Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: X, Issue: 42
November 18, 2011

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Windows
    • 1
    • Third Party Windows Apps
    • 3
    • Linux
    • 2
    • Aix
    • 1
    • Cross Platform
    • 7 (#1,#2)
    • Web Application - Cross Site Scripting
    • 4
    • Web Application
    • 6
    • Hardware
    • 2

*********** Sponsored By ForeScout Technologies ***********

Sign up and view SANS Analyst Webcast-Your Pad or Mine? Enabling Personal and Mobile Device Use On the Network. How to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security. Go to http://www.sans.org/info/91386

************************************************************************** TRAINING UPDATE --EURO SCADA & Process Control System Security Summit, Rome, Dec 1-2, 2011 Pre-Summit Courses November 26-30, 2011 Post-Summit Courses December 3-4, 2011 Gain the most current information regarding SCADA and Control System threats and learn how to best prepare to defend against them. http://www.sans.org/eu-scada-2011/ --SANS San Antonio 2011, San Antonio, TX, November 28-December 5, 2011 7 courses. Bonus evening presentations include Effective Methods for Implementing the 20 Critical Security Controls; and Assessing Deception: Are They Lying to You? http://www.sans.org/san-antonio-2011/ --SANS London 2011, London, UK, December 3-12, 2011 18 courses. Bonus evening presentations include IPv6 Challenges for Intrusion Detection and Understanding How Attackers Bypass Network and Content Restrictions. http://www.sans.org/london-2011/ --Incident Detection & Log Management Summit, Washington DC, December 7-8, 2011 Learn the latest techniques to detect breaches and intrusions! http://www.sans.org/incident-detection-summit-2011/ --SANS CDI 2011, Washington, DC, December 9-16, 2011 27 courses. Bonus evening presentations include Emerging Trends in Data Law and Investigations, and Critical Infrastructure Control Systems Cybersecurity. http://www.sans.org/cyber-defense-initiative-2011/ --SANS Security East 2012, New Orleans, LA January 17-26, 2012 11 courses. Bonus evening presentations include Advanced VoIP Pen Testing: Current Threats and Methods; and Helping Small Businesses with Security. http://www.sans.org/security-east-2012/ --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Tokyo, Perth and Atlanta all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php **************************************************************************

Table Of Contents
Part I -- Critical Vulnerabilities from TippingPoint (www.tippingpoint.com)
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
    Windows
    Third Party Windows Apps
    Linux
    Aix
    Cross Platform
    Web Application - Cross Site Scripting
    Web Application
    Hardware
    PART I Critical Vulnerabilities

    PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

    *************************************************************

    Widely Deployed Software
    Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
    Week 42, 2011

    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 12689 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________


    • 11.47.1 - CVE: CVE-2011-4434
    • Platform: Windows
    • Title: Microsoft Windows AppLocker Rules Local Security Bypass
    • Description: Microsoft Windows is exposed to a local security bypass issue. This issue occurs because of a failure to properly enforce AppLocker rules. This may allow attackers to bypass security restrictions by using the macro or scripting features of Windows applications such as Microsoft Office. Attackers can execute applications present in the directories that are restricted by AppLocker rules by using the "SANDBOX_INERT" and "LOAD_IGNORE_CODE_AUTHZ_LEVEL" flags. Windows 7, Windows 7 Service Pack 1, Windows Server 2008 R2 and Windows Server 2008 R2 Service Pack 1 are vulnerable.
    • Ref: http://support.microsoft.com/kb/2532445

    • 11.47.2 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: CitectSCADA and Mitsubishi MX4 SCADA Batch Server Module Remote Buffer Overflow
    • Description: CitectSCADA is a human-machine interface product offered by Schneider Electric. MX4 SCADA is a product offered by Mitsubishi. These applications are exposed to a buffer overflow issue because they fail to properly bounds check user-supplied data before copying it into an insufficiently sized memory buffer. Specifically, this issue occurs in an unspecified third party component used by the Batch server module. CitectSCADA 7.10 and prior using the CitectSCADA Batch Server module and Mitsubishi MX4 SCADA 7.10 and prior using the MX4 SCADA Batch module are vulnerable.
    • Ref: http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-02.pdf

