Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: X, Issue: 6
February 4, 2011

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Windows
    • 1
    • Third Party Windows Apps
    • 1
    • Linux
    • 2
    • Novell
    • 1
    • Cross Platform
    • 20 (#1,#2,#3)
    • Web Application - Cross Site Scripting
    • 2
    • Web Application
    • 1
    • Network Device
    • 1

*************************************************************************

TRAINING UPDATE -- North American SCADA Security 2011, Lake Buena Vista, FL, February 23-March 2 With special DHS/INL and NERC workshops plus hands-on immersion training. http://www.sans.org/north-american-scada-2011/ -- SANS Phoenix 2011, Phoenix, AZ, February 25-March 2, 2011 6 courses. Bonus evening presentations and special events include Indicators of Compromise: ABCs of IOCs and Network Vulnerability Exploitation, Step By Step From Discovery through to Metasploit Module http://www.sans.org/phoenix-2011/ -- SANS AppSec 2011: Summit & Training, San Francisco, CA, March 7-14, 2011 7 courses. Bonus evening presentations and special events includes The Road to Sustainable Security http://www.sans.org/appsec-2011/ -- SANS 2011, Orlando, FL, March 27-April 4, 2011 39 courses. Bonus evening presentations and special events include Hiding in Plain Sight: Forensic Techniques to Counter the Advanced Persistent Threat; and Law and the Public's Perception of Data Security http://www.sans.org/sans-2011/ -- "Combating Malware in the Enterprise" course at SANS (SEC569). How do you fight off malware when you have thousands of hosts? Learn the answers in Orlando in March: http://www.sans.org/security-training/combating-malware-enterprise-1482-mid -- 2011 Asia Pacific SCADA and Process Control Summit, Sydney, Australia, March 31-April 7, 2011 http://www.sans.org/sydney-scada-2011/ -- Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Bangalore, Singapore, Wellington and Barcelona all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php ****************************************************************************

Table Of Contents
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
Windows
Third Party Windows Apps
Linux
Novell
Cross Platform
Web Application - Cross Site Scripting
Web Application
Network Device

************************** Sponsored Links: ********************************

1) Warm desert, cool instructors, and hot courses. Only 29 Days until SANS Phoenix 2011 begins! http://www.sans.org/info/69694

2) Register early for the Early Bird discount of $400! SANS Northern Virginia 2011. http://www.sans.org/info/69698 ****************************************************************************

PART I Critical Vulnerabilities

PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

Widely Deployed Software
  • (1) HIGH: RealPlayer AVI Parsing Buffer Overflow
  • Affected:
    • RealPlayer 11.0 to 11.1, SP 1.0 to 1.1.5, and 14.0.0 to 14.0.1.
  • Description: RealNetworks has recently released a patch for RealPlayer, its cross-platform media player, addressing a buffer overflow vulnerability. The vidplin.dll library, which RealPlayer uses when parsing AVI files, uses a user-controlled length to allocate a buffer before copying user-provided data into the buffer. By enticing a target to view a malicious file, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.

  • Status: vendor confirmed, updates available

  • References:
  • (2) HIGH: Apple QuickTime Sprite Transformation Buffer Overflow Vulnerability
  • Affected:
    • Apple Mac OS X 10.6 to 10.6.4 and Mac OS X Server 10.6 to 10.6.4.
  • Description: Apple has released a patch for a vulnerability affecting its cross-platform QuickTime media player. QuickTime can render sprites, which are fixed pieces of pictures or videos that can then be animated calls to a QuickTime API. A particular transformation in this API causes QuickTime to scale the sprite and write to memory outside of a buffer. By enticing a target to view a malicious file, an attacker can exploit the resulting buffer overflow condition in order to execute arbitrary code.

  • Status: vendor confirmed, updates available

  • References:
  • (3) HIGH: HP OpenView Performance Insight Server Backdoor
  • Affected:
    • HP OpenView Performance Insight Server v5.2, v5.3, v5.31, v5.4, v5.41
    • running on HP-UX, Linux, Solaris, and Windows
  • Description: HP has released a patch addressing a vulnerability in OpenView Performance Insight, a tool for measuring the performance of computer networks. The vulnerability is due to a hidden, statically-defined account present in the com.trinagy.security.XMLUserManager class. By sending a malicious request, an unauthenticated attacker can exploit this vulnerability in order to execute arbitrary code with SYSTEM-level permissions. No user interaction is required on the part of the target for successful exploitation.

