Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: XI, Issue: 2
January 13, 2012

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Summary of Updates and Vulnerabilities in this Consensus
    • Platform Number of Updates and Vulnerabilities
    • - ------------------------ -------------------------------------
    • Windows
    • 4 (#1)
    • Other Microsoft Products
    • 2
    • Third Party Windows Apps
    • 2
    • Linux
    • 1
    • Cross Platform
    • 8 (#2,#3,#4)
    • Web Application - Cross Site Scripting
    • 1
    • Web Application
    • 7
    • Hardware
    • 1

*************************** Sponsored By SANS ***************************

SANS 8th Annual Log and Event Management Survey is Under Way

Take the SANS 8th Annual Log and Event Management Survey. Be a part of this industry leading survey cited in top technology publications and blogs! Also be entered to WIN a $250 American Express Card giveaway when survey results are released during SANS webcasts held in early May at www.sans.org/webcasts. Follow this link to the survey: http://www.sans.org/info/96596

************************************************************************** TRAINING UPDATE --SANS Security East 2012, New Orleans, LA January 17-26, 2012 11 courses. Bonus evening presentations include Advanced VoIP PenTesting: Current Threats and Methods; and Helping Small Businesses with Security. http://www.sans.org/security-east-2012/ --SANS North American SCADA 2012, Lake Buena Vista, FL January 21-29, 2012 Gain the most current information regarding SCADA and Control System threats and learn how to best prepare to defend against them. Hear what works and what doesn't from peer organizations. Network with top individuals in the field of SCADA security. Return from the summit with solutions that you can immediately put to use in your organization. Pre-Summit courses: January 21-25, 2012 Summit: January 26-27, 2012 Post-Summit Courses: January 28-29, 2012 http://www.sans.org/north-american-scada-2012/ --SANS Monterey 2012, Monterey, CA January 30-February 4, 2012 6 courses. Bonus evening presentations include Who Do You Trust? SSL and TLS Under Attack; and IOS Programming Demo. http://www.sans.org/monterey-2012/ --SANS Phoenix 2012, Phoenix, AZ February 13-18, 2012 7 courses. Bonus evening presentations include Desktop Betrayal: Exploiting Clients Through the Features They Demand; and Windows Exploratory Surgery with Process Hacker. http://www.sans.org/phoenix-2012/ --SANS Secure Singapore 2012, Singapore, Singapore March 5-17, 2012 5 courses. Bonus evening presentations include Introduction to Windows Memory Analysis; and Why Our Defenses are Failing Us: One Click is All It Takes ... http://www.sans.org/singapore-2012/ --SANS 2012, Orlando, FL March 23-39, 2012 42 courses. Bonus evening presentations include Exploiting Vulnerabilities: 60 Minutes from Discovery to Exploit; Evolving Threats; and Harbinger of Evil: The Forensic Art of Finding Malware. http://www.sans.org/sans-2012/ --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Atlanta, Bangalore, San Francisco, Stuttgart, and Nashville, all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php

************************************************************************

Table Of Contents
Part I -- Critical Vulnerabilities from TippingPoint (www.tippingpoint.com)
    Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)
    Windows
    Other Microsoft Products
    Third Party Windows Apps
    Linux
    Cross Platform
    Web Application - Cross Site Scripting
    Web Application
    Hardware

    *************************** Sponsored Link: ****************************

    1) Take this groundbreaking survey to help determine policy, controls and standards needed to enable users to use their own small mobile devices for work-related functions. Follow this link to the survey: http://www.sans.org/info/96601 ************************************************************************