    • 11.47.3 - CVE: CVE-2011-4158
    • Platform: Third Party Windows Apps
    • Title: Directories Support for ProLiant Management Processors Unauthorized Access Security Bypass
    • Description: HP Directories Support for ProLiant Management Processors is software to support directories. The application is exposed to an unspecified security-bypass issue. HP Directories Support for ProLiant Management Processors 3.10 and 3.20 are affected.
    • Ref: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082006

    • 11.47.4 - CVE: CVE-2011-4051,CVE-2011-4052
    • Platform: Third Party Windows Apps
    • Title: InduSoft Web Studio "CEServer" Buffer Overflow Vulnerabilities
    • Description: InduSoft Web Studio is a set of automation tools used to develop human machine interfaces and supervisory control and data acquisition systems. The application is exposed to two remote code execution issues that affect the remote agent component ("CEServer.exe"), which is listening on TCP port 4322 by default. InduSoft Web Studio versions 6.1 and 7.0 are affected.
    • Ref: http://www.us-cert.gov/control_systems/pdf/ICSA-11-319-01.pdf


    • 11.47.6 - CVE: CVE-2011-4105,CVE-2011-3153
    • Platform: Linux
    • Title: LightDM Two Security vulnerabilities
    • Description: LightDM is a cross-desktop display manager. The application is exposed multiple security issues. An arbitrary file-access issue occurs because the application fails to properly handle links when modifying permissions of ".Xauthority" files. A local issue occurs because of incorrectly handled privileges when reading .dmrc files. LightDM versions 1.0.4 and 1.0.5 are affected.
    • Ref: http://www.ubuntu.com/usn/usn-1262-1/ http://www.securityfocus.com/bid/50685/references

    • 11.47.7 - CVE: CVE-2011-1375
    • Platform: Aix
    • Title: IBM AIX WPAR System Calls Local Denial Of Service
    • Description: AIX is a UNIX operating system from IBM. AIX is exposed to a denial of service issue caused by unspecified behavior of "wpar_limits_config" and "wpar_limits_modify" WPAR system calls. IBM AIX versions 6.1 and 7.1 are affected.
    • Ref: http://aix.software.ibm.com/aix/efixes/security/wpar_advisory.asc

    • 11.47.8 - CVE: CVE-2011-3376
    • Platform: Cross Platform
    • Title: Apache Tomcat Manager Application Security Bypass
    • Description: Apache Tomcat is an HTTP server application. The application is exposed to a security bypass issue. Specifically, the issue occurs because the application fails to properly check the privileges of a web application before allowing it to use the functionality of Manager application. Apache Tomcat 7.0 versions prior to 7.0.22 are affected.
    • Ref: http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.22


    • 11.47.10 - CVE: CVE-2011-4156,CVE-2011-4155
    • Platform: Cross Platform
    • Title: HP Network Node Manager i Multiple Cross-Site Scripting Vulnerabilities
    • Description: HP Network Node Manager i is a fault management application for IP networks. The application is exposed to multiple unspecified cross-site scripting issues because it fails to properly sanitize certain user-supplied input submitted to the application before displaying it to the user. HP Network Node Manager i 9.0x and 9.1x running on HP-UX, Linux, Solaris and Windows are affected.
    • Ref: http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c0
      3035744


    • 11.47.12 - CVE: CVE-2011-4415
    • Platform: Cross Platform
    • Title: Apache HTTP Server "ap_pregsub()" Function Local Denial of Service
    • Description: Apache HTTP Server is an HTTP webserver application. The application is exposed to a local denial of service issue due to a NULL pointer dereference error or a memory exhaustion. Specifically, this issue affects the "ap_pregsub()" function of the "server/utils.c" source file because it fails to restrict the size of values of environment variables. Attackers can exploit this issue by placing a malicious ".htaccess" file with a crafted "SetEnvIf" directive on the affected server. Note: To trigger this issue, "mod_setenvif" must be enabled and the attacker should be able to place a malicious ".htaccess" file on the affected webserver. Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21 are vulnerable. Other versions may also be affected.
    • Ref: http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/ http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4415

    • 11.47.13 - CVE: CVE-2011-2445, CVE-2011-2450, CVE-2011-2451,CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455,CVE-2011-2456, CVE-2011-2457, CVE-2011-2458, CVE-2011-2459,CVE-2011-2460
    • Platform: Cross Platform
    • Title: Adobe Flash Player Multiple Vulnerabilities
    • Description: Adobe Flash Player is a multimedia application for multiple platforms. The application is exposed to an unspecified remote buffer overflow issue because it fails to properly bounds check user-supplied input. See reference for detailed information. Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 11.0.1.153 and earlier versions for Android and Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android are affected.
    • Ref: http://www.adobe.com/support/security/bulletins/apsb11-28.html