  • Status: vendor confirmed, updates available

  • References:
Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
Week 6, 2011

Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 10893 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________



  • 11.6.2 - CVE: Not Available
  • Platform: Third Party Windows Apps
  • Title: EMC NetWorker "librpc.dll" Spoofing
  • Description: EMC NetWorker is a centralized data protection system available for multiple operating systems. EMC NetWorker is exposed to an issue that allows attackers to spoof source addresses. The problem affects the "librpc.dll" RPC library.
  • Ref: http://www.securityfocus.com/archive/1/516000

  • 11.6.3 - CVE: CVE-2010-4707,CVE-2010-4706
  • Platform: Linux
  • Title: Linux-PAM "pam_xauth" Module Denial of Service and Security Bypass Vulnerabilities
  • Description: Pluggable authentication modules provide a standard interface to various authentication mechanisms. The "pamxauth" module is used to forward "xauth" cookies for a user that has assumed another user's privileges with the "su" command. Local attackers may exploit these issues to bypass certain security restrictions or to cause denial of service. Linux-PAM versions 1.1.2 and earlier are affected.
  • Ref: http://openwall.com/lists/oss-security/2010/10/03/1

  • 11.6.4 - CVE: CVE-2010-4656
  • Platform: Linux
  • Title: Linux Kernel I/O-Warrior USB Device Heap Buffer Overflow
  • Description: The Linux kernel is exposed to a heap-based buffer overflow issue because it fails to perform adequate boundary checks on user-supplied data. This issue occurs in the "drivers/usb/misc/iowarrier.c" source file.
  • Ref: https://bugzilla.redhat.com/show_bug.cgi?id=672420

  • 11.6.5 - CVE: CVE-2010-4325
  • Platform: Novell
  • Title: Novell GroupWise Internet Agent "TZID" Variable Parsing Remote Code Execution
  • Description: Novell GroupWise is collaboration software available for a number of platforms, including Linux and Microsoft Windows. GroupWise includes an Internet Agent process for mail transfer. Novell GroupWise Internet Agent is exposed to a remote code execution issue because it fails to parse the "TZID" variable of "VCALENDAR" data included in e-mail messages.
  • Ref: http://www.securityfocus.com/archive/1/516002

  • 11.6.6 - CVE: CVE-2011-0275
  • Platform: Cross Platform
  • Title: HP OpenView Storage Data Protector Unspecified Denial of Service
  • Description: HP OpenView Storage Data Protector is a commercial data management product for backup and recovery operations. The application is exposed to an unspecified remote denial of service issue. HP OpenView Storage Data Protector versions 6.0, 6.10 and 6.11 are affected.
  • Ref: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02699143

  • 11.6.7 - CVE: Not Available
  • Platform: Cross Platform
  • Title: RubyGems mail Remote Arbitrary Shell Command Injection
  • Description: RubyGems mail is a Ruby mail handler. The application is exposed to a remote command injection issue because it fails to adequately sanitize user-supplied input. Specifically, the issue occurs when processing an email message's "from" address in the "deliver()" method of the "lib/mail/network/delivery_methods/sendmail.rb" script. RubyGems mail versions prior to 2.2.15 are affected.
  • Ref: http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?p
    li=1

  • 11.6.8 - CVE: CVE-2011-0349, CVE-2011-0348, CVE-2011-0350
  • Platform: Cross Platform
  • Title: Cisco Content Services Gateway Malformed TCP Packet Denial of Service
  • Description: Cisco Content Services Gateway is a device used to monitor network usage. Cisco Content Services Gateway is prone to a denial of service issue when handling specially crafted TCP packets.
  • Ref: http://www.cisco.com/warp/public/707/cisco-sa-20110126-csg2.shtml

  • 11.6.9 - CVE: Not Available
  • Platform: Cross Platform
  • Title: MuPDF "closedctd()" PDF File Handling Remote Code Execution
  • Description: MuPDF is a PDF parser. The application is exposed to a remote code execution issue due to stack corruption when processing malformed PDF files containing specially crafted JPEG images. This issue affects the "closedctd()" function of the "fitz/filt_dctd.c" source file. MuPDF version 0.7 is affected.
  • Ref: http://code.google.com/p/sumatrapdf/issues/detail?id=1180


