchers?; and Emerging Trends in the Law of Information Security and Investigations http://www.sans.org/network-security-2011/ --SANS Chicago 2011, Chicago, IL, October 23-28, 2011 6 courses. Bonus evening presentations include Computer Forensics in the Virtual Realm and Electrical Grid Security http://www.sans.org/chicago-2011/ --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Melbourne, Tokyo, Delhi, London and Baltimore all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php

****************************************************************************

Table Of Contents
Part I -- Critical Vulnerabilities from TippingPoint (www.tippingpoint.com)
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
    Windows
    Third Party Windows Apps
    Linux
    HP-UX
    Cross Platform
    Web Application
    Network Device

    *************************** Sponsored Links: *******************************

    1) New Webcast: Optimized Network Monitoring for Real-World Threats featuring senior SANS Analyst Dave Shackleford and sponsored by VSS Monitoring. Tuesday, August 16, 1PM EST. http://www.sans.org/info/82039

    2) Two-day workshop on the Art and Science of Baking Security into Applications and Networks - listen to techniques leading companies have used which have provided IT architects and engineer's knowledge to ensure security is considered in every step of the development life cycle. SANS Baking Security into Applications and Networks Workshop, Washington DC, August 29 -30, http://www.sans.org/info/82044

    3) Earn a Master's Degree in Security Engineering or in Security Management at SANS Technology Institute (STI). Apply today! http://www.sans.org/info/82049 ****************************************************************************

    PART I Critical Vulnerabilities

    PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

    *************************************************************

    Widely Deployed Software
    • (1) HIGH: Microsoft Windows Bluetooth Stack overflow
    • Affected:
      • Windows Vista Service Pack 1,2
      • Windows Vista x64 Edition Service Pack 1,2
      • Windows 7 for 32-bit Systems
      • Windows 7 for 32-bit Systems Service Pack 1
    • Description: Microsoft has released a patch addressing a security vulnerability in its Bluetooth driver code. By sending malicious Bluetooth packets, an attacker can cause the driver code to access uninitialized or deleted objects and then execute arbitrary code on a target's machine with SYSTEM-level privileges. This vulnerability requires the Bluetooth driver to be enabled.

    • Status: vendor confirmed, updates available

    • References:
    Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
    Week 25, 2011

    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11686 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________


    • 11.29.1 - CVE: CVE-2011-1265
    • Platform: Windows
    • Title: Microsoft Windows Bluetooth Stack Remote Code Execution
    • Description: Bluetooth is an industry standard protocol that enables wireless connectivity for computers and other devices. The application is exposed to a remote code execution issue because the Bluetooth stack fails to adequately handle specially crafted Bluetooth packets. The issue affects the "bthport.sys" driver. Windows Vista SP1 and SP2, Windows 7 and Windows 7 SP1 are affected.
    • Ref: http://www.microsoft.com/technet/security/Bulletin/MS11-053.mspx

    • 11.29.2 - CVE: CVE-2011-1281, CVE-2011-1282, CVE-2011-1283,CVE-2011-1284, CVE-2011-1870
    • Platform: Windows
    • Title: Microsoft Windows CSRSS Multiple Local Privilege Escalation Vulnerabilities
    • Description: Multiple local privilege escalation issues affect the Microsoft Windows Client/Server Runtime Subsystem (CSRSS) because it fails to sufficiently allocate memory when dealing with specific user transactions. Windows XP SP3 and x64 SP2, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 and Server 2008 SP2, Windows 7 and Windows 7 SP1, Windows Server 2008 R2 x64 and x64 SP1 are affected.
    • Ref: http://www.microsoft.com/technet/security/bulletin/MS11-056.mspx

