Another week where the attackers are finding holes in security vendors' products. Note that (#2) Symantec's antivirus scan engine is used to incorporate Symantec's content scanning technologies into third party applications. If anyone has found a list of all the applications that are vulnerable because of this Symantec error, please share it with us.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************** SPONSORED BY SANS Network Security 2005 ******************
Los Angeles, CA October 24-30. Sixteen immersion training tracks and many special short courses on the hottest technologies and the newest techniques used by attackers. Special programs for auditors and security managers along with a huge offering for security professionals. Plus a big exposition and many evening sessions. A great conference. Information: http://www.sans.org/ns2005/ If you cannot make, LA - SANS will be in Baltimore: November 14-19 www.sans.org/innerharbor2005/
Why people who care about security attend SANS training: "This training is like nothing else. No vendor-bias, no marketing spiel, just detailed theory and practice that will make a real, immediate difference to my job." Jon King, VANCO
*************************************************************************
Part I is compiled by Dinesh Sequeira at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: A vulnerability has been reported in RealPlayer and Helix Player, the popular media players on UNIX systems. These players reportedly contain a format string vulnerability in processing realpix (".rp") files. The flaw is triggered by providing an invalid format string to the "timeformat" attribute in an ".rp" file. A malicious realpix file in a webpage or an email can exploit this issue to execute arbitrary code on the client system. If Real Player or Helix Player is configured as the default media player, no user interaction is required to leverage the flaw. The discoverer has posted an exploit.
Status: Patches are available from the vendor.
Council Site Actions: One site, although it does not support the software, has advised the users to upgrade. A second site is relying on update notification feature of the RealNetworks products to notify the users that a new version is available. However, if there is a reported exploitation in the wild, they plan to send a mess out to their site's Linux announcements mailing list, suggesting that users go directly to http://service.real.com/help/faq/security/050930_player/ to update.
Description: Symantec's AntiVirus Scan Engine is a TCP/IP server and programming interface that is used to incorporate Symantec's content scanning technologies into third party applications. The web based administrative interface is vulnerable to a buffer overflow due to insufficient input validation of HTTP headers. A remote attacker can send a specially crafted HTTP request to the administrative Scan Engine Web Service (default 8004/TCP) and can either cause it to crash or execute arbitrary code. The issue is due to improper bounds checking of user supplied data, into an insufficiently sized memory buffer which results in a heap overflow. Exploitation does not require credentials. Currently there are no known exploits.
Status: Vendor has released updates and workarounds.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. (Editor note: As far as they know) They reported that no action was necessary.
Description: PHP-Fusion is a lightweight Content Management System (CMS) written in PHP. It is easily extensible via plug-ins(fusions) which makes it a flexible and versatile Web Application. Vulnerabilities exist due to improper sanitization of user supplied input to the "photo" and "album" parameters in "photogallery.php" before being used in a SQL query. The software is vulnerable to a SQL Injection attack that may allow attackers to create, delete, insert and modify database records or execute system commands on behalf of the database user. No proof of concept or exploit is available.
Status: No vendor patches are available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Kaspersky is an Anti-virus program for Windows, Unix/Linux, Novell and file and mail servers. A vulnerability exists due to an error in handling CAB archives. Specifically, the vulnerability is the result of an improperly bounded copy loop in a core processing function. When a specially crafted CAB archive is scanned it would cause a heap-based buffer overflow, and could allow arbitrary code execution. No known exploits are available in the wild.
Status: Vendor has released a workaround by releasing signatures that detect possible exploits. Updates to eliminate the vulnerability will be available online at vendor's website on Oct 05, 2005.
Council Site Actions: Only one of the reporting council sites is using the affected software, but only on a very small number of systems.They primarily use a different anti-virus vendor. They are not attempting to identify the affected systems, but will assist the system users in converting to their supported anti-virus software if they wish. Their users are also able to obtain the Kaspersky update and install it on their own.
Description: MailEnable provides mail services for many domains and users and supports mail protocols like POP, IMAP, SMTP, web mail and HTTPmail. A buffer overflow vulnerability exists when the application processes W3C logging. This can be exploited to execute arbitrary code on the vulnerable system. No details have been posted and proof of concept code is not available.
Status: Vendor hotfix is available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Virtools is a set of applications for creating games, CAD, simulations, real time 3D and other interactive multimedia applications. Virtools Web Player provides web users with free access to highly interactive, immersive content created with the Virtools Dev development environment. There are two vulnerabilities. (a) A buffer overflow when handling a ".vmo" file with an overly long filename can be exploited to run arbitrary code. (b) A directory traversal vulnerability when handling a ".vmo" file with directory traversal sequences in its filename can be leveraged to overwrite arbitrary files on the system. This would require a user to be tricked into clicking on a link to a malicious ".vmo" file in the browser or a link via email. Proof of concept code has been posted.
Status: Vendor has a patched version available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4517 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.