Mac OS/X users and Adobe Reader and Adobe Acrobat users both have important patches to install this week. The Mac patches are ready, Adobe should have its patches shortly.
If you (or someone you think has the lab and skills) would like to play a major role in testing Center for Internet Security JAVA based security configuration tools and tools provided by third party vendors that run on multiple UNIX/LINUX and Windows platforms. This is a great opportunity to enhance the reputation of a laboratory your organization might have set up, and CIS will pay for the tests. Email ckreitner@cisecurity.org if you have the lab and the interest.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************* Sponsored By Fiberlink Communications ***************
Do your security and compliance policies reach your mobile workers? Laptops included, can you state with 100% certainty that your data is safe or that your company would pass a SOX or HIPAA audit? This whitepaper examines the unique risks presented by mobility, and best practices for extending compliance and security to your mobile workforce. http://www.sans.org/info/2131
*************************************************************************
SANS 2007 (SANS' biggest annual conference, San Diego Mar. 29-Apr. 6) just opened for registration. SANS annual conferences stand out from all other programs because of the multitude of learning opportunities in one place (51 courses and lots of exhibits and BOFs) http://www.sans.org/sans2007/
"Fantastic! Ton's of information. My mind is now Jello- I'll be back next year" Kurt Danielson, National Marrow Donor Program
"My 4th SANS conference! Each time the instructors are top-notch and I come away amazed and educated." Bill Wildprett, Washington State CTED
"This conference really taught me the skills I needed to immediately improve the processes where I work." Karissa Truitt, AT&T Government Solutions
Or: Washington DC, Dec. 9 (16 courses) http://www.sans.org/cdieast06/
Orlando Bootcamp, Jan. 13 (25 courses): http://www.sans.org/bootcamp07/
Or San Jose, Phoenix, Prague, or Brisbane (5 or 6 courses)
See complete list of more than 70 upcoming programs in cities around the world at http://www.sans.org/training_events/
*************************************************************************
*********************** Sponsored Links: ******************************
1) Webcast: Enterprise-Strength Log Management See the latest log management appliance from ArcSight and hear how Tyson Foods addresses log management. http://www.sans.org/info/2136
2) SANS OnSite bonus seat offer (up to $5,100 value) Bring SANS OnSite to you on your schedule Read more about SANS OnSite & our bonus seat offer! http://www.sans.org/info/2141
3) Disk encryption with SafeGuard® Easy software provides the ultimate in laptop security. http://www.sans.org/info/2146
*************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Apple Mac OS X contains multiple vulnerabilities that can be exploited to compromise a vulnerable system. (1) The AirPort wireless networking subsystem fails to properly handle malformed 802.11 frames. By sending specially-crafted frames, an attacker could exploit this vulnerability and execute arbitrary code with kernel privileges. This issue is similar to one discussed in a previous @RISK newsletter entry.
Status: Apple confirmed, updates available.
Council Site Actions: Three of the responding council sites are using the affected software. One site has already started the process of deploying the patch. Two other sites are relying on Apple's automatic Software Update Facility to deploy the patches.
Description: The AcroPDF ActiveX control, included with Adobe Reader and Adobe Acrobat contains multiple vulnerabilities in its "setPageMode()", "setLayoutMode()", "setNamedDest()", and "LoadFile()" methods. A web page that instantiates this control and calls one of these methods could exploit these vulnerabilities and execute arbitrary code with the privileges of the current user. Users can mitigate the impact of this vulnerability by disabling the affected ActiveX control via Microsoft's "kill bit" mechanism for CLSID "{CA8A9780-280D-11CF-A24D-444553540000}".
Status: Adobe confirmed, no updates available.
Council Site Actions: All responding council sites are waiting on additional information from the vendor. Almost all sites rely on the automatic update feature for their clients.
Description: The Novell Netware Client, used to provide access to Netware services (including shared files and printers) for Microsoft Windows systems contains a buffer overflow in its print provider subsystem. By passing overly long arguments to the "EnumPrinters()" or "OpenPrinter()" functions, an attacker could exploit this buffer overflow and execute arbitrary code with SYSTEM privileges. These functions are accessible without authentication via the "spoolss" named pipe.
Status: Novell confirmed, updates available. As a workaround, users are advised to block the TCP ports 139 and 445 at the network perimeter.
Council Site Actions: Only one of the responding council sites is using the affected software and only in one department on a small number of servers. That department is still investigating the impact of the vulnerability.
Description: Symantec NetBackup PureDisk Remote Office Edition, a popular backup solution, was discovered to install a version of PHP with multiple known vulnerabilities. Attackers could exploit these vulnerabilities to execute arbitrary commands with the privileges of the web server process. The vulnerable web server is configured to run with SSL by default, but, depending on configuration, no authentication may be necessary.
Status: Symantec confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: JBoss, a popular Java-based application server, contains a directory traversal vulnerability. By sending a specially-crafted request to the JBoss management console, an attacker could read, write, or create arbitrary files anywhere in the filesystem where the JBoss server has appropriate privileges. It is possible that this could lead to remote code execution by overwriting or creating files in locations where they will be executed. By default, no authentication is required to access the management console, however, most common configurations require authentication or otherwise limit access.
Status: JBoss confirmed, updates available.
Council Site Actions: Only one responding council site is using the affected software and only on a small number of systems. They will install the Red Hat patches during their next regularly scheduled system maintenance window.
Description: Novell ZENworks, used to automate IT management, contains multiple vulnerabilities. By sending a specially-crafted request to the Collection client or to the Task or Collection servers, an attacker could exploit these vulnerabilities and execute arbitrary code with the privileges of the vulnerable process. The Collection client runs with SYSTEM privileges on Microsoft Windows systems and root privileges on Unix and Unix-like systems.
Status: Novell confirmed, updates available.
Description: 3Com TFTP server and 3CTftpSvc (the server modified to run as a Microsoft Windows service) contain several remotely exploitable buffer overflows. By sending a specially-crafted TFTP request containing an overly long transport mode or filename to a vulnerable server, an attacker could exploit these vulnerabilities and execute arbitrary code with the privileges of the TFTP server process. Technical details and several exploits are available for these vulnerabilities.
Status: 3Com is aware of the issues, no fix is yet available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The idsql32.dll library, used to provide SQL-related services to applications developed with Borland products, contains a buffer overflow. A specially-crafted overlong SQL statement could exploit this buffer overflow and execute arbitrary code with the privileges of the calling application. Note that any application that uses this library is potentially vulnerable.
Status: Borland has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5294 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (Darwin)
iD8DBQFFdH4D+LUG5KFpTkYRAkxuAKCUu+O3FL8fRBo1NE9dmsr8Z8vPFACgifZk cPH1DV08A8uOzeWdJsG7evQ= =fb6S -----END PGP SIGNATURE-----