@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored Link: ******************************
1) ON-DEMAND SECURITY AUDITS AND VULNERABILITY MANAGEMENT - A Proactive Approach to Network Security - FREE Whitepaper http://www.sans.org/info.php?id=931
*************************************************************************
Part I is compiled by Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Details for two buffer overflow vulnerabilities in RealPlayer were disclosed last week. A stack-based overflow can be triggered by setting a certain length field to be greater than 127 in a real movie (".rm") file. A heap-based overflow can be triggered by specially crafted skin file (a file with an ".rjs" extension). The skin file has the same format as a zip file, and is processed by the unzip utility included in the Real Player. The overflow occurs when the length field in the skin file does not match its actual length. It is also possible to trigger a third overflow by including malformed images in the skin file. The technical details about this attack vector will be posted in another three months. Note that both the skin and movie files are automatically downloaded and opened, if RealPlayer is set as the default media player. Hence, with minimal user interaction such as browsing a malicious webpage, an attacker can successfully execute arbitrary code on a client's system.
Status: Vendor confirmed, updates available.
Council Site Actions: Most of the reporting council sites do not officially support RealNetworks products at their site. However, they do allow users to download and use. For the most part, they presume the users will use the 'Check for Update' functionality of the software or will receive an email from RealNetworks suggesting they apply the fix. Two of the reporting council sites do plan to distribute the patch their users during the next regularly schedule system update cycle.
Description: IP Security (IPSec) protocol suite is a standard for securing communications by encrypting and/or authenticating all the IP packets. Internet Key Exchange (IKE) is a part of the IPSec protocol that provides automated key management and peer authentication. The IPSec protocols are used for establishing VPN tunnels. Multiple vulnerabilities have been reported in the IPSec IKE protocol implementation by various vendors. The flaws were discovered using the IKE PROTOS test suite that stresses a vendor's IKE implementation by sending malformed IKE messages. Successful exploitation of these flaws may cause a denial-of-service or result in arbitrary code execution on the system/device supporting the IPsec protocol. In many VPN set-ups, the default port 500/udp is used for IPsec negotiation, which makes it easier to spoof a malformed IKE packet. The test suite is publicly available.
Status: Cisco, Juniper, Sun, HP, Nortel, CheckPoint, OpenSWAN have confirmed the vulnerability and released patches. Other vendors are still investigating if their products are affected.
Council Site Actions: Only a few council sites responded to this item. More information has been published since we sent it out to the council sites. Two sites plan to deploy the patches for their Cisco equipment during their next regularly scheduled system update process. The other site has confirmed vulnerable platforms, but is still in the process or waiting on confirmation from other vendors.
Description: GTK+ is a multi-platform toolkit for creating graphical user interfaces that is used by a number of Linux applications. GTK+'s gdk-pixbuf library contains multiple integer overflows that can be triggered by malformed XPM (X PixMap) images. The integer overflows can be exploited to overwrite heap memory that results in arbitrary code execution when a malicious XPM image is viewed in an application linked against the library. Complete technical details required to exploit the flaws have been posted.
Status: Upgrade to GTK+ version 2.8.7. Multiple Linux vendors have provided fixed packages.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4662 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.