    • 11.29.3 - CVE: CVE-2011-1874, CVE-2011-1875, CVE-2011-1876,CVE-2011-1877, CVE-2011-1878, CVE-2011-1879, CVE-2011-1880,CVE-2011-1881, CVE-2011-1882, CVE-2011-1883, CVE-2011-1884,CVE-2011-1885, CVE-2011-1886, CVE-2011-1887, CVE-2011-1888
    • Platform: Windows
    • Title: Microsoft Windows Kernel "Win32k.sys" Multiple Vulnerabilities
    • Description: Microsoft Windows is exposed to multiple security issues that occur in the Windows kernel "Win32k.sys" kernel mode device driver. Multiple local privilege escalation issues are caused by a NULL pointer dereference error that occurs due to a failure to properly manage pointers to certain kernel driver objects. Multiple local privilege escalation issues occur because an use-after-free error occurs due to improper driver object management. A local information disclosure issue occurs because it fails to properly validate certain function parameters. Windows XP SP3 and x64 SP2, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 and Server 2008 SP2, Windows 7 and Windows 7 SP1, Windows Server 2008 R2 x64 and x64 SP1 are affected.
    • Ref: http://www.microsoft.com/technet/security/bulletin/MS11-054.mspx

    • 11.29.4 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: ESTsoft ALPlayer ".asx" File Buffer Overflow
    • Description: ALPlayer is a media player available for Microsoft Windows. ALPlayer is exposed to a stack-based buffer overflow issue because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs when opening a specially crafted ".asx" playlist file. ALPlayer 2.0 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48583/discuss

    • 11.29.5 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: Chilkat Crypt ActiveX Control "SaveDecrypted()" Insecure Method Vulnerability
    • Description: Chikat Crypt ActiveX control is used to encrypt, hash, and sign data. The application is exposed to an issue caused by an insecure method that lets attackers overwrite files with arbitrary, attacker-controlled content. This issue occurs in the "SaveDecrypted()" method of the "ChilkatCrypt2.dll" ActiveX control. aTube Catcher version 2.3.570 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/archive/1/518740

    • 5.0 - CVE: Not Available2005 is vulnerable and other versions may also be affected.
    • Platform: Third Party Windows Apps
    • Title: ZipWiz 2005 ".zip" File Buffer Overflow
    • Description: ZipWiz 2005 is a file compression application. The application is exposed to a buffer overflow issue because it fails to perform adequate checks on user-supplied input. Specifically, this issue occurs when processing a specially crafted ".zip" file. ZipWiz
    • Ref: http://www.securityfocus.com/bid/48624/discuss

    • 11.29.7 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: Effective File Search (EFS) DLL Loading Arbitrary Code Execution
    • Description: Effective File Search is a file search utility for Microsoft Windows. The application is exposed to a security issue because the application searches for the "ztvunrar36.dll" Dynamic Link Library in the current working directory. The issue can be exploited by placing both a specially crafted library file and a file that is associated with the vulnerable application in an attacker controlled location. Using the application to open a ".efs" file will cause the malicious library file to be executed. Effective File Search 6.7 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48608/discuss

    • 11.29.8 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: ZipItFree ".zip" File Buffer Overflow
    • Description: ZipItFree is a file compression application. The application is exposed to a heap-based buffer overflow issue because it fails to perform adequate checks on user-supplied input. Specifically, this issue occurs when processing a specially crafted ".zip" file. ZipItFree 3.0 is vulnerable; other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48629/discuss

    • 11.29.9 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: Trend Micro Control Manager "CASProcessor.exe" BLOB Remote Code Execution
    • Description: Trend Micro Control Manager is a Web-based management console. The application is exposed to a remote code execution issue. The issue affects the "En_Utility.dll" file when communicating with the "CASProcessor.exe" process through TCP port 20801. The issue occurs in the "HandleMcpRequest()" function when parsing a specially crafted packet with malformed BLOB encrypted data. Trend Micro Control Manager 5.0 and 5.5 are vulnerable and other versions may also be affected.
    • Ref: http://esupport.trendmicro.com/solution/en-us/1058292.aspx

    • 11.29.10 - CVE: Not Available
    • Platform: Linux
    • Title: Debian and Ubuntu foo2zjs Insecure Temporary File Creation Vulnerability
    • Description: Foo2zjs is an open source printer driver for the ZjStream protocol. Foo2zjs creates "/tmp/foo2zjs" in an insecure manner. An attacker with local access could potentially exploit this issue to perform symbolic-link attacks, overwriting arbitrary files in the context of the affected application. Debian and Ubuntu are affected.
    • Ref: http://www.securityfocus.com/bid/48586/discuss