    • 11.47.14 - CVE: CVE-2011-1373
    • Platform: Cross Platform
    • Title: IBM DB2 Remote Denial of Service
    • Description: IBM DB2 is a database application available for multiple platforms. The application is exposed to a remote denial of service issue due to an unspecified error when "Self Tuning Memory Manager" is enabled and "DATABASE_MEMORY" is set to "AUTOMATIC". IBM DB2 version 9.7 is affected.
    • Ref: http://www-01.ibm.com/support/docview.wss?uid=swg1IC70473 http://xforce.iss.net/xforce/xfdb/71043

    • 11.47.15 - CVE: Not Available
    • Platform: Web Application - Cross Site Scripting
    • Title: Tiki Wiki CMS Groupware "tiki-pagehistory.php" Cross-Site Scripting Vulnerabilities
    • Description: Tiki Wiki CMS Groupware is a PHP-based database management application. The application is exposed to multiple cross-site scripting issues because it fails to sufficiently sanitize user-supplied data to the "tiki-pagehistory.php" and "tiki-admin_system.php" scripts. Tiki Wiki CMS Groupware 6.4 and 7.2 are affected.
    • Ref: http://info.tiki.org/article182-Tiki-8-1-Now-Available-End-of-Life-for-Tiki-7-x

    • 11.47.16 - CVE: Not Available
    • Platform: Web Application - Cross Site Scripting
    • Title: Dolibarr Multiple Cross-Site Scripting Vulnerabilities
    • Description: Dolibarr is a company/foundation activity management application implemented in PHP. Dolibarr is exposed to multiple cross-site scripting issues because it fails to properly sanitize user-supplied input. The following scripts are affected: "company.php", "security_other.php", "events.php", "user.php". Dolibarr 3.1.0 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/archive/1/520442

    • 11.47.17 - CVE: CVE-2011-4312
    • Platform: Web Application - Cross Site Scripting
    • Title: ReviewBoard Commenting System Cross-Site Scripting
    • Description: ReviewBoard is a web-based code review application. The application is exposed to a cross-site scripting issue because it fails to sufficiently sanitize user-supplied input submitted to the commenting system of the application. Specifically, this issue affects the "diff viewer" and "screenshot pages" components. ReviewBoard 1.6 versions prior to 1.6.3 and ReviewBoard 1.5 versions prior to 1.5.7 are vulnerable.
    • Ref: http://www.reviewboard.org/news/

    • 11.47.18 - CVE: CVE-2011-3985
    • Platform: Web Application - Cross Site Scripting
    • Title: Plume Unspecified Cross-Site Scripting
    • Description: Plume CMS is a content manager for dynamic web content, blogs, and customer forums. The application is exposed to an unspecified cross-site scripting issue because it fails to sanitize user-supplied input. Plume versions prior to Plume 1.2.3 are affected.
    • Ref: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3985

    • 11.47.19 - CVE: Not Available
    • Platform: Web Application
    • Title: TYPO3 "eu_ldap" LDAP Injection
    • Description: TYPO3 is a web application programmed in PHP. "eu_ldap" is an extension for the TYPO3 content manager. The extension is exposed to an LDAP injection issue because it fails to sufficiently sanitize user-supplied data. Specifically, the username and password values sent by the login form are not sanitized before being used in LDAP queries. TYPO3 "eu_ldap" 2.8.10 and all prior versions are vulnerable.
    • Ref: http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa
      -2011-017/

    • 11.47.20 - CVE: Not Available
    • Platform: Web Application
    • Title: AShop Open-Redirection and Cross-Site Scripting Vulnerabilities
    • Description: AShop is a web-based shopping application implemented in PHP. The software is exposed to multiple input validation issues. Open-redirection issues affect the "redirect" parameter of the "language.php" and "currency.php" scripts. Cross-site scripting issues affect multiple scripts and parameters. Versions prior to AShop 5.1.4 are vulnerable.
    • Ref: http://www.securityfocus.com/archive/1/520446

