Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: X, Issue: 30
August 18, 2011

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • ______________________________________________________________________
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Windows
    • 1
    • Other Microsoft Products
    • 1
    • Third Party Windows Apps
    • 4
    • Linux
    • 2
    • Unix
    • 1
    • Cross Platform
    • 11 (#1,#2,#3,#4)
    • Web Application - Cross Site Scripting
    • 1
    • Web Application - SQL Injection
    • 3
    • Web Application
    • 1
    • Hardware
    • 1

***************** Sponsored By Core Security Technologies *****************

Sign Up TODAY for SANS Special Webcast: SANS Security 660 Series: Return-Oriented Programming and Exploitation with Stephen Sims on 8/22 at 1:00 PM ET. Go to: http://www.sans.org/info/84674

************************************************************************** TRAINING UPDATE - --SANS Virginia Beach 2011, August 22- September 2, 2011 10 courses. Bonus evening presentations include SANS Hacklab; Offensive Countermeasures; and Evolving VoIP Threats http://www.sans.org/virginia-beach-2011/ - -- The National Security Architecture Workshop, DC, Aug. 29-30,2011 2-day workshop discussing techniques to ensure security is considered in every step of the development life cycle, http://www.sans.org/baking-security-applications-networks-2011/ - --SANS Ottawa 2011, Ottawa, Ontario, August 28- September 2, 2011 6 courses. Bonus evening presentations include DNS Sinkhole: Peer Into Your Network While You Sleep; and I See What You Did There: Forensic Time Line Analysis http://www.sans.org/ottawa-2011/ - --SANS Network Security 2011, Las Vegas, NV, September 17-26, 2011 45 courses. Bonus evening presentations include Securing the Kids; Who is Watching the Watchers?; and Emerging Trends in the Law of Information Security and Investigations http://www.sans.org/network-security-2011/ - -- NCIC: The National Cybersecurity Innovations Conference, DC, Oct. 11-12, 2011 3 tracks - Cloud computing, Continuous Monitoring and Enterprise Mobile Security training http://www.sans.org/ncic-2011/ - --SANS Chicago 2011, Chicago, IL, October 23-28, 2011 6 courses. Bonus evening presentations include Computer Forensics in the Virtual Realm and Electrical Grid Security http://www.sans.org/chicago-2011/ - --SANS Seattle 2011, Seattle, WA, November 2-7, 2011 5 courses. Bonus evening presentations include Future Trends in Network Security; and Ninja Developers: Penetration Testing and Your SDLC http://www.sans.org/seattle-2011/ - --Looking for training in your own community? http:sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Melbourne, Delhi, London, Baltimore and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php

****************************************************************************

Table Of Contents
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
Windows
Other Microsoft Products
Third Party Windows Apps
Linux
Unix
Cross Platform
Web Application - Cross Site Scripting
Web Application - SQL Injection
Web Application
Hardware

**************************** Sponsored Links: ******************************

1) Do not miss SANS Ask the Expert: Leveraging SSL to Battle Emerging Security Threats. Sign up at: http://www.sans.org/info/84679

2) Be entered in a drawing to WIN a $100 American Express gift card. Please take five minutes to help us improve the type and quality of Vendor Programs at SANS Conferences. http://www.sans.org/info/84684 ****************************************************************************

PART I Critical Vulnerabilities

PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

*************************************************************

Widely Deployed Software
  • (2) MEDIUM: Check Point SSL VPN On-Demand Applications Design Flaw
  • Affected:
    • Check Point SSL Network Extender (SNX)
    • Check Point SecureWorkSpace
    • Check Point Endpoint Security On-Demand
  • Description: Check Point has released a patch for vulnerabilities affecting its SSL VPN on-demand applications. These SSL VPN applications, which include SSL Network Extender, SecureWorkSpace, and Endpoint Security On-Demand, are driven on the client side by an ActiveX control or Java applet. Both of these contain public methods that can be used to trivially write arbitrary files to the disk. Another public method executes a file in a particular location. Together, these methods can be used to trivially execute arbitrary code on the client's machine. An attacker must entice a target to view a malicious site in order to exploit this vulnerability.