    PART I Critical Vulnerabilities

    PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

    *************************************************************

    Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
    Week 2, 2012

    (1) HIGH: Microsoft Products Multiple Security Vulnerabilities Affected: Microsoft Office Microsoft Windows Media Player Description: As part of its patch Tuesday program, Microsoft has released patches addressing multiple security vulnerabilities in its products. Patches for Microsoft Office address two problems with the Windows Object Packager, which is responsible for checking for unsafe objects embedded in Office files. The problem involves ClickOnce files, which are self-updating executables that are designed to be installed and run with minimal user interaction. Because these files are not considered unsafe by Windows Object Packager, they can be embedded into Office files. Another patch addresses an improper registry key used by Windows Object Package manager. By enticing a target to open a malicious file, an attacker can use either of these vulnerabilities to execute arbitrary code on a target's machine without any other interaction on the part of the target. Two vulnerabilities affecting Windows Media Player have also been addressed. By enticing a target to view a malicious MIDI or DirectShow file, an attacker can exploit these vulnerabilities in order to execute arbitrary code on the target's machine. Status: vendor confirmed, updates available References: Vendor Site http://www.microsoft.com Microsoft Security Bulletins http://technet.microsoft.com/en-us/security/bulletin/ms12-002 http://technet.microsoft.com/en-us/security/bulletin/ms12-005 SecurityFocus BugTraq IDs http://www.securityfocus.com/bid/51284 http://www.securityfocus.com/bid/51292 http://www.securityfocus.com/bid/51295 http://www.securityfocus.com/bid/51297

    *************************************************************

    (2) HIGH: Adobe Multiple Security Vulnerabilities Affected: Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh Description: Adobe has released patches for multiple unspecified security vulnerabilities and a signedness error in a component of Adobe Reader responsible for parsing BMP images. By enticing a target to view a malicious file, an attacker can exploit these vulnerabilities in order to corrupt memory and possibly execute arbitrary code on a target's machine. Status: vendor confirmed, updates available References: Vendor Site http://www.adobe.com Adobe Security Bulletin http://www.adobe.com/support/security/bulletins/apsb12-01.html SecurityFocus BugTraq IDs http://www.securityfocus.com/bid/51348 http://www.securityfocus.com/bid/51349 http://www.securityfocus.com/bid/51350 http://www.securityfocus.com/bid/51351

    *************************************************************

    (3) HIGH: Apache Struts Multiple Security Vulnerabilities Affected: Description: Apache has released a patch addressing multiple security vulnerabilities in its Struts web application server. Struts is used to serve Java servlets, which are web applications written in Java. One vulnerability involves a problem in Strut's reporting during exception handling, when user-supplied parameter values are evaluated as OGNL expressions. OGNL, an expression language for Java, allows for only a subset of Java to be used, but this is still enough for arbitrary code execution. Another vulnerability involves unsafe evaluation of cookie names, which can be used by an attacker to access static methods. By sending a malicious request, an attacker can exploit these vulnerabilities in order to execute arbitrary code on a target's machine. Status: vendor confirmed, updates available References: Vendor Site http://www.apache.org Apache Security Bulletin http://struts.apache.org/2.x/docs/s2-008.html

    *************************************************************

    (4) MEDIUM: Google Chrome Multiple Security Vulnerabilities Affected: Google Chrome prior to 16.0.912.75 Description: Google has released a patch addressing multiple security vulnerabilities affecting its Chrome web browser. The vulnerabilities include a use-after-free issue in animation frames, a heap buffer overflow in libxml, and a stack-buffer overflow in glyph handling. Google has not provided technical information for these vulnerabilities, but because they are related HIGH, it is likely that some of them can be exploited to execute arbitrary code on a target's machine. To do so, an attacker would have to entice the target to view a malicious site. Status: vendor confirmed, updates available References: Vendor Site http://www.google.com Google Stable Channel Updates http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html SecurityFocus BugTraq IDs http://www.securityfocus.com/bid/51300

    *************************************************************


    • 12.2.1 - CVE: CVE-2012-0001
    • Platform: Windows
    • Title: Microsoft Windows Kernel SafeSEH Security Bypass
    • Description: Microsoft Windows is exposed to a security bypass issue that affects the "Ntdll.dll" component. Specifically, this issue occurs due to the way the Windows kernel loads a structured exception handling table into the "Load Configuration" PE header during binary execution. x64-based editions of Windows XP and all supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 are affected.
    • Ref: http://technet.microsoft.com/en-us/security/bulletin/MS12-001