  • 11.6.11 - CVE: Not Available
  • Platform: Cross Platform
  • Title: PRTG Network Monitor "errormsg" Parameter Multiple Cross-Site Scripting Vulnerabilities
  • Description: PRTG Network Monitor is a network usage monitoring application. PRTG Network Monitor is exposed to multiple cross-site scripting issues because it fails to properly sanitize user-supplied input. These issues affect the "errormsg" parameter of the "login.htm" and "error.htm" scripts. PRTG Network Monitor version 8.1.2.1809 is affected.
  • Ref: http://www.securityfocus.com/bid/46029


  • 11.6.13 - CVE:CVE-2010-4643,CVE-2010-4253,CVE-2010-3689,CVE-2010-3454,CVE-2010-3453,CVE-2010-3452,CVE-2010-3451,CVE-2010-3450
  • Platform: Cross Platform
  • Title: OpenOffice Multiple Remote Code Execution Vulnerabilities
  • Description: OpenOffice is a suite of office applications for multiple operating platforms. The application is exposed to multiple remote code execution issues. Attackers can exploit these issues to execute arbitrary code in the context of the application.
  • Ref: http://seclists.org/fulldisclosure/2011/Jan/487

  • 11.6.14 - CVE: CVE-2011-0413
  • Platform: Cross Platform
  • Title: ISC DHCP Server DHCPv6 Decline Message Denial of Service
  • Description: The ISC DHCP Server is a reference implementation of the DHCP protocol and includes a DHCP server, client and relay agent. The application is exposed to a denial of service issue. Specifically, the application triggers an assert failure when processing DHCPv6 messages for an address that was previously declined. ISC DHCP Server versions 4.0 through 4.2.1 are affected.
  • Ref: http://www.kb.cert.org/vuls/id/686084

  • 11.6.15 - CVE: Not Available
  • Platform: Cross Platform
  • Title: Opera Web Browser Multiple Security Vulnerabilities
  • Description: The Opera Web Browser runs on multiple operating systems. The Opera Web Browser is exposed to multiple security issues. Exploiting these issues may allow a remote attacker to compromise the affected application, obtain sensitive information, bypass certain security restrictions, perform unauthorized actions, and execute arbitrary code within the context of the affected application. Opera Web Browser versions prior to 11.01 are affected.
  • Ref: http://www.opera.com/docs/changelogs/windows/1101/

  • 11.6.16 - CVE: Not Available
  • Platform: Cross Platform
  • Title: IBM DB2 Administration Server Unspecified Buffer Overflow
  • Description: IBM DB2 is a database manager. IBM DB2 is exposed to a buffer overflow issue because it fails to perform adequate checks on user-supplied input. This issue occurs due to an unspecified error in the DB2 administration server.
  • Ref: http://www.zerodayinitiative.com/advisories/ZDI-11-036/

  • 11.6.17 - CVE: Not Available
  • Platform: Cross Platform
  • Title: VLC Media Player MKV File Parsing Remote Code Execution
  • Description: VLC Media Player is an application that allows users to play back various media formats. VLC Media Player is exposed to a remote code execution issue that affects the "MKV_IS_ID" macro in the "modules/demux/mkv/mkv.hpp" file for the MKV demuxer when processing crafted MKV files. VLC Media Player versions 1.1.6.1 and earlier are affected.
  • Ref: http://www.videolan.org/security/sa1102.html

  • 11.6.18 - CVE: Not Available
  • Platform: Cross Platform
  • Title: IBM DB2 DBADM Privilege Revocation Security Bypass
  • Description: IBM DB2 is a database application available for multiple platforms. IBM DB2 is exposed to a security bypass issue that can allow an attacker to run "non-DDL" statements. The issue arises because the application fails to properly revoke "DBADM" privileges.
  • Ref: http://www-01.ibm.com/support/docview.wss?uid=swg21426108

  • 11.6.19 - CVE: Not Available
  • Platform: Cross Platform
  • Title: Hitachi JP1/NETM/DM Information Disclosure and Denial of Service Vulnerabilities
  • Description: Hitachi JP1/NETM/DM is exposed to multiple issues: A local information disclosure issue that occurs because certain file permissions are not properly set, which allows local users to access files that they are not intended to access, and an unspecified remote denial of service issue.
  • Ref: http://www.securityfocus.com/bid/46063


