A *huge* week of Microsoft security problems (#2, #4, #5, #6, #7, #9, #10, #11), including a zero-day Excel vulnerability (#8). The IE vulnerabilities allow attackers to set up sites that infect visitors who do nothing more than visit the malicious sites. But don't overlook upgrading all versions of Adobe Reader (#7). And this week again saw more than 100 new vulnerabilities discovered, mostly in web applications - - demonstrating once again the huge liability organizations are taking on in deploying web applications written by people who have never been trained in how to avoid programming in security vulnerabilities, or in how to find and fix vulnerabilities other programmers have left in their applications. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************ SPONSORED BY SANS SUMMER TRAINING EXTRAVAGANZA ************* Over the next two months, you may attend one or more of 50 SANS courses in 20 cities on four continents. And if you cannot make those events, because of travel restrictions, you may attend live SANS courses with the best teachers in the world, without leaving your home. You can even take SANS courses online at your own schedule. Attendance at SANS educational events is experiencing the largest growth spurt in half a decade. Pick your class and register early to get a seat. http://www.sans.org *************************************************************************
*************************** Sponsored Links: **************************
1) Free SANS Tool Talk Webcast tomorrow "Comprehensive Threat Management: Helping You Navigate The Data Security Quagmire" Tuesday, June 20 at 1:00 PM EDT (1700 UTC/GMT) http://www.sans.org/info.php? id=1196
2) Need help selecting an SSL VPN solution? Read security analyst Mark Bouchard's (CISSP) latest buyer's guide. http://www.sans.org/info.php? id=1197 *************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft has released another cumulative security update for Internet Explorer that fixes eight vulnerabilities. Four of the vulnerabilities can be exploited by a malicious webpage to execute arbitrary code on a vulnerable system with the privileges of the logged-on user. The other less severe vulnerabilities fixed in this update include spoofing, information-disclosure and DoS vulnerabilities. Note that viewing the malicious web page is sufficient for exploitation; no further user interaction is required. Exploit code that has been already published can be re-used to leverage the COM handling vulnerabilities.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: The Word vulnerability, outlined in the @RISK Newsletter volume 5 #20, has been patched by Microsoft in the Security Update MS06-027. Further details regarding this exploit have been released. The vulnerability is due to a corrupted object pointer in Microsoft Word documents. The known exploit code for this vulnerability is now detected by several antivirus programs and is generally identified as "Backdoor.Ginwui" or "Trojan.MDropper.H".
Description: Microsoft Windows Media Player contains a remotely-exploitable buffer overflow vulnerability. By sending a specially-crafted PNG image file, an attacker can trigger this buffer overflow and execute arbitrary code with the privileges of the viewing user. No user interaction beyond viewing a malicious email or web page would be required for exploitation. Non-public proof-of-concept code for this exploit has been published.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: Microsoft PowerPoint contains a file-format validation vulnerability that would allow an attacker to execute arbitrary code by tricking a vulnerable user into opening a specially-crafted Microsoft PowerPoint file. Any malicious code would be executed with the permissions of the user who opened the file. Note that user interaction would be required to exploit this vulnerability.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: Microsoft Windows contains a memory corruption vulnerability that could allow a remote attacker to execute arbitrary code with the privileges of the current user. Due to a failure to properly handle JScript heap memory, an attacker can exploit this vulnerability via specially-crafted web page or email message. JScript is Microsoft's implementation of ECMAScript (commonly known as JavaScript). No user interaction beyond viewing the malicious web page or email message is required for exploitation.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: Microsoft Windows contains a memory corruption vulnerability that could allow a remote attacker to execute arbitrary code with the privileges of the current user. Due to a failure to properly handle ART image files (a deprecated, mostly-unused but still-supported image format), an attacker can exploit this vulnerability via a specially-crafted ART image file. No user interaction is required beyond viewing the malicious web page or email message is required for exploitation.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: Adobe Reader, the most popular PDF reader on the Internet, contains multiple security vulnerabilities. The exact nature of the vulnerabilities is unknown, but Adobe has confirmed that at least one of the vulnerabilities can be exploited to execute arbitrary code with the privileges of the current user. All users are recommended to upgrade immediately.
