HP OpenView and Symantec Antivirus users should update their software quickly.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
***************** Sponsored By Blue Coat Systems, Inc. *****************
New eBook: SSL VPN Lessons Learned
Learn how to get the most out of SSL VPNs. Honest, technical, and to- the-point, this eBooklet, by analyst Don Jones, discusses what SSL VPNs promised, how they originally failed to deliver, and why the technology is making comeback. He'll answer your questions, explains the technology, and set you on the path to success. Learn more.
http://www.sans.org/info.php?id=1176
*************************************************************************
*************************************************************************
SECURITY TRAINING UPDATE FOR JUNE and JULY, 2006
Washington DC: 18 tracks
Denver: 6 tracks
London: 5 tracks
Toronto: 4 tracks
Plus 10 other cities and live-online programs you can take from your home.
See http://www.sans.org/ for course schedule registration
*************************************************************************
Part I is compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/index.php#process
Description: HP OpenView, a popular enterprise system management and monitoring solution, is vulnerable to several undisclosed remote command execution vulnerabilities due to improperly-validated input. Both the Network Node Manager (system monitoring and management) and Storage Data Protector (backup and data management) products are affected. Users are advised to block access to these systems from the Internet and other untrusted hosts. Note that these products often run with privileged access.
Status: HP confirmed, patches released.
Council Site Actions: The responding council sites using the affected software have notified their respective support teams and plan to deploy the patches during their next regularly scheduled system update. They also block OpenView access at their network security perimeters.
Description: Symantec AntiVirus is vulnerable to a remote buffer overflow. By sending specially-crafted requests to the antivirus engine, a remote user can exploit this buffer overflow and execute malicious code with "SYSTEM" privileges. No user interaction is required on the vulnerable system and the system is vulnerable in its default configuration.
Status: Symantec confirmed. Updates available.
Council Site Actions: The responding council sites that are using the affected software will deploy the vendor patch over the next few weeks.
Description: FreeType is an Open Source font engine widely deployed with Linux and Unix-based operating systems. Versions 2.2 and prior are vulnerable to several integer overflows when processing specially-crafted font files. By tricking a user into accessing such a font file, an attacker could execute remote code with the privileges of the vulnerable user. Note that, based on configuration, no user interaction beyond downloading the file may be necessary. Users are advised to not open any font files from untrusted sources and to upgrade to the latest version of the affected software.
Status: FreeType confirmed. Updates available.
Council Site Actions: One of the reporting council sites has the affected software installed on several hundred Linux systems. Most of their Debian GNU/Linux systems already have the new version (i.e., version 2.2.1-2 of the freetype package). They are awaiting release of a Red Hat Enterprise Linux patch.
Description: Drupal is a popular and widely-deployed Open Source content management application. Under a typical configuration of Drupal with Apache, Drupal is vulnerable to an arbitrary file execution vulnerability. By sending a specially-crafted request, an attacker is able to instruct Drupal to execute a file located in the "files" directory. Drupal is commonly configured to allow remote users to upload files, and an attacker can therefore inject code via an uploaded file. Users are encouraged to disable file uploading and update to the latest version of the affected software. Note that technical details and a proof-of-concept have been publicly posted.
Status: Drupal confirmed, updates released.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites.
Description: WordPress is a popular blogging and content management system written in PHP. Versions 2.0.2 and prior are vulnerable to a remote command execution vulnerability and an IP spoofing attack. By sending a specially-crafted request to the server hosting WordPress, an attacker could cause the server to execute arbitrary commands with the privilege of the webserver process. Note that only servers that allow open user registration or open account information modification are vulnerable to this vulnerability. Note that, due to a flaw in the processing of client request headers, it is also possible to spoof the source IP of the attacker in the WordPress logs. However, the hosting webserver logs should remain unaffected. Note that technical details and a proof-of-concept are available for the remote code execution vulnerability. Users are advised to disallow anonymous user registration.
Status: WordPress has not confirmed, no updates are available.
Description: PostgreSQL is an extremely popular and widely-deployed Open Source SQL database system. It also forms the basis of several other widely-deployed database engines, including RedHat's RedHat Database. The server suffers from a potential SQL injection and security bypass vulnerability due to a failure to properly validate multibyte character encodings when interacting with non-encoding-aware client-side applications. Specifically, when used with applications that treat multibyte characters as single characters, an attacker can submit specially-crafted multibyte strings to the server, which will interpret them as valid SQL commands. Note that most client applications are not encoding-aware and are therefore open to this vulnerability. Injected SQL commands will be run with the privileges of the client application on the server. Technical details for this vulnerability have been posted and simple proofs-of-concept are available.
Status: PostgreSQL confirmed, updates available.
Council Site Actions: At the reporting council sites the affected application is not used for any central IT services. The sites are still assessing whether their deployed configurations have a chance of exploitation.
Description: Metasploit is a popular Open Source platform for developing and deploying security exploits. Version 2.6 of this platform has been released, and contains 143 exploits, 43 new since the last release. Many of these exploits are for still-current vulnerabilities.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5014 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.