Once again, lots of critical Windows flaws. But don't let the Windows flaws make you miss number 5. Winzip is very widely deployed; a vulnerability there can be just as bad as a vulnerability in Windows. Most organization do not have automatic patching capabilities that encompass Winzip, so exploits using the Winzip vulnerability can be much more damaging.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored by SANS 2007 ************************
SANS 2007 (SANS' biggest annual conference, San Diego Mar. 29-Apr. 6) just opened for registration. SANS annual conferences stand out from all other programs because of the multitude of learning opportunities in one place (51 courses and lots of exhibits and BOFs) http://www.sans.org/sans2007/
These comments from past SANS conference attendees will give you a picture of the program:
"Fantastic! Ton's of information. My mind is now Jello- I'll be back next year" Kurt Danielson, National Marrow Donor Program
"My 4th SANS conference! Each time the instructors are top-notch and I come away amazed and educated." Bill Wildprett, Washington State CTED
"Better, more densely packed, value than any other program I've attended...even undergrad and graduate courses." Mark Laughlin, RT Communications
"This conference really taught me the skills I needed to immediately improve the processes where I work." Karissa Truitt, AT&T Government Solutions
If you don't want to wait for March, try these great venues:
Washington DC, Dec. 9 (16 courses) http://www.sans.org/cdieast06/
Orlando Bootcamp, Jan. 13 (25 courses): http://www.sans.org/bootcamp07/
Or San Jose, Phoenix, Prague, or Brisbane (5 or 6 courses)
See complete list of more than 70 upcoming programs in cities around the world at http://www.sans.org/training_events/
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Microsoft Windows Workstation Service, used to support inter-system communication (including file and printer sharing), contains a buffer overflow. By sending a specially-crafted request to the service, an attacker could take complete control of the vulnerable system. Technical details and several proofs-of-concept are available for this vulnerability. Users are advised to block ports ports 139 and 445 on both TCP and UDP at the network perimeter if possible.
Status: Microsoft confirmed, updates available.
Council Site Actions: All reporting council sites are responding to the majority of the Microsoft issues in the same manner. They plan to distribute the patches during their next regularly scheduled system maintenance window. They will expedite the process if exploits are released.
Description: Microsoft XML Core Services, Microsoft's implementation of various XML technologies, contains a remote code execution vulnerability in the XMLHTTP ActiveX control. A malicious web page that instantiates this control could execute arbitrary code with the privileges of the current user. Users can mitigate the impact of this vulnerability by disabling the vulnerable ActiveX controls via Microsoft's "kill bit" mechanism for CLSIDs "88d96a0a-f192-11d4-a65f-0040963251e5" and "88d969c5-f192-11d4-a65f-0040963251e5". This vulnerability is being actively exploited in the wild. This vulnerability was covered in a previous @RISK entry.
Status: Microsoft confirmed, updates available.
Council Site Actions: All reporting council sites are responding to the majority of the Microsoft issues in the same manner. They plan to distribute the patches during their next regularly scheduled system maintenance window. They will expedite the process if exploits are released.
Description: Microsoft Internet Explorer contains two vulnerabilities:
Status: Microsoft confirmed, updates available.
Council Site Actions: All reporting council sites are responding to the majority of the Microsoft issues in the same manner. They plan to distribute the patches during their next regularly scheduled system maintenance window. They will expedite the process if exploits are released.
Description: Microsoft Agent, a set of technologies used to enhance and manipulate the Microsoft Windows user interface, contains a buffer overflow. A specially-crafted web page that instantiates a vulnerable ActiveX control could exploit this vulnerability and execute arbitrary code with the privileges of the current user. It is believed to be also possible to exploit this vulnerability via specially-crafted ".ACF" file. Users can mitigate the impact of this vulnerability by disabling the vulnerable ActiveX controls via Microsoft's "kill bit" mechanisms for CLSIDs "D45FD31B-5C6E-11D1-9EC1-00C04FD7081F", F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5", "4BAC124B-78C8-11D1-B9A8-00C04FD97575", "D45FD31D-5C6E-11D1-9EC1-00C04FD7081F", and "D45FD31E-5C6E-11D1-9EC1-00C04FD7081F".
Status: Microsoft confirmed, updates available.
Council Site Actions: All reporting council sites are responding to the majority of the Microsoft issues in the same manner. They plan to distribute the patches during their next regularly scheduled system maintenance window. They will expedite the process if exploits are released.
Description: WinZip, a popular archive utility for Microsoft Windows, contains a vulnerability in its FileView ActiveX control. A malicious web page that instantiates this control could exploit this vulnerability to execute arbitrary code with the privileges of the current user. Several exploits for this vulnerability are publicly available. Users can mitigate the impact of this vulnerability by disabling the vulnerable ActiveX control via Microsoft's "kill bit" mechanism for CLSID " A09AE68F-B14D-43ED-B713-BA413F034904". It is believed that installing Microsoft Security Update MS06-067 will also mitigate the impact of this vulnerability. There is a similar vulnerability in the Sky Software FileView ActiveX control; while these two controls are believed to be the same, it is unknown how the two vulnerabilities are related.
Status: WinZip confirmed, updates available.
Council Site Actions: most of the council sites are responding to this item. The patch for this item will be included in the rollout of the Microsoft patches. A few sites don't officially support this application and are relying on the user's auto-update feature to set the relevant kill bits.
