For most of you, this will be a quiet week. On the other hand, since many organizations do not officially support Real or Apple media players, millions of users will be urged to patch their players (#1 and #6 below).
Has anyone found a great (low cost and massively effective) way to get users to act quickly to install patches (other than automated patching)? We've started a new project called Security Awareness Tool of the Month. If you have found something that works, it might win a prize.
And a quick survey to help make @RISK better. Just answer here and return it to info@sans.org
How would you rate the @RISK newsletter on a scale from 1 (Poor) to 5 (Excellent) in terms of information content, coverage, references etc.?
What other information would you like to see included in the @RISK ?
Do you have any suggestions to improve the current format of the newsletter?
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************This Issue Sponsored by Internet Security Systems**************
Keeping Your Organization Ahead of the Threat
All intrusion prevention systems (IPS) are not created equal. Find out the difference between reactive and preemptive IPS appliances. Preemptive IPS solutions shield vulnerabilities AND block threats. Reactive IPS solutions only block attacks. Download the FREE whitepaper, "Defining the Rules of Preemptive Protection: The ISS Intrusion Prevention System," to learn more http://www.iss.net/proof/ipswp/sans/11014
*************************************************************************
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages.
(1) Simple, secure alternative to NIS/NIS+ and LDAP for UNIX/Linux user account and password management. FREE downloads. http://www.sans.org/info.php?id=635
*************************************************************************
Highlighted Cybersecurity Training: Washington, DC, Dec. 7-13, 2004
SANS best instructors will be in DC teaching great courses for
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: RealPlayer, a popular media player, has over 200 millionusers world wide. The player's user interface can be enhanced byinstalling "skin" files. A vulnerability exists in the player's handlingof skin files that can be exploited to execute arbitrary code on aclient system. The exploitation proceeds as follows: A user clicks amalicious link in an email or a webpage that points to a file with a".rjs" extension i.e. a skin file whose format is similar to that of azip file. Internet Explorer silently downloads the skin file without anyuser warning. This specially crafted skin file triggers a stack-basedoverflow in the player's "dunzip32.dll", the DLL used to unzip the skinfile. The overflow can be exploited to execute arbitrary code on theclient machine with the privileges of the logged-on user. The problemoccurs because the dunzip32.dll does not validate the length of afilename in the zip file. The technical details required to exploit theflaw have been publicly posted.
Status: Vendor confirmed, updates available. To install the update,click the "Tools" option on the player's menu bar, and then select the"Check for Update" option. Select the "Security Update - Skin FileOverflow" for installation.
Council Site Actions: All of the reporting council sites have thisapplication in use; however, most do not officially support it and arenot planning any direct action. Several sites did send out anotification to their user base requesting them to download the updates.One site is actively encouraging users to remove the application unlessthere is a true business need and no alternative player exists. One siteis installing the updates for their users.
Description: Internet Explorer reportedly contains an overflow whenprocessing "IFRAME" tag with overlong "SRC" and "NAME" attributes. Amalicious webpage can possibly exploit the flaw to execute arbitrarycode on a client system (not confirmed). The flaw was discovered whiletesting Internet Explorer with an HTML fuzzer. The fuzzer generates anumber of HTML test pages that contain tags with malformed attributes.The reporter of this flaw has warned that a working exploit for thisflaw would not take too long to surface.
Status: Microsoft has not confirmed and no updates are available.
Council Site Actions: All sites are waiting for confirmation fromMicrosoft and a patch, if appropriate.
Description: Microsoft has published a Knowledge Base article, KB888534,that explains how to mitigate the risks associated with the InternetExplorer "Drag and Drop" vulnerability discussed in the last week's@RISK newsletter. Note that the vulnerability can be exploited toexecute arbitrary code on a Windows client. Another exploit code hasalso been publicly posted.
Council Site Actions: Two of the reporting council sites are investingthe mitigation steps suggested by Microsoft in KB888534. The remainingcouncil sites are waiting for a patch from the vendor.
Description: MailCarrier, a mail server that runs on Windows2000/XP/2003 platforms, reportedly contains a buffer overflow in itsSMTP server. The overflow can be triggered by an overlong SMTP "EHLO"or "HELO" command. Either of these is the first command a client sendsto an SMTP server to identify itself. Hence, an unauthenticated attackermay exploit this flaw to execute arbitrary code on the server. Exploitcode, which can be used to compromise a Windows 2000 SP4 or Windows XPSP2 system running the MailCarrier server, has been posted.
Status: Unknown.
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Description: WvTftp server, a TFTP server that runs on Linux, containsa heap-based buffer overflow in its "new_connection" function. Theproblem occurs because the server does not perform a length check on theTFTP "options" prior to copying them in a buffer. The flaw can beexploited to execute arbitrary code with the privileges of the WvTftp,typically "root". Exploit code has been publicly posted.
Status: Vendor confirmed, update available at http://open.nit.ca/wiki/index.php?page=DownloadSnapshots.
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Description: Apple's QuickTime media player for Windows contains aninteger overflow vulnerability. The overflow can be exploited by amalicious webpage or an HTML email to execute arbitrary code on a clientmachine. The discoverers of the flaw have not released any technicaldetails yet but have rated the flaw as a "High Risk". Judging by thesimilar rating for other advisories from the discoverers, the flaw islikely to be easy to exploit.
Status: Apple has confirmed the flaw and released a security update onOctober 27, 2004.
Council Site Actions: Most of the reporting council sites are respondingto this vulnerability. Several sites already have updates in progressand others will deploy during the next regularly scheduled system updateprocess.
Description: libxml2 is an XML parsing library that can be installed ona large number of platforms including all UNIXes, Mac, Windows, OS/2etc. The library contains a stack-based buffer overflow in parsing URLScontaining FTP information. The problem exists in the"xmlNanoFTPScanURL" function that does not perform bounds checkingbefore copying the user-supplied URL into a fixed-sized buffer. Anyprogram or software linked against the libxml2 library and invoking thisfunction is potentially vulnerable. Exploit code has been publiclyposted.
Status: Vendor has confirmed and version 2.6.15 is now available. Notethat the library is primarily used for parsing XML, and there may beonly a limited number of programs invoking the vulnerable function.
Council Site Actions: Two of the reporting council sites are using theaffected software. Both plan to deploy patches within the next month.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3819 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.