A lot of security problems this week that the vendors have not confirmed or patched: Safari (Apple OS/X) users are vulnerable to a remote exploit that gives the attacker kernel level privileges. (#1) Even though it would be a little inconvenient, Safari users probably should turn off "Open Safe Files" until Apple acknowledges and fixes the problem. Another buffer overflow was found in CA BrightStor ARCserve. See #3 below to find a list of ports to block. European and Asian organizations that are using ACER computers should set the killbit for the LunchApp.APlunch ActiveX control. (See #2 for instructions) Also, another Netgear wireless card buffer overflow - allowing computers to be taken over even if hey are not connected to a router. (#7) Exploit code has been posted.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** TRAINING QUOTE OF THE WEEK *************************
"This program really taught me the skills I needed to immediately improve the processes where I work." Karissa Truitt, AT&T Government Solutions
Find the full schedule of upcoming SANS training programs at http://www.sans.org/training_events/?ref=1433
************************************************************************
************************ SPONSORED LISTINGS ***************************
1) The SANS Secure Storage & Encryption Summit, December 6-7, provides you with concrete, actionable information you can deploy as soon as you return to work. http://www.sans.org/info/1936
2) Disk encryption with SafeGuard®Easy software provides the ultimate in laptop security. http://www.sans.org/info/1941
*************************************************************************
Part I is compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The "Month of Kernel Bugs (MoKB)" project has discovered a memory corruption flaw in the Mac OS X that can be triggered when the OS X loads a specially crafted "disk image (DMG)" file. The vulnerability can be exploited to execute arbitrary code with kernel privileges. Note that the flaw can be exploited remotely via Safari browser. Safari, in its default configuration, treats disk image files as safe and opens them automatically. Hence, a website containing a malicious disk image file can compromise a Mac OS X client. A proof-of-concept exploit has been publicly posted.
Status: Apple has not confirmed, no updates available. The remote attack vector via Safari can be mitigated by turning off the "Open Safe Files" feature in Safari. However, by turning this feature off, the user would be prompted every time before opening files such as movies and PDFs. Council Site actions: Only one of the responding council sites is using the affected software. They have Safari configured with "Open safe files" turned off. They will deploy they patches when they become available
Description: Acer, a Taiwan based company, is a leading Notebook producer with a dominant presence in the Europe, Asia and Africa (EMEA) market. Acer Notebooks ship with "LunchApp.APlunch" ActiveX control that is marked as safe for scripting. This ActiveX control supports "Run" method that can be used to run any command (with arbitrary parameters) on an Acer notebook remotely. A specially crafted webpage or an HTML email can exploited this flaw to compromise Acer Notebooks. The discoverer has posted a proof-of-concept exploit, and tested the presence of this ActiveX control on an older as well as a more recent Acer model.
Status: Acer has not confirmed. A workaround is to set the kill bit for the LunchApp.APlunch ActiveX control's UUID: D9998BD0-7957-11D2-8FED-00606730D3AA.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Computer Associates BrightStor ARCserve Backup products provide backup services for Windows, NetWare, Linux and UNIX. The products contains a buffer overflow that can be triggered by a specially crafted RPC request to the port 6502/tcp. The flaw can be exploited to execute arbitrary code with SYSTEM privileges. The technical details have not been publicly posted yet.
Status: CA is aware of this issue and is working on a fix. A workaround, in the meanwhile, is to block the requests to port 6502/tcp at the network perimeter. Special Note: CA backup products have been reported to contain multiple vulnerabilities for the past few years. SANS recommends you to block all the ports that are opened by the software at the network perimeter. A list of the ports to block may be found at: http://www.ca.com/at/local/partner/techtalk_mar05_faq.pdf http://supportconnectw.ca.com/public/ca_common_docs/brightstorwinxpsp2matrix.asp
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Real Network Helix DNA Server, a popular media streaming server, contains a heap-based buffer overflow. According to the discoverer, the flaw can be exploited to execute arbitrary code with the privileges of the server process, often root. No technical details about the vulnerability have been publicly released yet. The exploit details are reportedly available to the users of the "vulndisco" pack.
Status: Vendor not confirmed.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: GNU Radius is a server for user authentication and accounting. The server supports SQL databases for authentication and accounting. The Radius server contains a format string vulnerability when it is compiled with a SQL back-end, and the SQL accounting is turned on. The flaw can be exploited by unauthenticated attackers to execute arbitrary code on the server with typically root privileges. The technical details can be extracted by examining the fixed and the vulnerable versions of the server code.
Status: GNU has released version 1.4 to fix this flaw. Note that the FreeBSD and Gentoo Linux versions are vulnerable in their default configuration.
Description: XMPlay, an audio player for Windows systems, contains a stack-based buffer overflow. The overflow can be triggered by a media file (".m3u", ".pls" or ".asx" file extensions) containing an overlong media filename, and exploited to execute arbitrary code with the privileges of the logged-on user. Multiple exploits have been publicly posted.
Status: Vendor has not confirmed, no updates available. The current version on the vendor's site is 3.3.0.5, and the discoverer(s) of this 0-day flaw have reported version 3.3.0.4 to be vulnerable. Hence, it is likely that the current version is not affected.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The NetGear WG311v1 device driver, used to control NetGear wireless cards, contains a buffer overflow vulnerability. By sending a specially-crafted 802.11 (WiFi) frame containing an overly long SSID, an attacker could exploit this buffer overflow and take complete control of the vulnerable system. No authentication is required, and attackers need only be within wireless range of the vulnerable system. Because this vulnerability lies within the processing of probe response packets, the victim does not need to explicitly connect to a malicious wireless network to be exploited. This driver is primarily designed for Microsoft Windows systems, but it is believed to be compatible with the "NdisWrapper" cross-platform driver framework, making it possible to run this driver under Linux (and possibly other operating systems) on the Intel platform. This vulnerability was discovered as part of a project to discover bugs in various operating systems' kernels. A working exploit is available for this vulnerability. This vulnerability is similar to several discovered for other NetGear wireless device drivers that were documented in a previous issue of @RISK.
Status: NetGear has not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5283 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.