Another critical PowerPoint vulnerability being exploited, another Internet Explorer vulnerability, more PHP application file include vulnerabilities, an Informix vulnerability, and more buffer overflows in Symantec/Veritas Backup Exec.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** Sponsored By Attachmate *************************
Companies struggle to implement policy compliance programs that satisfy regulatory and audit-related requirements, protect the integrity of critical information and prevent the loss of sensitive data. Unfortunately, compliance investments may not be adequately offset by effective risk management or measurable cost reduction. Learn how to achieve better compliance and risk management results with NetIQ Solutions from Attachmate.
http://www.sans.org/info.php?id=1313
*************************************************************************
How Good Are The Courses at SANS Network Security 2006? Ask the alumni.
++ "I have attended courses by several of SANS rivals, and SANS blew them away." - Alton Thompson, US Marines
++ "This is the only conference/training I've ever attended at which I learned techniques and found tools I could apply immediately." - Dwight Leo, Defense Logistics Agency, DLA
++ "This program provided the opportunity to learn from many of the people who are defining the future direction of information technology" - - Larry Anderson, Computer Sciences Corp. ++ "The SANS classes have been uniformly excellent. To learn as much through traditional classes would have entailed weeks away from work." - David Ritch, Department of Defense
SANS best instructors all come together at Network Security 2006 in Las Vegas, October 1-9. 37 immersion courses; big exposition; free evening classes, much more . Early registration deadline is Friday, August 18. See: http://www.sans.org/ns2006/caag.php
*************************************************************************
************************ Sponsored Links: *****************************
1) Free software! Patch & Spyware Management! A complete security solution from Shavlik. http://www.sans.org/info.php?id=1314
*************************************************************************
Part I is compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: A remote code execution vulnerability, which could either be different from the one patched by MS06-048 or a variation of it, has been reported in Microsoft PowerPoint. The flaw is being exploited by some Trojans in the wild. The technical details about the vulnerability have not been publicly posted yet.
Status: Microsoft has not confirmed, no updates available. Users should be advised to refrain from opening PowerPoint from unknown sources.
Description: The IBM eGatherer ActiveX component is installed on all IBM workstations and laptops running Microsoft Windows, and is used to gather system information for IBM support technicians. This ActiveX control is digitally signed by the IBM and marked as "safe for scripting". The ActiveX component contains a remotely-exploitable buffer overflow. A specially-crafted web page that instantiates this component can exploit the buffer overflow that allows attackers to execute arbitrary code with the privileges of the current user. The technical details and a simple proof-of-concept have been publicly posted. Note that users who do not have these ActiveX controls on their systems may be tricked into installing the controls. The controls may even be silently installed if the user has previously selected an option to trust all the code from IBM.
Status: IBM confirmed, updates available. Users may be able to mitigate the impact of this vulnerability by disabling the component via Microsoft's "killbit" mechanism for CLSID "{74FFE28D-2378-11D5-990C-006094235084}".
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Informix, a popular enterprise database engine distributed by IBM, contains multiple remotely-exploitable vulnerabilities. These vulnerabilities include arbitrary remote code execution, arbitrary file access, password disclosure, and denial-of-service issues. For all of these vulnerabilities, an attacker would need an authenticated access to the database. Note that some of these flaws could be exploited via HTTP when Informix is being used as a back-end database, and the front-end web scripts contain SQL injection vulnerabilities. The technical details and proof-of-concept exploits have been posted.
Status: IBM confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Internet Explorer reportedly contains heap-memory corruption vulnerabilities while instantiating certain COM objects as ActiveX controls. A specially-crafted web page that instantiates these COM objects could trigger the memory corruption, and potentially execute arbitrary code on a client system. Note that re-usable exploit code to leverage these flaws is publicly available. Flaws similar to these have been widely exploited in the past.
Status: Microsoft has not confirmed, no updates available. Users may be able to mitigate the impact of these vulnerabilities by disabling the components via Microsoft's "killbit" mechanism for the following CLSIDs: "{6E3197A3-BBC3-11D4-84C0-00C04F7A06E5}", "{BE4191FB-59EF-4825-AEFC-109727951E42}", "{233A9694-667E-11d1-9DFB-006097D50408}", and "{E2E9CAE6-1E7B-4B8E-BABD-E9BF6292AC29}".
Council Site Actions: All of the responding council sites are waiting for additional information and a patch from the vendor.
Description: Veritas Backup Exec, a popular enterprise backup solution, contains multiple remotely-exploitable RPC buffer overflows. By sending specially-crafted RPC requests to the vulnerable system, an unauthenticated attacker could exploit these overflows and execute arbitrary code with the privileges of the Backup Exec process. Both the Windows backup server and agent are affected. No technical details for these vulnerabilities have been publicly posted.
Status: Veritas confirmed, updates available.
Council Site Actions: Only one of the responding council sites is using the affected software and they are in the process of distributing the patch.
Description: HP OpenView Storage Data Protector, a popular enterprise storage management and monitoring solution, contains a remote code execution vulnerability. Technical details for this vulnerability have not been published, but HP has confirmed that remote, unauthenticated users can exploit this vulnerability to execute arbitrary code with the privileges of the Open View process.
Status: HP confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Microsoft Windows contains a remotely-exploitable vulnerability in the SMB service that results in a denial-of-service condition. By sending a specially-crafted SMB request to a vulnerable system, an attacker can crash a vulnerable system. It is currently believed that this vulnerability cannot be used to execute arbitrary code. Note that this vulnerability is distinct from the one patched in the Microsoft Security Bulletin MS06-035. Technical details and a simple proof-of-concept for this vulnerability have been publicly posted.
Status: No official Microsoft confirmation, no updates available. Users are advised to block TCP and UDP ports 445 and 139 at the network perimeter.
Council Site Actions: All of the responding council sites are waiting on additional information from the vendor and a patch.
Description: The following popular software packages reportedly contain PHP remote file include vulnerabilities: Mambo reporter, com_lm, and Peoplebook components; Joomla webring component; XMB Forum; Calendarix calendaring suite and the Zen Cart shopping cart software. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the web server hosting the vulnerable software packages. The postings show how to craft the malicious HTTP requests to exploit the flaws. Note that all of these vulnerabilities, with the exception of the XMB vulnerability, require that the PHP "register_globals" option be enabled. The "register_globals" option is disabled by default in PHP version 4.2.0 and later. Users are advised to disable the "register_globals" option if possible, and run web server software under a low-privilege account. Status: Mambo has not confirmed, no updates available. Joomla has not confirmed, no updates available. XMB has not confirmed, no updates available. Calendarix has not confirmed, no updates available. Zen Cart has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: ImageMagick, a popular suite of open source image manipulation and viewing tools, contains a heap overflow vulnerability. A specially-crafted Silicon Graphics Image file could trigger this heap overflow and execute arbitrary code with the privileges of the current user. Technical details and a simple proof-of-concept for this vulnerability have been publicly posted. Note that ImageMagick is installed by default on many Unix, Unix-like, and Linux systems.
Status: ImageMagick confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary. References; Posting by Damian Put (includes technical details and proof-of-concept image) http://archives.neohapsis.com/archives/bugtraq/2006-08/0290.html Silicon Graphics Image File Format Specification ftp://ftp.sgi.com/graphics/SGIIMAGESPEC ImageMagick Home Page http://www.imagemagick.com SecurityFocus BID http://www.securityfocus.com/bid/19507
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5133 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.