A security product, Patchlink, allows remote exploitation. Apple iTunes has another security problem. And Apple OS/X users should install the new cumulative patch very soon.
Also researchers discovered another 55 cross-site scripting, SQL injection and other web application vulnerabilities this week. Give your web programmers a chance to know how to make their applications secure with a secure web programming course in Washington, Las Vegas or at your own site: http://www.sans.org/training/description.php?tid=394:
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Summer Security Training Extravaganza ****************
Over the next two months, you may attend one or more of 50 SANS courses in 20 cities on four continents. And if you cannot make those events, because of travel restrictions, you may attend live SANS courses with the best teachers in the world, without leaving your home. You can even take SANS courses online at your own schedule. Attendance at SANS educational events is experiencing the largest growth spurt in half a decade. Pick your class and register early to get a seat. http://www.sans.org
*************************************************************************
**************** SANS Network Security 2006 - Las Vegas******************
SANS Network Security 2006, October 1-9, 2006 is at Caesar's Palace in Las Vegas. Thirty-seven immersion tracks and short courses plys a big security product exposition. Further information: http://www.sans.org/ns2006/
"Very intense. I have never been to a conference where we received so much information and so much more to learn post-conference." - -Paul Abels, UPS
*************************************************************************
Part I is compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: PatchLink Update Server is a popular patch management solution for enterprises. It contains several vulnerabilities in its ASP scripts. (a) Failure to properly sanitize the "agentid" parameter to the "checkprofile.asp" script allows unauthenticated attackers to execute arbitrary SQL statements against the internal database with DBO privileges. (b) Failure to properly process user-supplied credentials in the "proxyreg.asp" script allows unauthenticated users to proxy requests to the PatchLink server. (c) Failure to properly process user-supplied credentials to the "nwupload.asp" script allows unauthenticated attackers to upload files to the server's filesystem and overwrite any files. These flaws can be exploited to compromise all the systems that are downloading their patches from the Patchlink server as the attacker can replace all the legitimate patches with malicious files. Proof-of-concept exploits for all these vulnerabilities have been publicly posted.
Status: PatchLink confirmed, updates available.
Description: The GraceNote CDDB ActiveX Control is used to retrieve information about music CDs from the GraceNote database. The control is packaged in multiple products from several vendors including Sony and Nokia. This ActiveX control contains a buffer overflow that can be triggered by passing an overlong string. A malicious webpage can exploit this overflow to execute arbitrary code with the privileges of the logged-on user. Note that no user interaction beyond visiting a malicious web site may be necessary to leverage the flaw.
Status: GraceNote confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: LibPNG, a popular library for processing PNG (Portable Network Graphics) images, is installed and used by default on all Linux, UNIX, BSD, and Mac OS X systems. Certain applications may also install the library on Windows systems. The library contains a buffer overflow that can be triggered by a specially crafted PNG image "chunk". Any application that delivers a malformed PNG image (web, email, IM) can exploit the overflow to execute arbitrary code with the privileges of the current user. Since LibPNG is open source, the technical details for this exploit can be obtained by examining the fixed code.
Status: LibPNG confirmed, updates available.
Council Site Actions: The responding council sites using the affected software plan to install any patches that come out for OS or applications they use within regular patching intervals. One also said they don't run graphical applications that take input from the outside world on their UNIX systems.
Status: Apple confirmed, updates available.
Description: OpenOffice.org, a popular Open Source office suite for Windows, Mac OS X, Linux, Solaris, and other operating systems, contains several vulnerabilities in the way it handles documents. (a) By tricking a user into opening a specially-crafted XML document, an attacker can trigger a buffer overflow and execute arbitrary code with the privileges of the current user. (b) Several built-in macros can be executed without user confirmation, allowing an attacker to execute arbitrary code with the privileges of the current user; this applies to multiple OpenOffice.org formats. (c) Specially-crafted Java applets can read or create arbitrary files without the users' knowledge, when these applets are embedded in any OpenOffice.org documents. Note that, since OpenOffice.org is Open Source, technical details on these exploits can be easily obtained.
Status: OpenOffice.org confirmed, updates available.