    • 11.47.21 - CVE:CVE-2011-3833,CVE-2011-3832,CVE-2011-3831,CVE-2011-3830,CVE-2011-3829
    • Platform: Web Application
    • Title: Support Incident Tracker (SiT!) Multiple Input Validation Vulnerabilities
    • Description: Support Incident Tracker is an open-source web application for tracking technical support requests. It is implemented in PHP and MySQL. The application is exposed to multiple input-validation issues. A path disclosure issue affects the "ftp_upload_file.php" script. A cross-site scripting issue affects the "search_string" parameter to "search.php" script. An SQL injection issue affects the "incident_attachments.php" script. An issue that allows attackers inject arbitrary PHP code affects the "application_name" parameter of the "config.php" script when the "action" parameter is set to "save" in the "eval()" function. An issue that allows attackers upload arbitrary files occurs because the application fails to adequately sanitize file extensions before uploading files to the webserver through the "ftp_upload_file.php" script. Support Incident Tracker 3.65 is vulnerable and other versions may also be affected.
    • Ref: http://secunia.com/secunia_research/2011-78/ http://secunia.com/secunia_research/2011-77/ http://secunia.com/secunia_research/2011-76/ http://secunia.com/secunia_research/2011-75/ http://secunia.com/secunia_research/2011-79/

    • 11.47.22 - CVE: Not Available
    • Platform: Web Application
    • Title: CMS Made Simple Remote Database Corruption
    • Description: CMS Made Simple is a web-based content manager. It is implemented in PHP. The application is exposed to an issue that could result in the corruption of the database. An attacker can exploit this issue to corrupt the news articles. Versions prior to CMS Made Simple 1.9.4.3 are affected.
    • Ref: http://www.cmsmadesimple.org/2011/08/Announcing-CMSMS-1-9-4-3---Security-Release
      /

    • 11.47.23 - CVE: CVE-2011-4311
    • Platform: Web Application
    • Title: ResourceSpace Unauthorized Access
    • Description: ResourceSpace is a web-based digital asset management system, implemented in PHP. ResourceSpace is exposed to an unauthorized access issue due to an insufficient access check on access keys. ResourceSpace 4.2.2833 is vulnerable and other versions may also be affected.
    • Ref: http://www.resourcespace.org/download.php http://secunia.com/advisories/46753/

    • 11.47.24 - CVE: Not Available
    • Platform: Web Application
    • Title: Cacti Unspecified SQL Injection and Cross-Site Scripting Vulnerabilities
    • Description: Cacti is a web-based network graphing solution. The application is exposed to an SQL injection issue and a cross-site scripting issue because it fails to sufficiently sanitize user-supplied data to unspecified parameters. Cacti 0.8.7g is vulnerable and other versions may also be affected.
    • Ref: http://www.cacti.net/release_notes_0_8_7h.php

    • 11.47.25 - CVE: CVE-2011-4048,CVE-2011-4047,CVE-2011-4046
    • Platform: Hardware
    • Title: Dell Kace K2000 Multiple Remote Security Vulnerabilities
    • Description: Dell Kace K2000 is a system deployment appliance. The device is exposed to mulitple remote security issues. A backdoor issue occurs because of a hidden administrator account. An information disclosure issue occurs because the application fails to restrict access to username and password hashes. A remote command execution issue affects the appliance. Multiple cross-site scripting issues occur because the application fails to sanitize certain unspecified user-supplied input passed through the administrative web interface. Dell Kace K2000 is vulnerable.
    • Ref: http://www.kace.com/support/kb/index.php?action=artikel&id=1120&artlang=
      en

    • 11.47.26 - CVE: Not Available
    • Platform: Hardware
    • Title: Cisco TelePresence System Integrator C Series and EX Series Root Authentication Bypass
    • Description: Cisco TelePresence System Integrator C Series are devices designed for telepresence. Cisco TelePresence EX Series are face-to-face Cisco TelePresence meeting devices. The devices are exposed to a remote authentication bypass issue due to a manufacturing error. Specifically, this issue occurs because the root user account is enabled with a well known password by default. All Cisco TelePresence System Integrator C Series, Cisco TelePresence EX Series and Cisco TelePresence Quick Set products distributed between November 18, 2010 and September 19, 2011 with software release TC4.0, TC4.1 or TC4.2 are affected.
    • Ref: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20
      111109-telepresence-c-ex-series

    (c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

    Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account