  • 11.6.21 - CVE: CVE-2010-3041, CVE-2010-3042, CVE-2010-3043,CVE-2010-3044, CVE-2010-3269
  • Platform: Cross Platform
  • Title: Cisco WebEx Remote Stack Buffer Overflow
  • Description: Cisco WebEx is a sharing and conferencing application for Microsoft Windows, Linux, and Mac OS X. Cisco WebEx is exposed to a remote stack buffer overflow issue due to a failure to properly bounds check user-supplied data. The problem occurs when handling specially crafted ATP files.
  • Ref: http://www.cisco.com/warp/public/707/cisco-sa-20110201-webex.shtml

  • 11.6.22 - CVE: Not Available
  • Platform: Cross Platform
  • Title: IBM DB2 Administration Server "validateUser()" Stack Buffer Overflow
  • Description: IBM DB2 is a database application available for multiple platforms. IBM DB2 is exposed to a stack-based buffer overflow issue because the application's administrative server fails to perform adequate boundary checks on user-supplied input. DB2 version 9.1 prior to Fix Pack 10; DB2 version 9.5 prior to Fix Pack 6 and DB2 version 9.7 prior to Fix Pack 3 are affected.
  • Ref: https://www-304.ibm.com/support/docview.wss?uid=swg1IC70538

  • 11.6.23 - CVE: CVE-2011-0276
  • Platform: Cross Platform
  • Title: HP OpenView Performance Insight Server "doPost()" Remote Arbitrary Code Execution
  • Description: HP OpenView Performance Insight Server is a component of the HP OpenView product family which consists of network and systems management products. HP OpenView Performance Insight Server is exposed to a remote code execution because a hidden account in the "com.trinagy.security.XMLUserManager" Java class allows attackers to access the "com.trinagy.servlet.HelpManagerServlet" Java class.
  • Ref: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02695453

  • 11.6.24 - CVE: CVE-2010-3270
  • Platform: Cross Platform
  • Title: Cisco WebEx ATP File Remote Stack Buffer Overflow
  • Description: Cisco WebEx is a sharing and conferencing application for Microsoft Windows, Linux, and Mac OS X. Cisco WebEx is exposed to a remote stack buffer overflow issue because it fails to properly bounds check user-supplied data. The problem occurs when handling specially crafted ATP files.
  • Ref: http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities

  • 11.6.25 - CVE: Not Available
  • Platform: Cross Platform
  • Title: Sun Java Floating-Point Value Denial of Service
  • Description: Sun Java is a web programming language. Java is exposed to a denial of service issue when processing certain double precision floating-point values. The problem occurs in applications that convert a user-supplied decimal input to a double-precision binary floating-point.
  • Ref: http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-30
    8/

  • 11.6.26 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: TYPO3 Media [DAM] Extension Unspecified Cross-Site Scripting
  • Description: Media [DAM] is an extension for the TYPO3 content manager. The extension is exposed to an unspecified cross-site scripting issue because it fails to properly sanitize user-supplied input from a file rename operation. Media [DAM] versions prior to 1.1.8 are affected.
  • Ref: http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-001/

  • 11.6.27 - CVE: Not Available
  • Platform: Web Application - Cross Site Scripting
  • Title: WordPress FCChat Widget Plugin "path" Parameter Cross-Site Scripting
  • Description: WordPress is a PHP-based content manager. The FCChat Widget plugin is exposed to a cross-site scripting issue because it fails to properly sanitize user-supplied input to the "path" parameter of the "wp-content/plugins/fcchat/js/import.config.php" script. FCChat Widget version 2.1.7 is affected.
  • Ref: http://www.securityfocus.com/bid/46009

  • 11.6.28 - CVE: Not Available
  • Platform: Web Application
  • Title: WordPress ImageManager Plugin "manager.php" Arbitrary File Upload
  • Description: WordPress is a PHP-based content manager. The application is exposed to an issue that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input before uploading files through the "wp-content/plugins/ImageManager/manager.php" script.
  • Ref: http://www.securityfocus.com/bid/46010

  • 11.6.29 - CVE: CVE-2011-0350
  • Platform: Network Device
  • Title: Cisco Content Services Gateway Malformed TCP Packet Denial of Service
  • Description: Cisco Content Services Gateway is a device used to monitor network usage. Cisco Content Services Gateway is exposed to a denial of service issue when handling specially crafted TCP packets.
  • Ref: http://www.cisco.com/warp/public/707/cisco-sa-20110126-csg2.shtml

(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. For a free subscription or to update a current subscription, visit http://portal.sans.org/