Description: Apple has released a cumulative security update for Mac OS X that fixes multiple security vulnerabilities. The TIFF parsing vulnerability, reported in a previous @RISK Newsletter, has been fixed. This vulnerability allows an attacker to execute malicious code with the privileges of the current user by tricking the user into opening a specially-crafted TIFF image file. This cumulative update also fixes low-severity flaws in OpenLDAP, Apple Filing Protocol, ClamAV software and a locally-exploitable flaw in the LaunchD service-management daemon.
Status: Apple confirmed, updates available.
Description: Several Computer Associates antivirus products contain a format string vulnerability. The vulnerability can be triggered by a "Scan job" containing a format string such as %s in its description field. A remote attacker with the ability to create a scan job can exploit this flaw to execute arbitrary code on the system running the affected products. Note that clients running the AV software are at a risk only from local attackers. The servers running the AV scanning engine via an HTTP interface are only vulnerable if anonymous or authenticated users can submit scan job requests. The technical details for this vulnerability have been publicly posted.
Status: Computer Associates confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Microsoft Windows Live Messenger, a popular instant messaging and voice/video conferencing client for Microsoft Windows, is vulnerable to a buffer overflow. By tricking a user into opening a specially-crafted contact list, an attacker could execute arbitrary code with the privileges of the current user. Note that proof-of-concept code for this vulnerability has been publicly released.
Status: Microsoft has not confirmed, no updates available.
Description: ArGoSoft Mail Server contains an undisclosed remotely-exploitable buffer overflow. By sending specially-crafted traffic (believed to be related to the POP3 DELETE verb), an attacker could trigger this buffer overflow and execute arbitrary code with the privileges of the mail server process - often SYSTEM. Exploit code has been privately published via the Immunity Partners program, and is available to registered users of that program.
Status: Vendor has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Cisco Wireless Control System (WCS) is used to administer Cisco wireless devices from a centralized management point. The Cisco WCS suffers from multiple remotely-exploitable vulnerabilities. (a) Any user with access to the vulnerable system can gain access to the internal database due to a hard coded username and password. These credentials are easily determined. (b) A remote attacker can also read and write arbitrary files on the WCS server via the built-in TFTP server, if the server's root path contains a space character. (c) The login page of the WCS web interface does not properly sanitize user-supplied input, leaving it open to cross-site-scripting attacks. (d) WCS systems are shipped with a default administrator username and password, neither of which is changed by default during installation or initial login. By exploiting these vulnerabilities, any attacker with network access to the WCS system could potentially take complete control of the WCS system, or gain sensitive information about the wireless system (including encryption keys and passwords).
Status: Cisco confirmed, updates available.
Council Site Actions: Only two of the reporting council sites are using the affected software. One site has implemented the available workaround on their affected systems. The other site is still in the process of investing their exposure level.
Description: Hashcash is a system for combating unsolicited email ("spam"), by requiring senders to perform an easily-verified but difficult-to-calculate hash operation. This incurs a cost (in time) for senders, making it more difficult for them to send out mass emails. The reference Hashcash implementation, available on multiple platforms, suffers from a remotely-exploitable buffer overflow. By sending a specially-crafted Hashcash string to a vulnerable server, an attacker could exploit this overflow and execute arbitrary code with the privileges of the mail verification system - often root. Note that simply sending an email to a vulnerable server would be sufficient to trigger this overflow. Since this project is Open Source, technical details for this vulnerability are easily available.
Status: Hashcash confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: XM Easy Personal FTP Server is a commercial FTP server for Microsoft Windows designed for personal use (widely installed in China). The server contains a buffer overflow that can be triggered by submitting an input string greater than 8000 characters. An unauthenticated attacker can execute arbitrary code with the privileges of the FTP server process potentially SYSTEM. Proof-of-concept code for this vulnerability has been posted.
Status: Dxmsoft has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: This vulnerability in the Cisco Wireless Access Point's web interface allows a remote attacker to completely control an affected Access Point. The flaw occurs when the Access Point's authentication method is changed from "Global Password" (default) to "Local User List Only". This configuration change results in revoking any authentication checks for accessing the device.
Status: Cisco confirmed, updates available.
Description: A proof-of-concept exploit has been released for this issue, discussed in a previous @RISK newsletter posting. This exploit results in a denial-of-service condition on vulnerable systems.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5057 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.