Description: Microsoft Windows Client Service for NetWare, used to provide access to Novell NetWare-accessible resources, contains multiple vulnerabilities: By sending specially-crafted messages to the service, an attacker could (1) exploit a buffer overflow in the service and execute arbitrary code on the system with SYSTEM privileges and (2) cause the system to stop responding. On Windows 2003 systems, attackers would require authentication to exploit these vulnerabilities. Additionally, the vulnerable service is not installed by default on any version of the vulnerable operating systems. Exploits for this vulnerability are available for Immunity CANVAS.
Status: Microsoft confirmed, updates available.
Council Site Actions: All reporting council sites are responding to the majority of the Microsoft issues in the same manner. They plan to distribute the patches during their next regularly scheduled system maintenance window. They will expedite the process if exploits are released.
Description: Panda ActiveScan, a popular anti-spam and anti-malware solution, contains multiple vulnerabilities in included ActiveX components. A malicious web page that instantiates these ActiveX controls could exploit these vulnerabilities to execute arbitrary code with the privileges of the current user, disclose sensitive information, or reboot the victim's system.
Status: Panda confirmed, updates available.
Description: Adobe Macromedia Flash Player, a popular player for rich web content, contains multiple vulnerabilities. This player is included with Microsoft Windows. These vulnerabilities include remote code execution, denial-of-service conditions, and the execution of arbitrary JavaScript. Note that, by default, Flash content is displayed automatically by most browsers. A fixed version of Flash Player was released by Adobe in September 2006. This issue is specifically for the version of Flash Player included by default with Microsoft Windows. These issues were discussed in a previous @RISK entry.
Status: Microsoft confirmed, updates available.
Council Site Actions: Most of the reporting council sites are responding to this item. They plan to distribute the patches during their next regularly scheduled system maintenance window. A few sites don't officially support this application and are investigating appropriate action, if any.
Description: The NetGear MA521nd5.SYS and WG111v2.SYS device drivers, used to control NetGear wireless cards, contain buffer overflow vulnerabilities. By sending a specially-crafted 802.11 (WiFi) frame to a vulnerable system, an attacker could exploit these buffer overflows and take complete control of the vulnerable system. No authentication is required, and attackers need only be within wireless range of the vulnerable system. These drivers are primarily designed for Microsoft Windows systems, but they are believed to be compatible with the "NdisWrapper" cross-platform driver framework, making it possible to run these drivers under Linux (and possibly other operating systems) on the Intel platform. These vulnerabilities was discovered as part of a project to discover bugs in various operating systems' kernels. Working exploits are available for these vulnerabilities. These vulnerabilities are similar to one discovered for Broadcom wireless device drivers that was documented in a previous issue of @RISK.
Status: NetGear has not confirmed, no updates available.
Description: The D-Link A5AGU.SYS device driver, used to control D-Link wireless cards, contains a buffer overflow vulnerability. By sending a specially-crafted 802.11 (WiFi) frame to a vulnerable system, an attacker could exploit this buffer overflow and take complete control of the vulnerable system. No authentication is required, and attackers need only be within wireless range of the vulnerable system. This driver is primarily designed for Microsoft Windows systems, but it is believed to be compatible with the "NdisWrapper" cross-platform driver framework, making it possible to run this driver under Linux (and possibly other operating systems) on the Intel platform. This vulnerability was discovered as part of a project to discover bugs in various operating systems' kernels. Working exploits are available for this vulnerability. This vulnerability is similar to one discovered for Broadcom wireless device drivers that was documented in a previous issue of @RISK.
Status: D-Link has not confirmed, no updates available. Newer versions of the driver available with some cards appear to resolve this issue. Note that some reports have listed the driver as "ASAGU.SYS".
Description: Marshal MailMarshal, a popular product used to protect against email spam, malware, phishing, and other threats, contains a directory-traversal vulnerability when processing ARJ-compressed archives. Specially-crafted file names within these archives can cause the arbitrary creation of files on the server. It is not possible to delete or replace existing files. This vulnerability could be leveraged execute arbitrary code on the system by placing files in locations where it is known they will be executed. Some technical details for this vulnerability are publicly available.
Status: Marshal confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: PowerDNS, a popular Domain Name System (DNS) server, contains multiple vulnerabilities in its recursor component: (1) By sending a specially-crafted request to the recursor, an attacker could exploit a buffer overflow and potentially execute arbitrary code with the privileges of the PowerDNS recursor process. (2) Sending a specially-crafted request to the recursor can cause the process to exhaust its allocated stack space and crash, leading to a denial-of-service condition. Because this product is open source, technical details for these vulnerabilities can be easily obtained via source code analysis.
Status: PowerDNS confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: AVG Anti-Virus, a popular anti-virus system, contains multiple vulnerabilities. By sending a specially-crafted file through the system, an attacker could exploit these vulnerabilities to execute arbitrary code with the privileges of the anti-virus process. No technical details for these vulnerabilities are currently available.
Status: Grisoft confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Ultraseek, a popular web search solution, contains multiple vulnerabilities. Attackers could exploit these vulnerabilities to bypass web proxy and other restrictions or disclose sensitive information. Authenticated users can also exploit these vulnerabilities to read arbitrary files on the server hosting Ultraseek.
Status: Ultraseek confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5247 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.