Last week was quiet for most sites, but Firefox and Mozilla had substantial vulnerabilities announced as did Sygate Management Server, a security management system from Symantec. In addition, details that can be used to exploit elements of Oracle and Cisco products were published last week.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** SPONSORED BY SANS TRAINING **************************
World-Class Security Training Opportunities in the Next Few Weeks
SANS 2006 in Orlando (Feb 24- March 4) 36 tracks of extraordinary training - the best instructors in the world, and a great security tools exposition. Lots of people are bringing their families to Orlando to join them at the end of the program. Plus: San Francisco, Phoenix, St. Louis, Brisbane, Tokyo, Ottawa
Or you can take SANS training anytime, anywhere with the new SANS On Demand. Details on these and other programs: www.sans.org
And the SCADA Security Summit is 76% full. If you want to attend, register this week. An amazing program. If you have any responsibility for control systems in industry or utilities - don't miss this program. http://www.sans.org/scadasummit06/
*************************************************************************
******************** SPONSORED LINKS *********************************
1) Free Webcast this week - WhatWorks in Intrusion Prevention Systems: "Guarding Sensitive Data with Financial Profiles Inc." Wednesday, February 08 at 1:00 PM EST (1800 UTC/GMT) http://www.sans.org/info.php?id=1014
2) Get a Free Online Demo Now! SANS On Demand - Online Security Training and Assessments http://www.sans.org/info.php?id=1015
***********************************************************************
Part I for this issue has been compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Winamp media player contains another code execution vulnerability in addition to the one reported in the previous @RISK newsletter. This flaw can be triggered by a specially crafted playlist file (".pls" or ".m3u" extension) that contains a long ".wma" filename. A malicious webpage or an HTML email can exploit this flaw to execute arbitrary code on a user's system. Systems configured with Winamp as the default player are at a greater risk of being compromised.
Status: Winamp has released version 5.13 that contains a fix for this as well as last week's flaw.
Council Site Actions: This application is not officially supported at the reporting council sites. However, a few sites plan to notify their users and advise them to patch their systems.
Description: Firefox browser and Thunderbird email client contain multiple vulnerabilities. The flaws exist in the garbage collection routine for the Javascript engine, XML parsing, E4X/SVG/Canvas features, "XULDocument.persist" function, QueryInterface" method of the Location and Navigator objects, and dynamic style handling. A malicious webpage or an HTML email may exploit these flaws to execute arbitrary code. The technical details required to craft exploit code are included in the Mozilla bug repository.
Council Site Actions: Most of the council sites commented that Mozilla is not a support application. However, they informed their users of the problem and advised them to patch or upgrade their systems immediately. Some users are set up for automatic updates.
Description: Symantec Sygate Management server, an enterprise product, is used to push security policies as well as software updates to workstations and servers. The SMS HTTP server contains a SQL injection vulnerability in its authentication servlet. An unauthenticated attacker can exploit this flaw to overwrite passwords for any SMS accounts (including Administrator) via a crafted HTTP request, and obtain control over the SMS server. Gaining access to the SMS server can be further leveraged to compromise the managed systems resulting in an enterprise wide compromise. The technical details required to craft the malicious HTTP request have not been posted.
Status: Symantec has released fixes for the SMS server. Access to the SMS server should be blocked from the Internet.
Description: eXchange POP3 server is used to retrieve mail from users' multiple POP accounts, and deliver them to a Microsoft Exchange server. The eXchange POP3 server also contains an SMTP server, which is vulnerable to a buffer overflow. The flaw can be triggered by an overlong "RCPT TO" command, and exploited to execute arbitrary code with eXchange server's privileges. An exploit has been publicly posted.
Status: Vendor confirmed, a fixed build 060125 is available.
Description: The Communigate Pro is a multi-platform server that supports multiple protocols such as LDAP, RADIUS, IMAP, SIP, OP, HTTP etc. The LDAP component contains multiple vulnerabilities that can be exploited by an unauthenticated attacker to crash the LDAP server and possibly execute arbitrary code. The test suite used for discovering the bugs is not publicly available.
Status: The vendor has released a new version 5.07 with the fix.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4857 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.