  • Status: vendor confirmed, updates available

  • References:
  • (4) MEDIUM: MPlayer Buffer Overflow Vulnerability
  • Affected:
    • MPlayer SVN Versions before 33471
    • SMPlayer 0.6.9 and older
  • Description: MPlayerhq has released a patch for MPlayer to address a buffer overflow vulnerability in its sub_read_line_sami() function. The function is used for handling SAMI (Synchronized Accessible Media Interchange) files, which contain captions for video and sound files. By enticing a target to view open a malicious SAMI file with MPlayer or SMPlayer, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.

  • Status: vendor confirmed, updates available

  • References:
Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
Week 30, 2011

Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 12068 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________


  • 11.34.1 - CVE: Not Available
  • Platform: Windows
  • Title: Microsoft Windows DHCPv6 Packets Remote Denial of Service
  • Description: Microsoft Windows is exposed to a remote denial of service issue. The issue has been found to occur on reception of DHCPv6 Reply (message type 7) packets, containing the option "Domain Search List" (option type 24) with an empty domain. Attacker can exploit this issue by specially crafted DHCPv6 packets. Microsoft Windows 7 is affected.
  • Ref: http://www.securityfocus.com/archive/1/519297


  • 11.34.3 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: BisonFTP Server Remote Buffer Overflow
  • Description: BisonFTP Server is an FTP server application. The application is exposed to a remote buffer overflow issue because it fails to perform adequate boundary checks on user-supplied data. Specifically, the issue occurs when an overly large string is sent to the application. BisonFTP Server versions 3.5 and prior are affected.
  • Ref: http://www.securityfocus.com/bid/49109/references

  • 11.34.4 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: TeeChart Professional ActiveX Remote Integer Overflow
  • Description: TeeChart Professional is an ActiveX control for charting and graphing data. TeeChart Professional is exposed to an integer overflow issue because it fails to perform adequate boundary checks on user-supplied data. Specifically, the issue occurs in the "AddSeries()" method of the "TeeChart2010.ocx" ActiveX control. All versions of TeeChart are affected.
  • Ref: http://www.securityfocus.com/bid/49125/references

  • 11.34.5 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: MPlayer SAMI Subtitle File Buffer Overflow
  • Description: MPlayer is a multimedia player available for Microsoft Windows. The application is exposed to a buffer overflow issue because it fails to perform adequate boundary checks on user supplied data. This issue occurs in the "sub_read_line_sami()" function of the "subreader.c" source file when handling a specially crafted SAMI subtitle file. Versions prior to MPlayer 33471 are affected.
  • Ref: http://www.securityfocus.com/bid/49149/references

  • 11.34.6 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: F-Secure BlackList Local Privilege Escalation
  • Description: F-Secure BlackList is a security product used to detect hidden files, folders and processes in Microsoft Windows. The application is exposed to a local privilege escalation issue. Specifically, the issue occurs due to the improper permissions for the "fsbl.exe" file, with the "C" flag set for "Everyone" group. F-Secure BlackLight 2.2.1092 is vulnerable and other versions may also be affected.
  • Ref: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5038.php

  • 11.34.7 - CVE: CVE-2011-2907
  • Platform: Linux
  • Title: Torque Server Security Bypass
  • Description: Torque is an open source resource manager. The application is exposed to a security bypass issue. Specifically, the issue exists because the Torque server relies on data provided by the "qsub" client during authorization. Torque 3.0.1 is affected.
  • Ref: http://www.clusterresources.com/pipermail/torqueusers/2011-August/013194.html

  • 11.34.8 - CVE: Not Available
  • Platform: Linux
  • Title: ktsuss Local Security Bypass and Arbitrary Code Execution Vulnerabilities
  • Description: ktsuss is a graphical version of "su" written in C language. The application is exposed to multiple issues. A local security bypass issue occurs because ktsuss fails to change the effective UID back to the real UID when the target UID is same as the real UID. An arbitrary code execution issue occurs because the GTK interface, executed by the setuid ktsuss binary, runs with root privileges and allows arbitrary code execution via "GTK_MODULES" environmental variable. ktsuss 1.3 and 1.4 are vulnerable and other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/49151/info

  • 11.34.9 - CVE: CVE-2011-2729
  • Platform: Unix
  • Title: Apache Commons Daemon "jsvc" Information Disclosure
  • Description: Apache Commons Daemon provides Java based daemons or services. "Jsvc" is a part of the Commons Daemon that contains a set of libraries and applications for making Java applications run on UNIX. Apache Commons Daemon is exposed to a remote information disclosure issue. This issue occurs because the "jsvc" library fails to drop privileges, which allows applications using the affected library to gain access to files and directories owned by the superuser. Versions prior to Commons Daemon 1.0.7 are vulnerable. Tomcat 7.0.0 through 7.0.19, Tomcat 6.0.30 through 6.0.32 and Tomcat 5.5.32 through 5.5.33 are affected.
  • Ref: http://www.securityfocus.com/bid/49143/references