    • 12.2.2 - CVE: CVE-2012-0005
    • Platform: Windows
    • Title: Microsoft Windows CSRSS Local Privilege Escalation
    • Description: Microsoft Windows is exposed to a local privilege escalation issue that exists in the Client/Server Run time Subsystem. Specifically, this issue occurs when processing a sequence of specially crafted Unicode characters. All supported editions of Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008 are affected.
    • Ref: http://technet.microsoft.com/en-us/security/bulletin/MS12-003

    • 12.2.3 - CVE: CVE-2012-0013
    • Platform: Windows
    • Title: Microsoft Windows ClickOnce Application Installer Remote Code Execution
    • Description: Microsoft Windows is exposed to a remote code execution issue. This issue occurs because the ClickOnce application file type is not included in the Windows Packager unsafe file type list. This will allow attackers to embed ClickOnce applications into Microsoft Office documents. All supported releases of Microsoft Windows are affected.
    • Ref: http://technet.microsoft.com/en-us/security/bulletin/MS12-005

    • 12.2.4 - CVE: CVE-2012-0009
    • Platform: Windows
    • Title: Microsoft Windows Object Packager Remote Code Execution
    • Description: Microsoft Windows is exposed to a remote code execution issue. This issue occurs because the application fails to properly register and implement the Windows Object Packager. All supported editions of Windows XP and Windows Server 2003 are affected.
    • Ref: http://technet.microsoft.com/en-us/security/bulletin/MS12-002

    • 12.2.5 - CVE: CVE-2012-0007
    • Platform: Other Microsoft Products
    • Title: Microsoft AntiXSS Library Sanitization Module Security Bypass
    • Description: Microsoft Anti-Cross Site Scripting Library (AntiXSS) is an encoding library designed to protect ASP.NET web-based applications from XSS attacks. The library is exposed to a security bypass issue that affects the sanitization module. This occurs because the library fails to properly sanitize specially crafted HTML. Microsoft Anti-Cross Site Scripting Library version 3.x and 4.0 are vulnerable.
    • Ref: http://technet.microsoft.com/en-us/security/bulletin/MS12-007

    • 12.2.6 - CVE: CVE-2012-0003,CVE-2012-0004
    • Platform: Other Microsoft Products
    • Title: Microsoft Windows Media Player Remote Code Execution
    • Description: Microsoft Windows Media Player is a multimedia application available for the Windows operating system. The application is exposed to a remote code execution issue when handling specially crafted media content. Specifically, the issue affects the windows multimedia library ("winmm.dll") when parsing a specially crafted MIDI file. All supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows XP Media Center Edition 2005 Service Pack 3 and Windows Media Center TV Pack for Windows Vista are affected.
    • Ref: http://technet.microsoft.com/en-us/security/bulletin/MS12-004

    • 12.2.7 - CVE: CVE-2011-4056
    • Platform: Third Party Windows Apps
    • Title: Siemens Tecnomatix FactoryLink ActiveX Arbitrary File Overwrite
    • Description: Siemens Tecnomatix FactoryLink is Supervisory Control and Data Acquisition software. The application is exposed to an arbitrary file overwrite issue because it fails to properly sanitize user-supplied input before saving files. Specifically, attackers can save data to an arbitrary file, overwriting the current content. Siemens Tecnomatix FactoryLink V8.0.2.54, V7.5.217 (V7.5 SP2) and V6.6.1 (V6.6 SP1) are affected.
    • Ref: http://www.us-cert.gov/control_systems/pdf/ICSA-11-343-01.pdf http://www.securityfocus.com/bid/51267/references

    • 12.2.8 - CVE: Not Available
    • Platform: Third Party Windows Apps
    • Title: Hitachi Multiple IT Operations Products Unspecified Cross-Site Scripting
    • Description: Hitachi IT Operations Director offers an all-in-one solution focused on key IT lifecycle management functions. Hitachi IT Operations Analyzer is software that monitors IT Infrastructure availability and performance. The two Products are exposed to an unspecified cross-site scripting issue because they fail to properly sanitize user-supplied input. Hitachi IT Operations Director 02-50-01 to 02-50-07, 03-00 to 03-00-04, Hitachi IT Operations Analyzer 02-01, 02-51 to 02-51-01 and 02-53 to 02-53-02 are affected.
    • Ref: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-001/inde
      x.html

