Apple QuickTime, for both Windows and Mac/OS provides a new vector for attackers to use - because once installed, it opens QuickTime content in web pages (malicious or not) without even asking the user for permission. Novell NetMail also has a newly discovered root compromise vulnerability.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored Link: *****************************
1) Two Summits, one on Log Management and one on Laptop Encryption - What to buy, how to avoid the career damaging mistakes - featuring users sharing lessons learned and vendors of the products that should be on your short list. Encryption: http://www.sans.org/encryptionsummit07/ Log Management: http://www.sans.org/logmgtsummit07/
2) SANS Tool Talk Webcast "If I'd Only Known: Benefits of Advanced Correlation" sponsored by ArcSight. Register Today and Listen to the archive! http://www.sans.org/info/4441
*************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Apple QuickTime, Apple's streaming media framework, contains multiple vulnerabilities in handling various file formats. Certain specially-crafted image and movie files could exploit these vulnerabilities, and execute arbitrary code with the privileges of the QuickTime user. Note that QuickTime content in web pages is opened by default if the QuickTime player is installed, allowing malicious web pages to exploit this vulnerability. Some technical details for these vulnerabilities are publicly available. These issues affect both the Microsoft Windows and Mac OS X versions of QuickTime.
Status: Apple confirmed, updates available. The updates are automatically available via Apple's Software Update facility.
Council Site Actions: Two of the responding council sites are using the affected software. One site has already deployed the updates. The other site does not install this software by default, but said that the automatic update feature should update systems for those who have installed the software on their own.
Description: Novell Netmail, a popular enterprise mail solution, contains a stack-based buffer overflow in its web-based administration interface. The overflow can be triggered by an overlong username (longer than 213 bytes), and successfully exploited to execute arbitrary code with the privileges of the web administration process. Note that the web interface runs on TCP port 89 and is enabled by default. Technical details for this vulnerability are publicly available. Users are advised to block access to TCP port 89 at the network perimeter, if possible.
Status: Novell confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Asterisk, a popular open source Voice-over-IP (VoIP) solution, contains a denial-of-service condition. A specially-crafted Session Initiation Protocol (SIP) request to a vulnerable Asterisk server could trigger this condition. Successfully exploiting this condition could lead to phone system outages or other phone system instabilities. A working exploit and technical details for this vulnerability are publicly available.
Status: Asterisk confirmed, updates available.
Description: Ipswitch Collaboration Suite and Ipswitch IMail, two popular mail and groupware products for Microsoft Windows, contain multiple vulnerabilities. These vulnerabilities exist in three ActiveX components utilized by the software: "IMAILAPILib.IMailServer", "IMAILAPILib.IMailLDAPService", and "IMAILAPILib.IMailUserCollection". A malicious web page that instantiates these components could exploit buffer overflows to execute arbitrary code with the privileges of the current user. These components will likely be installed only on the system running the mail or collaboration server. Note that some technical details about these vulnerabilities are publicly available, and that reusable exploit code for ActiveX components exists.
Status: Ipswitch confirmed, updates available. Users can mitigate the impact of these vulnerabilities by disabling the vulnerable controls via Microsoft's "kill bit" mechanism for the following CLSIDs: "302397C2-8501-11D4-8D29-00010245C51E", "302397D6-8501-11D4-8D29-00010245C51E", "889558D4-CE9A-4A1B-B88A-AF7774A80E25".
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Browsers based on the Mozilla code base, including Mozilla Firefox and the browser component of Mozilla SeaMonkey, contain an arbitrary JavaScript execution vulnerability. A malicious web page containing a specially-crafted "IMG" tag with a "javascript:" URL in its "SRC" attribute could execute arbitrary JavaScript without the user's knowledge. Note that the script code is executed even if the user has disabled JavaScript in the browser's settings. Note that this vulnerability was introduced as a side effect of the fix for Mozilla vulnerability MFSA 2006-72; only browsers that have been patched against that vulnerability are vulnerable.
Status: Mozilla confirmed, updates available.
Council Site Actions: Two if the responding council sites are using the affected software. One site has already deployed the updates. The other site does not install this software by default, but said that automatic update feature should update for those who have installed it on their own.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5397 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.