  • 11.34.11 - CVE: CVE-2011-0551
  • Platform: Cross Platform
  • Title: Symantec Endpoint Protection Cross-Site Request Forgery Vulnerabilities
  • Description: Symantec Endpoint Protection is a security application. The application is exposed to an unspecified cross-site request forgery issue and an unspecified cross-site scripting issue because it does not properly validate user-supplied requests. Specifically, these issues affect the Web Console. Symantec Endpoint Protection 11.0 RU6(11.0.600x), Symantec Endpoint Protection 11.0 RU6-MP1(11.0.6100), Symantec Endpoint Protection 11.0 RU6-MP2(11.0.6200) and Symantec Endpoint Protection 11.0 RU6-MP3(11.0.6300) are affected.
  • Ref: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fi
    d=security_advisory&pvid=security_advisory&year=2011&suid=20110810_0
    0

  • 11.34.12 - CVE: CVE-2011-2749,CVE-2011-2748
  • Platform: Cross Platform
  • Title: ISC DHCP Multiple Denial of Service Vulnerabilities
  • Description: ISC DHCP is a reference implementation of the DHCP protocol and includes a DHCP server, client and relay agent. The application is exposed to multiple denial of service issues. Specifically, the application crashes when processing certain types of packets. Versions prior to 4.2.2, versions prior to 4.1-ESV-R3 and versions prior to 3.1-ESV-R3 are affected.
  • Ref: http://www.securityfocus.com/bid/49120/references

  • 11.34.13 - CVE: CVE-2011-0527
  • Platform: Cross Platform
  • Title: VMware vFabric tc Server JMX Authentication Security Bypass
  • Description: The VMware vFabric tc Server is a Java-based Web server. The application is exposed to a security bypass issue because of an error in the JMX authentication implementation. Exploitation of the issue allows attackers to authenticate using a password either in plain text form or obfuscated form, which bypasses the benefit of obfuscation. VMware vFabric tc Server versions 2.0.0 through 2.0.5, SR01 and 2.1.0.through 2.1.1.SR01 are affected.
  • Ref: http://www.springsource.com/security/cve-2011-0527

  • 11.34.14 - CVE: CVE-2011-3009
  • Platform: Cross Platform
  • Title: Ruby Random Number Values Security Weakness
  • Description: Ruby is an object oriented scripting language. Ruby is exposed to a security weakness because it fails to reset the random seed upon forking. Versions prior to Ruby 1.8.6-p114 are vulnerable.
  • Ref: http://redmine.ruby-lang.org/issues/show/4338

  • 11.34.15 - CVE: CVE-2011-0257
  • Platform: Cross Platform
  • Title: Apple QuickTime PICT File Stack Buffer Overflow
  • Description: Apple QuickTime is a media player that supports multiple file formats. The application is exposed to a stack-based buffer overflow issue because of a failure to properly bounds check user supplied data. The problem occurs because of a signedness error when handling the PICT files. Versions prior to QuickTime 7.7 are affected.
  • Ref: http://support.apple.com/kb/HT4826

  • 11.34.16 - CVE: CVE-2011-3131
  • Platform: Cross Platform
  • Title: Xen DMA Requests IOMMU Denial of Service
  • Description: Xen is an application used for monitoring hypervisors and virtual machines. Xen is exposed to a denial of service issue. This issue occurs when Xen processes bogus DMA requests to PCI/PCIE devices under direct control of the virtual machine. Xen 3.x and 4.x are affected.
  • Ref: http://www.securityfocus.com/bid/49146/references

  • 11.34.17 - CVE: CVE-2011-2481
  • Platform: Cross Platform
  • Title: Apache Tomcat Information Disclosure Vulnerability
  • Description: Apache Tomcat is a Java-based web server application for multiple operating systems. The application is exposed to a remote information disclosure issue. This issue is due to a design error that allows malicious web application to disclose the content contained in the "web.xml" file and the "context.xml" file. Tomcat 7.0.0 through 7.0.16 are affected.
  • Ref: http://tomcat.apache.org/security-7.html