    • 12.2.9 - CVE: CVE-2011-2776
    • Platform: Linux
    • Title: Super Remote Buffer Overflow
    • Description: Super is a Linux package used to allow users to execute scripts and commands as if they were root. The application is exposed to a remote buffer overflow issue because it fails to perform adequate boundary checks on user-supplied data before copying it to an insufficiently sized buffer. Specifically, the issue affects the syslog logging code. Super 3.30.0-2 is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/bid/51319/references http://packages.debian.org/source/lenny/super

    • 12.2.10 - CVE: Not Available
    • Platform: Cross Platform
    • Title: Apache Struts Remote Command Execution and Arbitrary File Overwrite Vulnerabilities
    • Description: Apache Struts is a framework for building Web applications. The framework is exposed to multiple issues. A remote command execution issue affects the "CookieInterceptor" class because the application fails to restrict access to certain static methods when handling cookie names. An arbitrary file overwrite issue exists because the "ParameterInterceptor" fails to properly sanitize user-supplied input before creating files. Versions prior to Apache Struts 2.3.1.1 are vulnerable and other versions may also be affected.
    • Ref: http://struts.apache.org/2.x/docs/s2-008.html

    • 12.2.11 - CVE:CVE-2012-0027,CVE-2011-4619,CVE-2011-4577,CVE-2011-4576,CVE-2011-4109,CVE-2011-4108
    • Platform: Cross Platform
    • Title: OpenSSL Multiple Vulnerabilities
    • Description: OpenSSL is an open-source implementation of the SSL protocol, which is used by a number of other projects. OpenSSL is exposed to multiple issues. An information disclosure issue affects the CBC mode encryption of Datagram Transport Layer Security (DTLS). A memory corruption issue occurs due to a double-free condition in policy checks while using X509_V_FLAG_POLICY_CHECK. An information disclosure issue exists. Specifically, in each record, up to 15 bytes of uninitialized memory is encrypted and sent to the SSL peer. The issue exists because the library does not properly clear the bytes used as block cipher padding in SSL 3.0 records. A denial of service issue occurs due to an assertion failure when handling specially crafted RFC 3779 data in certificates. 5) A denial of service issue affects the support for handshake restarts for server gated cryptography (SGC). A denial of service issue affects the GOST ENGINE when processing specially crafted GOST parameters. Successful exploitation of these issues will cause the server to crash due to lack of error checking. OpenSSL versions 1.0.0x before 1.0.0f or 0.9.8x before 0.9.8s are affected.
    • Ref: http://www.openssl.org/news/secadv_20120104.txt http://www.securityfocus.com/bid/51281/references



    • 12.2.14 - CVE: CVE-2012-0390
    • Platform: Cross Platform
    • Title: GnuTLS DTLS Information Disclosure
    • Description: GNU Transport Layer Security Library is a library that implements the TLS 1.0 and SSL 3.0 protocols. The library is exposed to an information disclosure issue that affects the CBC mode encryption of Datagram Transport Layer Security. Specifically, the issue exists due to timing differences in the decryption process. Versions prior to 3.0.11 are vulnerable.
    • Ref: http://www.gnu.org/software/gnutls/security.html http://www.securityfocus.com/bid/51322/references

    • 12.2.15 - CVE: Not Available
    • Platform: Cross Platform
    • Title: ZNC "bouncedcc" Module Remote Denial of Service
    • Description: ZNC is a bouncer application for Internet Relay Chat. The application is exposed to a remote denial of service issue in the "bouncedcc" module. This issue affects the "CBounceDCCMod:OnPrivCTCP()" function of the "modules/bouncedcc.cpp" file. The issue affects ZNC 0.202 and other versions may also be affected.
    • Ref: https://github.com/znc/znc/commit/11508aa72efab4fad0dbd8292b9614d9371b20a9#modul
      es/bouncedcc.cpp

