A slew of last-minute additions makes this week's issue larger than usual. Microsoft Exchange users have a particularly critical problem to solve. Your Blackberry users will scream, because they will be disabled, but if you don't fix it, unauthenticated attackers can take full control of your Exchange servers. (31 vulnerabilities this week), Verisign, Adobe, Real, EMC, Sophos, and Adobe users also have immediate work to do. Apple is distributing fixes for 31 vulnerabilities in OS/X and some for QuickTime, too.
Alan
PS. This Wednesday (May 17) is the early registration deadline for SANSFIRE, the largest security training conference and exposition in Washington DC. Eighteen immersion tracks. Wednesday is also the early registration deadline for SANS London.
SANSFIRE: http://www.sans.org/sansfire06/
SANS London: http://www.sans.org/london06/index.php
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Sponsored By Blue Coat Systems, Inc. *****************
New eBooklet - SSL VPNs: Lesson Learned Sponsored by: Blue Coat
Get the most out of SSL VPNs. Honest, technical, and to-the-point, this eBooklet, by analyst Don Jones, discusses what SSL VPNs promised, how they originally failed to deliver, and why the technology is making comeback. He'll answer your questions, explains the technology, and set you on the path to success. Learn more. http://www.sans.org/info.php?id=1162
*************************************************************************
************************ Sponsored Links: *******************************
1) Protect corporate data on stolen computers and avoid costly litigation. Delete data remotely with Computrace® Data Protection. http://www.sans.org/info.php?id=1163
2) Free white paper - consolidate, correlate, generate "rules-based" reports for millions of events a day. http://www.sans.org/info.php?id=1164
3) WhatWorks in Log Management - a county court finds a solution to centralize events and streamline reporting. http://www.sans.org/info.php?id=1165
*************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/index.php#process
Description: Microsoft Exchange, one of the most widely-deployed email servers around the globe, contains a buffer overflow. An unauthenticated attacker can trigger the overflow by sending a specially crafted "calendar" request, and exploit the overflow to execute arbitrary code on the Exchange server with "SYSTEM" privileges. The problem occurs in the module that processes "vcal" and "ical" mime content types, which are used by the Exchange server and email clients when sending calendar requests. The technical details have not been posted. However, this flaw can be exploited to create a worm; hence, it should be patched on a priority basis.
Status: Apply the patch referenced in the Microsoft Bulletin MS06-019. Enterprises that are using Blackberry service or Goodlink Wireless service via Exchange may suffer disruption as users on mobile devices cannot send e-mail messages. In such cases, network or host intrusion prevention solutions should be used to block this attack.
Council Site Actions: All of the reporting council sites are responding to this item. Most are in the process of updating their systems now. A few have already completed the updates. A few sites are still investigating how to update without breaking their existing email delegations on the gateways, such as Blackberries and other RIM devices.
Status: Apple confirmed, patches released.
Status: Vendor confirmed, updates released. System administrators should block the access to the ports being used for this software from the Internet.
Description: This patch from Microsoft fixes remote code execution vulnerabilities in the Adobe Macromedia Flash player that ships by default with certain Windows versions. Adobe has previously issued updates for the affected versions of Flash player. A malicious flash player animation (".swf" file) can execute arbitrary code on an affected Windows system. The malicious SWF file can be posted on a webpage, shared folder, P2P folder or attached to an email message. Note that one of the Flash player vulnerabilities patched by this update has been publicly disclosed. Hence, this patch should be applied on a priority basis.
Status: Apply the patch referenced in the Microsoft Security Bulletin MS06-020.
Council Site Actions: All of the reporting council sites are responding to this item. Some have already upgraded their systems. A few are in the process of upgrading them now, or plan to upgrade in the near future.