  • 11.34.18 - CVE: CVE-2011-2896
  • Platform: Cross Platform
  • Title: GIMP GIF Image Parsing "LZWReadByte()" Buffer Overflow
  • Description: GIMP is a program for manipulating images. GIMP is exposed to a buffer overflow issue when parsing a GIF file. This issue occurs because the application fails to perform adequate boundary checks when passing data to the "LZWReadByte()" function of the "plug-ins/common/file-gif-load.c" file. GIMP versions up to 2.6.11 are affected.
  • Ref: http://www.securityfocus.com/bid/49148/references


  • 11.34.20 - CVE:CVE-2011-2955,CVE-2011-2954,CVE-2011-2953,CVE-2011-2952,CVE-2011-2951CVE-2011-2950,CVE-2011-2949,CVE-2011-2948,CVE-2011-2947,CVE-2011-2946CVE-2011-2945
  • Platform: Cross Platform
  • Title: Real Networks RealPlayer Multiple Remote Vulnerabilities
  • Description: Real Networks RealPlayer is an application that allows users to play various media formats. The application is exposed to multiple security issues. See reference for further details. RealPlayer for Windows SP 1.1.5 and pervious versions, RealPlayer Enterprise 2.1.5 and previous versions, RealPlayer for Mac 12.0.0.1569 are affected.
  • Ref: http://service.real.com/realplayer/security/08162011_player/en/

  • 11.34.21 - CVE: CVE-2011-1340
  • Platform: Web Application - Cross Site Scripting
  • Title: Plone "type_name" Parameter Cross-Site Scripting
  • Description: Plone is a web-based content manager implemented in Python. Plone CMS is exposed to a cross-site scripting issue because it fails to properly sanitize user supplied input submitted to the "type_name" parameter of the "skins/plone_templates/default_error_message.pt" script. Versions prior to Plone 2.5.3 are affected.
  • Ref: http://www.securityfocus.com/bid/49123/references

  • 11.34.22 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Mambo CMS "zorder" Parameter SQL Injection
  • Description: Mambo CMS is a PHP-based content management system. The application is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data submitted to the "zorder" parameter of the "administrator/index2.php" script before using it in an SQL query. Mambo CMS 4.6.5 is vulnerable; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/49130/references

  • 11.34.23 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Contrexx Shopsystem Module "productId" Parameter SQL Injection
  • Description: Contrexx is a PHP-based content management system. Shopsystem is a module for Contrexx CMS. The application is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data submitted to the "productId" parameter of the "index.php" script before using it in an SQL query. Contrexx 2.2 SP3 is vulnerable; other versions may also be affected.
  • Ref: http://www.securityfocus.com/bid/49155/discuss

  • 11.34.24 - CVE: Not Available
  • Platform: Web Application - SQL Injection
  • Title: Curverider Elgg "index.php" Multiple SQL Injection Vulnerabilities
  • Description: Curverider Elgg is a PHP-based social media application. The application is exposed to multiple SQL injection issues because it fails to sufficiently sanitize user-supplied data to the "container_guid" and "owner_guid" parameters of the "mod/search/pages/search/index.php" script. Curverider Elgg 1.8 beta2 and versions prior to 1.7.11 are affected.
  • Ref: http://www.securityfocus.com/archive/1/519294

  • 11.34.25 - CVE: CVE-2011-1342
  • Platform: Web Application
  • Title: Aimluck Products Aipo and Aipo ASP Unspecified SQL Injection
  • Description: Aimluck products are web-based groupware applications. The applications are exposed to an unspecified SQL injection issue because they fail to sufficiently sanitize user-supplied data before using it in an SQL query. Versions prior to Aipo 5.1.1 and Aipo ASP 5.1.1 are affected.
  • Ref: http://www.securityfocus.com/bid/49158/references

  • 11.34.26 - CVE: Not Available
  • Platform: Hardware
  • Title: Multiple Sagem F@st Routers Authentication Bypass
  • Description: SAGEM F@st routers are network routers that ship with a web-based administration interface. Multiple SAGEM F@st routers are are exposed to a remote authentication bypass issue. An attacker can exploit this issue by specially crafted network packets. Sagem F@st 3304, Sagem F@st 3464 and Sagem F@st 3504 are affected.
  • Ref: http://www.securityfocus.com/bid/49167/references

(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account