    • 11.29.12 - CVE: CVE-2011-2516
    • Platform: Cross Platform
    • Title: Apache XML Security for C++ Signature Key Parsing Denial of Service
    • Description: Apache XML Security for C++ is a library that implements the primary security standards for XML. The library is exposed to a denial of service issue. Specifically, the issue is caused by a buffer overflow condition when creating or verifying XML signatures with RSA keys of sizes in the order of 8192 bits or more. Attackers can exploit this issue through overly long keys and cause the application to deny service. Apache XML Security for C++ versions prior to 1.6.1 are affected.
    • Ref: http://santuario.apache.org/secadv/CVE-2011-2516.txt

    • 11.29.13 - CVE: Not Available
    • Platform: Cross Platform
    • Title: libpng PNG File Denial of Service
    • Description: The "libpng" library is a PNG reference library. The application is exposed to a remote denial of service issue because it fails to properly handle a sCAL chunk. Specifically, the issue occurs when processing specially crafted PNG files. libpng versions 1.5.x before 1.5.4, 1.4.x before 1.4.8, 1.2.x before 1.2.45 and 1.0.x before 1.0.55 are affected.
    • Ref: http://www.kb.cert.org/vuls/id/819894


    • 11.29.15 - CVE: CVE-2011-1224
    • Platform: Cross Platform
    • Title: IBM WebSphere MQ CDP Extension Revoked SSL Certificate Validation Security Bypass Vulnerability
    • Description: IBM WebSphere MQ is a commercially available messaging engine for enterprises. The application is exposed to a security bypass issue that occurs because it fails to use the CRL Distribution Points certificate extension which results in improper validation of revoked SSL certificates. Versions prior to WebSphere MQ 6.0.2.11 and 7.0.1.5 are vulnerable.
    • Ref: http://www-01.ibm.com/support/docview.wss?uid=swg27014224 http://www-01.ibm.com/support/docview.wss?uid=swg27007069

    • 11.29.16 - CVE: Not Available
    • Platform: Cross Platform
    • Title: libsndfile PAF File Integer Overflow
    • Description: The "libsndfile" library is used for reading and writing audio files. The application is exposed to an integer overflow issue because it fails to perform adequate boundary checks on user-supplied data. Specifically, this issue occurs within the "paf24_init()" function of the "src/paf.c" source file when parsing specially crafted "PAF" (Paris Audio) files. libsndfile 1.0.24 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48644/discuss

    • 11.29.17 - CVE: CVE-2011-2198
    • Platform: Cross Platform
    • Title: libvte9 "vte_sequence_handler_multiple()" Function Remote Denial of Service
    • Description: The VTE library provides a terminal emulator widget (VteTerminal) for applications using the GTK+ toolkit. The library is exposed to a remote denial of service issue. Specifically, the issue occurs because the library fails to sanitize user-supplied input that has been submitted to the "insert-blank-characters" capability (defined in "caps.c"). The issue affects the "vte_sequence_handler_multiple()" function of the "vteseq.c" source file. libvte9 1:0.24.3-2 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48645/discuss

    • 11.29.18 - CVE: Not Available
    • Platform: Cross Platform
    • Title: SAP MaxDB NULL Pointer Dereference Denial of Service
    • Description: SAP MaxDB is a database application available for multiple platforms. The application is exposed to a denial of service issue. Specifically, the issue occurs due to a NULL pointer dereference error in the "DBTech-MAXDB" service (kernel.exe) when processing specially crafted login handshake packets. SAP MaxDB 7.8.01.18 is vulnerable; other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/48646/discuss

    • 11.29.19 - CVE: CVE-2011-2508,CVE-2011-2507,CVE-2011-2506,CVE-2011-2505
    • Platform: Web Application
    • Title: phpMyAdmin Multiple Remote Vulnerabilities
    • Description: phpMyAdmin is a PHP-based Web application. The application is exposed to multiple issues. An arbitrary PHP code execution issue occurs due to an error in the "Swekey_login()" function of the "libraries/auth/swekey/swekey.auth.lib.php" script. An arbitrary PHP code execution issue occurs because the application fails to properly sanitize user-supplied input passed to the "PMA_createTargetTables()" function of the "libraries/server_synchronize.lib.php" script. A local file include issue occurs because the application fails to properly sanitize user-supplied input passed to the "PMA_displayTableBody()" function of the "libraries/display_tbl.lib.php" script. A PHP code injection is possible in the setup scripts if the session variables are overwritten. phpMyAdmin versions prior to 3.3.10.2 and 3.4.3.1 are vulnerable.
    • Ref: http://www.phpmyadmin.net/home_page/security/PMASA-2011-5.php http://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php http://www.phpmyadmin.net/home_page/security/PMASA-2011-7.php http://www.phpmyadmin.net/home_page/security/PMASA-2011-8.php