Description: Sophos Anti-virus products contain a heap-based overflow that can be triggered by specially crafted Microsoft Cabinet (".cab") files. The overflow can be exploited to execute arbitrary code on a system running the affected Sophos product if the option to inspect CAB files is enabled (disabled by default). Exploiting the mail gateways is easy as it does not require any user interaction. The antivirus library is also embedded in products sold by more than 20 vendors, and updates should be applied to any products listed at: http://www.sophos.com/partners/oem/
Status: Sophos confirmed, updates available.
Description: Adobe Dreamweaver is a leading web development tool that is used for creating a large number of websites. The code generated by Dreamweaver for Cold Fusion, PHP MySQL, ASP.NET and JSP server models contains SQL injection vulnerabilities. The flaws can be exploited to execute arbitrary SQL commands on the back-end database. The technical details to craft an exploit may be obtained from the steps outlined to mitigate risks for Dreamweaver MX.
Status: Adobe has released version 8.0.2 for Dreamweaver and also provided steps for mitigation for users of Dreamweaver MX. Please re-generate the affected website code using the updated Dreamweaver software.
Council Site Actions: Only one council site is using the affected software. They reported that it would be rare that the software is used for developing web sites that support SQL; thus they believe they are largely unaffected, but they still are investigating.
Description: EMC Retrospect is a multi-platform backup solution for small-medium businesses. The backup client contains a buffer overflow that can be triggered by sending a specially crafted packet to port 497/tcp or 497/udp. The flaw can be exploited to execute arbitrary code on the backup client. The technical details required to craft an exploit have not been posted yet.
Status: EMC confirmed. Patches are available for Windows, Mac, Linux and NetWare clients. A general security measure would be to block ports 497/tcp and 497/udp from the Internet.
Council Site Actions: Only one of the responding council sites is using the affected software, and on only a small number of Macintosh systems. They will encourage owners of the affected computers to remove Retrospect and switch to their supported backup solution. They expect a few users will choose to upgrade to a newer Retrospect Client within the next month.
Description: Verisign i-Nav plug-in allows a user to browse the Internet with internationalized domain names (IDNs) using Internet Explorer or Microsoft Outlook/Outlook Express. i-Nav's "VUpdater.Install" contains a remote code execution vulnerability. The problem arises because this ActiveX control's "InstallProduct" routine can be used to run an arbitrary executable. A malicious webpage or an HTML email can exploit this flaw to execute arbitrary code with the privileges of the logged-on user.
Status: Verisign has issued an update for the i-Nav plug-in.
Council Site Actions: Only one of the responding council sites is using the affect software, and on only a small number of systems. It is not supported by their central IT department. They are still investigating whether there is any efficient upgrade approach provided by the vendor, e.g., perhaps the software has a way to notify an end user that an update is needed.
Status: Vendor has not confirmed. No updates available.
Description: Novell client for Windows contains a buffer overflow that can be triggered by sending a specially crafted RPC message. The buffer overflow can be exploited to execute arbitrary code on the affected Windows system. No technical details about the flaw are yet available.
Status: Novell has released a patch for the Windows client.
Council Site Actions: One council site is in the process of migrating away from their Novell implementation. A second site is still investigating whether there is a widespread deployment of Novell Client within the one department that has a Novell implementation.
Description: Netware Distributed Print Services (NDPS/iPrint) contains an integer overflow vulnerability that can be exploited to execute arbitrary code on an affected Netware server. The technical details required to craft an exploit have not been posted yet.
Status: Novell confirmed. Apply the SP3, SP4 or SP5 for the affected server.
Council Site Actions: Only one of the responding council site is using the affected software. These systems are in the process of being migrated away from Novell.
Description: eEye has released technical details about a heap-based buffer overflow in the Microsoft Distributed Transaction Coordinator (MSDTC) RPC service that affects Windows NT 4.0, Windows 2000 SP2 and SP3 installations. Note that MS05-051 patched this overflow for Windows 2000 SP4, Windows XP and Windows 2003 systems. The patch is now available for Microsoft NT 4.0/2000 SP2/2000 SP3 systems for customers who have entered into a customer support agreement with Microsoft.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5014 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.