    • 12.2.16 - CVE: CVE-2011-2462, CVE-2011-4369, CVE-2011-4370,CVE-2011-4371, CVE-2011-4372, CVE-2011-4373
    • Platform: Cross Platform
    • Title: Adobe Acrobat and Reader Multiple Vulnerabilities
    • Description: Adobe Reader and Acrobat are applications for handling PDF files. The applications are exposed to multiple security issues. See reference for detailed information. Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh, Adobe Reader 9.4.7 and earlier 9.x versions for Windows, Adobe Reader 9.4.6 and earlier 9.x versions for Macintosh, Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh, Adobe Acrobat 9.4.7 and earlier 9.x versions for Windows, Adobe Acrobat 9.4.6 and earlier 9.x versions for Macintosh are affected.
    • Ref: http://www.adobe.com/support/security/bulletins/apsb12-01.html


    • 12.2.18 - CVE: Not Available
    • Platform: Web Application - Cross Site Scripting
    • Title: IBM Cognos TM1 Executive Viewer Multiple Cross-Site Scripting Vulnerabilities
    • Description: IBM Cognos TM1 Executive Viewer provides users with Web-based access to information from online analytical processing databases for analysis and reporting. The application is exposed to multiple cross-site scripting issues because the application fails to sufficiently sanitize user-supplied input to the "aspnet_client/" and "evserver/createcontrol.js" script. IBM Cognos TM1 Executive Viewer 9.4 is vulnerable and other versions may also be affected.
    • Ref: http://www-01.ibm.com/support/docview.wss?uid=swg1PM26682 http://xforce.iss.net/xforce/xfdb/72198



    • 12.2.21 - CVE: CVE-2011-4203
    • Platform: Web Application
    • Title: Moodle "/calendar/set.php" HTTP Response Splitting
    • Description: Moodle is a content manager for online courseware, it is implemented in PHP. The application is exposed to an HTTP response splitting issue because it fails to sufficiently sanitize input submitted to the "$url" variable of the "/calendar/set.php" script in the Calendar component before using it in HTTP headers. Moodle 1.9.x versions prior to 1.9.15, 2.0.x versions prior to 2.0.6, 2.1.x versions prior to 2.1.3 and 2.2 are affected.
    • Ref: http://www.securityfocus.com/bid/51264/references http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4203

    • 12.2.22 - CVE: Not Available
    • Platform: Web Application
    • Title: ImpressCMS Cross-Site Scripting and Local File Include Vulnerabilities
    • Description: ImpressCMS is a PHP-based e-commerce application. The application is exposed to multiple input validation issues includeing multiple cross-site scripting issues and a local file include issue that affects the "icmsConfigPlugins[sanitizer_plugins]" parameter of the "edituser.php" script. ImpressCMS 1.3 Final is vulnerable and other versions may also be affected.
    • Ref: http://www.securityfocus.com/archive/1/521112 http://community.impresscms.org/modules/smartsection/item.php?itemid=579


    • 12.2.24 - CVE: Not Available
    • Platform: Web Application
    • Title: eFront "download" Parameter Directory Traversal
    • Description: eFront is a PHP-based e-learning application. The application is exposed to a directory traversal issue because it fails to sufficiently sanitize user-supplied input submitted to the "download" parameter of the "student.php" script. eFront 3.6.10 is vulnerable and other versions may also be affected.
    • Ref: http://www.efrontlearning.net/download http://www.securityfocus.com/bid/51302/references

    • 12.2.25 - CVE: Not Available
    • Platform: Web Application
    • Title: dl Download Ticket Service Authentication Bypass
    • Description: dl Download Ticket Service is a PHP-based ticket management system. The application is exposed to an authentication bypass issue because an attacker can log in as an arbitrary user by forging an authorization header. dl Download Ticket Service 0.3 to 0.9 is vulnerable and other versions may also be affected.
    • Ref: http://www.thregr.org/~wavexx/software/dl/NEWS.html http://www.securityfocus.com/bid/51347/references


    (c) 2012. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

    Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account