A very tough week for security staff in most sites that rely on Microsoft Office products. Trying to persuade Microsoft Office users to jump through hoops to patch their systems appears to be thankless and, at least partially, unproductive.
Good news on the "minimum security configuration" benchmarks front. The Center for Internet Security just released four more benchmarks (and free testing tools): Windows Server 2003 and FreeBSD operating systems, and Pix Firewall and Apache Web Server. The Solaris benchmark update was also released this week. Get them at http://www.cisecurity.org
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored This Week by FaceTime ************************
Secure IM and P2P
IM and P2P create serious corporate and security risks for the enterprise, and traditional security tools provide an inadequate defense. Learn how to protect your network from security threats and violations.
Download a free white paper from Osterman Research, Managing IM and P2P Threats in the Enterprise.
http://www.facetime.com/secure
*************************************************************************
************************** SPONSORED LINKS ****************************** Privacy notice: Sponsored links redirect to non-SANS web pages.
(1) Radware DefensePro secures networked applications against viruses, malicious intrusions and Denial of Service at 3-Gbps. FREE Whitepaper. http://www.sans.org/info.php?id=588
******************** Security Training Update *************************
Featured Training program of the Week: SANS Cyber Defense Initiative CDI is in two parts: CDI South in New Orleans November 1-4 ( http://www.sans.org/cdisouth04) and CDI East in Washington, DC, December 7-14 ( http://www.sans.org/cdieast04)
New Orleans offers a whole new type of program that many people have asked us to provide: 18 one and two day courses on issues shaping the future of information security, from the newest hacker tools to changes in legal issues surrounding security. Perfect for people who have taken SANS courses and want updates and for people who just don't have time to attend a full class. On the other hand, Washington offers 13 full length immersion courses an a few short courses.
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Windows XP/2003 and multiple Windows applications use GDIPlus.dll to display information on the screen and the printers. This DLL contains a heap-based buffer overflow that can be triggered by a specially crafted JPEG image. The overflow arises because the DLL does not check the declared length of the "comment" section in a JPEG file. Therefore, setting the comment section length to either 0 or 1 results in a heap-based overflow. The flaw may be exploited to execute arbitrary code on a system with the privileges of the application that opens the specially crafted JPEG file. In order to exploit the flaw, an attacker can either - (a) Send the JPEG image in an HTML email or as an email attachment. (b) Host the JPEG image on a webserver or a shared folder, and entice a user to view the image via a link in an email or another webpage. Note that the JPEG may be embedded in a Word/PowerPoint or other document. A proof-of-concept JPEG file has been publicly posted.
Status: Microsoft released the MS04-028 security bulletin on September 14, 2004. Apply the updates for operating system as well as various applications as described in the bulletin. There is a concern that third-party applications that are using their own copy of GDIPlus.dll may not get detected by WindowsUpdate or the GDI+ detection tool.
Council Site Actions: All reporting council sites are responding to this vulnerability. Several sites have already started the patch deployment process. One site said they are only deploying the patches that are available via SUS and will rely on anti-virus products to reduce the threat from other affected applications. Another site commented that the great majority of their systems have obtained the Internet Explorer or Windows update through the public Windows Update site, or through their local SUS server. A very small number of their systems have obtained the Microsoft Office update. Their central IT department has some prominent web pages that advise users to go to the Office Update site and select "Check for Updates".
Description: Mozilla, Firefox and Netscape web browsers, and the Thunderbird email client contain multiple buffer overflow vulnerabilities. The flaws may potentially be exploited by a malicious web page or an email to execute arbitrary code on a client system. The vulnerabilities include (a) A stack-based overflow that can be triggered by a specially crafted vcard (electronic business card). (b) A heap-based overflow that can be triggered by a wide BMP image file. (c) A heap-based overflow that can be triggered by non-ascii characters in a link. The proof-of-concept exploits have been posted in the Mozilla's bug repository.