    • 11.29.20 - CVE: Not Available
    • Platform: Web Application
    • Title: DotNetNuke Multiple Security Bypass Vulnerabilities
    • Description: DotNetNuke is an open source framework for creating and deploying web sites. The application is exposed to multiple security bypass issues. A security bypass issue occurs due to an error in the "soft-delete" function. An attacker can exploit this issue to undelete a user by re-registering with the same credentials. A security bypass issue occurs due to an error when validating user permissions in certain management functions. A security bypass issue occurs due to an error when verifying uploaded files. A security bypass issue occurs due to an error when granting edit permissions for a webpage or a module. Versions prior to DotNetNuke 5.6.3 are vulnerable.
    • Ref: http://www.securityfocus.com/bid/48584/discuss

    • 11.29.21 - CVE: Not Available
    • Platform: Web Application
    • Title: Ferdows CMS Cross-Site Scripting and Multiple SQL Injection Vulnerabilities
    • Description: Ferdows CMS is a web-based application implemented in ASP.NET. Ferdows CMS is exposed to multiple issues. A cross-site scripting issue affects the "dataid" parameter of the "showdata.aspx" script. The application is also exposed to Multiple SQL injection issues. Ferdows CMS Pro 1.1.0 and Ferdows CMS 9.0.5 are affected.
    • Ref: http://www.securityfocus.com/bid/48640/discuss

    • 11.29.22 - CVE: CVE-2011-2064
    • Platform: Network Device
    • Title: Cisco Content Services Gateway Malformed ICMP Messages Denial of Service
    • Description: Cisco Content Services Gateway is a device used to monitor network use. Cisco Content Services Gateway is exposed to a denial of service issue when handling specially crafted ICMP messages. Second Generation of Content Services Gateway is affected.
    • Ref: http://www.cisco.com/en/US/products/products_security_advisory09186a0080b86503.s
      html

    • 11.29.23 - CVE: Not Available
    • Platform: Network Device
    • Title: D-Link DSL-2650U Remote Denial of Service
    • Description: The D-Link DSL-2650U is an ADSL router with an 802.11g wireless access point. The Web server running on the device is exposed to a remote denial of service issue. The issue occurs due to the improper handling of an overly large string provided to the "diagPrev" parameter of the "diagpppoe.cgi" script. D-Link DSL-2650U 1.20 is affected; other versions may also be vulnerable.
    • Ref: http://www.securityfocus.com/bid/48612/discuss

    • 11.29.24 - CVE: Not Available
    • Platform: Network Device
    • Title: Aruba Networks ArubaOS HTTP Response Splitting and HTML Injection Vulnerabilities
    • Description: ArubaOS is an operating system used by various Aruba Networks network devices, including the Aruba Mobility Controller. Aruba Networks ArubaOS is exposed to multiple input validation issues. An HTML injection issue affects the reporting feature of ArubaOS and AirWave Administration WebUIs. An HTTP response splitting issue affects the Captive Portal Web Interface. ArubaOS 3.3.X, 3.4.X, 5.0.X, 6.0.X, 2.4.X-FIPS, 3.3.X-FIPS, 3.4.X-FIPS and AirWave 7.2.X are affected.
    • Ref: http://www.securityfocus.com/archive/1/518751

    • 11.29.25 - CVE: Not Available
    • Platform: Network Device
    • Title: Ingate Firewall and SIParator SIP Module Remote Denial of Service
    • Description: Ingate Firewalls are hardware firewall devices that support Session Initiation Protocol (SIP) via SIParator SIP-based communication devices. Ingate Firewall and SIParator are exposed to a denial of service issue. The issue occurs when processing SIP requests that contain multiple Transport Layer Security destinations. Ingate SIParator 4.9.1 and prior are affected.
    • Ref: http://www.ingate.com/Relnote.php?ver=492


    (c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

    Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account