Status: Adobe confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to this issue and they all plan to roll out the patches during their next regularly schedule system update process.
Description: Microsoft Excel is vulnerable to an unspecified remote code execution vulnerability. By sending a specially-crafted Excel file to a vulnerable user, an attacker can execute arbitrary code with the privileges of the logged-in user. The user must open the malicious file to be affected. This vulnerability is currently being exploited in a targeted attack; the exploit is not believed to be public at this time. Microsoft has added software to the Windows Live Safety Center to detect the malicious code installed by the exploit.
Status: Microsoft confirmed, no updates available. SANS Handler's list has posted a list of defenses.
Description: The Microsoft Windows TCP/IP stack contains a remote code execution vulnerability. Systems running the Routing and Remote Access Service with IP Source Routing enabled are vulnerable. The Routing and Remote Access Service is disabled on all vulnerable versions of the operating system, but IP Source Routing is enabled on all versions but XP Service Pack 2 and Server 2003 Service Pack 1. Users running the vulnerable configuration are advised to update as soon as possible, and configure firewalls to block IP packets with Source Routing options.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: The Microsoft Windows Routing and Remote Access Service contains a remote code execution vulnerability. By sending specially-crafted traffic to the vulnerable system, an attacker could execute arbitrary code. On Windows XP Service Pack 2 and Windows Server 2003 systems, valid local user credentials are required to successfully exploit this vulnerability; on other systems no such credentials are required. The Routing and Remote Access service is disabled by default on all vulnerable systems. Users running a vulnerable configuration are advised to update immediately and to block ports 135, 137, 138, 445 (UDP) and ports 135, 139, 445, and 593 (TCP) from the Internet. Note that this vulnerability is distinct from MS06-032. Non-public exploit code for this vulnerability has been published.
Status: Microsoft confirmed, updates available. Note that the patch affects dial-up scripting functionality.
Council Site Actions: All of the reporting council sites are responding to all of the Microsoft issues. Some sites are already in the process of deploying the patches and others plan to deploy in the near future. Sites use the public Microsoft Update site or a local WSUS server.
Description: Microsoft Windows 98 and ME are vulnerable to a heap overflow when processing certain WMF (Windows Metafile) image files. By tricking a user into opening a Windows Metafile with a specially-crafted header, an attacker can execute arbitrary code with the privileges of the logged-in user. This vulnerability is limited to Windows 98, 98SE, and ME. It does not affect Windows 2000, XP or later. This is distinct from the previous WMF-handling vulnerabilities.
Status: Microsoft confirmed, updates available.
Description: Sendmail, the most popular mail transport agent on the Internet, contains a remotely-exploitable denial-of-service vulnerability. By sending a specially-crafted MIME message, an attacker could cause the Sendmail server to stop delivering mail.
Status: Sendmail confirmed, updates available.
Council Site Actions: Two of the reporting council sites are responding to this issue. One site plans to deploy the patches for their heavily used machines after some testing in the next few weeks. Their lightly used machines will automatically obtain patches via the auto update feature of the Linux distributors.
Description: WinSCP, a popular SCP and SFTP client for Windows, contains a remotely-exploitable command-injection vulnerability. By tricking a user into clicking on a specially-crafted "scp://" or "sftp://" link, an attacker can cause WinSCP to automatically download and execute an arbitrary file with the privileges of the current user. Exploit code has been publicly posted.
Status: No vendor confirmation, no updates available.
Description: MailEnable Enterprise is a popular enterprise email solution. The WebMail component is vulnerable to several security bypass vulnerabilities. Failure to properly validate user-supplied input allows remote attackers to gain administrative privileges over the MailEnable software. Exploit code has been publicly posted.
Status: No vendor confirmation, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5038 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.