This will be a bad week for cyber defenders; the vulnerabilities that will be announced this week will affect a very large proportion of business executives. Last week's critical vulnerabilities included an unpatched, important vulnerability in Apple Safari and a very critical vulnerability in Firefox that demands immediate upgrading.
Now some good news: you still have nearly three weeks to get the early registration discounts for SANS Network Security (October 1-8) in Las Vegas and for the SCADA Security Summit (Sept. 28-30) with the free courses sponsored by DHS and DoE. Network Security at a glance: http://www.sans.org/ns2006/caag.php SCAD Security Summit: http://www.sans.org/scadasummit_fall06/
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored Link: ******************************
1) Minimize the Impact of MS Patch Tuesday: Shavlik Security Webinar, August 9th, Register here:
http://www.sans.org/info.php?id=1244
*************************************************************************
Part I is compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Applications based on the Mozilla web browser technology, including the Mozilla Firefox web browser, the Mozilla SeaMonkey suite (often referred to as simply "Mozilla"), and the Mozilla Thunderbird email client, contain multiple remotely-exploitable vulnerabilities. A malicious webpage or an HTML email could exploit some of these vulnerabilities to execute arbitrary code on a user's system.
Status: Mozilla Foundation confirmed, updates released. . As a general workaround, if possible, users should disable JavaScript in email messages and web pages.
Council Site Actions: Mozilla is in use at a number of the council sites, but is not yet supported at all sites. Those sites that do support Mozilla are either applying the updates manually or relying on the auto-update feature. Site that do note provide central support will rely on the auto-update feature and/or end users to apply updates.
Description: Apple's Safari web browser, installed by default on all recent versions of Mac OS X, contains a remotely-exploitable code execution vulnerability. The problem arises because Safari fails to properly handle "<script>" tags embedded in "<div>" tags. This causes an invalid object pointer dereference that can be exploited to execute arbitrary code with the privileges of the current user. Technical details for this vulnerability have been posted. This vulnerability was disclosed by a researcher who released a new browser vulnerability every day for the month of July.
Status: Apple has not confirmed, no updates available.
Description: The Apache HTTP daemon (httpd) contains a remotely-exploitable buffer overflow in the "mod_rewrite" URL rewriting module, which is included in most Apache httpd distributions. This module is used to perform transformations on URLs passed to the server according to administrator-supplied "rewrite rules". The module contains an off-by-one buffer overflow when parsing LDAP URLs. If the rewrite rules are structured such that an attacker can supply the initial portion of the URL (for example, a rewrite rule begins with an "$1"), an attacker could exploit this buffer overflow and execute arbitrary code with the privileges of the server process. Rewrite rules that affect the latter portions of the URL, or that contain the "Forbidden", "Gone", or "NoEscape" options are not affected. Additionally, if the httpd binary was compiled with any form of automatic or explicit stack padding, the binary is not vulnerable. Since Apache is Open Source software, technical details can easily be obtained by examining the source code.
Status: Apache confirmed, updates available.
Description: eIQNetworks Enterprise Security Analyzer, a popular network security analysis application, contains multiple remotely-exploitable vulnerabilities. Failure to properly parse user-supplied commands and log data results in multiple buffer overflow vulnerabilities. Most of these vulnerabilities allow attackers to gain complete control of the affected system. No authentication is required to exploit these vulnerabilities. Note that proofs-of-concept and technical details for these vulnerabilities have been publicly posted. This software is often embedded in other applications, and may be identified by a different name. The list of affected products above includes the common applications that are affected.
Status: eIQNetworks confirmed, updates available. As a workaround users are advised to block TCP ports 10617, 10628 at the network perimeter.
Description: AGEphone, a popular SIP-based VoIP (Voice-over-Internet Protocol) softphone for Windows systems contains a remotely-exploitable buffer overflow. By sending a specially crafted SIP header containing an overlong version or identifier string to an AGEphone process, an attacker could execute arbitrary code with the privileges of the current user. No authentication would be required to exploit this vulnerability. Users are advised to block port 5060 (TCP and UDP) at the network perimeter, if possible. Technical details and a proof-of-concept have been publicly posted.
Status: AGEphone confirmed, updates available.
Description: The following popular software packages reportedly contain PHP remote file include vulnerabilities: Vanilla CMS, PHP Live!, the Mambo MultiBanners component, and the Mambo MoSpray component. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the webserver hosting the vulnerable software packages. The postings show how to craft the malicious HTTP requests to exploit the flaws. All of these vulnerabilities require that the PHP "register_globals" option be enabled. The "register_globals" option is disabled by default in PHP version 4.2.0 and later. However, many sites enable this option. Users are advised to disable the "register_globals" option if possible, and run web server software under a low-privilege account. Status: Vanilla CMS has not confirmed, no updates available. PHP Live! has not confirmed, no updates available. Mambo has not confirmed, no updates available.
Description: ISS's RealSecure and BlackICE network intrusion detection and prevention devices and software suffer from a remotely-exploitable denial-of-service attack when detecting and filtering attacks against Microsoft's Mailslot implementation (outlined in a previous @RISK entry). By sending a specially-crafted packet through a network segment monitored by a RealSecure or BlackICE sensor, an attacker could cause the sensor, and possibly the system running the sensor, to stop responding. Rebooting is required to restore normal operation.
Status: ISS confirmed, updates available.
Description: TippingPoint intrusion prevention devices are vulnerable to a remotely-exploitable inspection-bypass vulnerability. By sending a specially-crafted packet to a network segment monitored by a TippingPoint device, an attacker can cause that device to fallback to layer 2 mode, in which the device will forward all traffic without further inspection. Rebooting is required to restore normal operation.
Status: TippingPoint confirmed, updates available.
Description: OpenCMS, a popular open source content management system, contains multiple vulnerabilities. Due to a failure to properly validate user credentials, authenticated attackers can perform normally-forbidden actions, including: viewing and downloading arbitrary system files, adding web users, viewing application source code, importing and exporting data from the database, and sending arbitrary JavaScript files to other users. Other actions may be possible. Technical details for these vulnerabilities have been publicly posted.
Status: OpenCMS confirmed, updates available.
Description: IKE, the Internet Key Exchange Protocol, is used to exchange shared secret information between hosts to enable the use of IPsec and related protocols. IKE is generally used as a component in VPN solutions, but can be used whenever secure key exchange is required. Due to the stateless nature of the IKE version 1 protocol, it is possible for an attacker to exhaust all available IKE resources on a target system, preventing other users from using the IKE facilities of the target system. Note that individual implementations may attempt to protect systems from this vulnerability, but the protocol specification itself allows for this vulnerability. Users are advised to ask their vendor if their systems use IKE version 1. Users of Cisco's IOS can mitigate the impact of this vulnerability by implementing the "Call Admission Control for IKE" IOS feature.
Status: Cisco has provided workaround information for IOS-based devices; other IKE implementations may have additional workarounds.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5089 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.