Status: Mozilla confirmed. Upgrade to the Firefox preview version, Mozilla version 1.7.3 and Thunderbird version 0.8. The patches also fix a number of other less critical flaws in these products.
Council Site Actions: Only two of the reporting council sites are responding to this issue. One site commented the vulnerable products have a very limited usage, and they will apply the patch during their next system update process. Another site sent the alert to their web group for further review and investigation.
Status: Microsoft released the MS04-027 security bulletin on September 14, 2004. Apply the updates described in this bulletin. A workaround is to uninstall the WordPerfect Converter. Note that the converter is installed by default with Microsoft Office and is also available separately as part of the Microsoft Office Converter Pack.
Council Site Actions: Two of the reporting council sites are already in the process of distributing the patch. A third site will deploy the patch during their next regularly scheduled system update process. Another site plans to rely on the Microsoft AUTO UPDATE process to patch their systems. One site does not plan to take any action at this time, but rather rely on anti-virus for protection and are anxiously awaiting Windows Update Service (WUS) that will support automatic deployment of Office updates.
Description: The Apache Portable Runtime (apr) library provides APIs that ensure a consistent application behavior across platforms. apr-util is a companion library to the apr library, both of which are used by the Apache server. The apr-util library contains a buffer overflow in the "apr_uri_parse" function. The flaw can be triggered by a specially crafted IPv6 address in the URI or the "Host" header field in an HTTP request. The flaw may be potentially exploited on some platforms such as BSD to execute arbitrary code.
Status: Apache has released version 2.0.51 that fixes this flaw. Many other denial-of-service vulnerabilities have also been fixed in this version.
Council Site Actions: Most of the reporting council sites are responding to this vulnerability, but in different ways. One site will deploy the patch as a required fix for their small number of Apache-2.0.x systems. Another site plans to deploy during their next regularly schedule system update process. A third site is still investigating if they have the software in use and will treat this as a moderate problem if found. Another site commented they have very few systems running the affected version (none of which are critical servers). Those that are running the affected version are primarily running Red Hat Enterprise Linux or Debian GNU/Linux and are configured to retrieve all vendor updates. Systems for which administrator intervention is needed to trigger patching will most likely be updated later this month.
Description: X PixMap (XPM) is an ASCII image format popularly used by the X Windows on UNIX systems. The libXpm and GdkPixBuf (ships with gtk+2.x) libraries provide various functions to store and read XPM image files. These libraries contain multiple stack-based and integer buffer overflow vulnerabilities that can be triggered by specially crafted XPM files. The flaws can be exploited to execute arbitrary code. In order to exploit the flaws, an attacker has to entice a user (via email or another webpage) to view a malicious XPM file. Multiple proof-of-concept exploits have been posted.
Status: X.org has released version 6.8.1 of X11R6 that fixes the flaws. Multiple Linux vendors such as RedHat, Mandrake and Debian have released patches for the affected products.
Council Site Actions: Several council sites are responding to this vulnerability. Two sites are running RedHat and/or Debian and as such, they are configured to retrieve the vendor updates. Another site has very limited usage of the software and plans to deploy the path during their next regularly scheduled system update process. A final site is still investigating if they are using the software, and if so, will treat this as a moderate priority.
Description: Multipurpose Internet Mail Extensions (MIME) is a set of standards for encoding email attachments and/or files for web transfer. Multiple security products such as anti-virus software, email and web content-checkers etc. are required to parse MIME encoded messages to determine if the message is malicious. An array of techniques have been published that may be used to bypass the security scan of a MIME encoded message. These evasion techniques may be employed by virus and other malware writers to avoid detection. The technical details regarding all the evasion techniques have been posted.
Status: Multiple vendors like Sun, HP, Apple and Mozilla have reported that they are not vulnerable. F-Secure's Gatekeeper version 6.4.1 will fix the flaws. Upgrade to ripMIME version 1.4.0.0. For status on other vendors, please refer to the NISCC advisory.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3718 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.