No major products are on the critical list this week. So while you have a possibly more relaxed week, take the opportunity to get all the programmers in your organization to test their secure programming skills using the free sample tests at www.sans-ssi.org Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************* Sponsored By ArcSight, Inc. ***********************
Free Whitepaper: "Selecting a SIM Solution for Compliance".
Meeting compliance regulations doesn't mean sacrificing your security budget. Discover the best practices - based on actual customer experiences - that should be an integral part of your evaluation process when assessing a SIM. Brought to you by ArcSight, the leader in security, compliance and insider threat. http://www.sans.org/info/5091
*************************************************************************
SANSFIRE 07 in Washington DC Features the Internet Storm Center Experts
No one knows the newest attacks better than the Internet Storm center Incident Handlers, and they are sharing the newest attacks and defenses in evening sessions during SANSFIRE in Washington DC, July 25-August 7, 2007. Anyone who attends a course can also attend Internet Storm Center Threat Updates. For a list of courses http://www.sans.org/sansfire07/
If you cannot come to Washington or can't wait that long, SANS award winning security training is available in more than 70 cities in nine countries just in the next four months. Better still, you can schedule SANS training on-site or even take it live online or on demand.
*Complete schedule: http://www.sans.org/training/bylocation/index_all.php
*SANS courses on site at your facility: http://www.sans.org/onsite/ *************************************************************************
************************ Sponsored Links: ******************************
a) Security professionals focus on fighting the most common data threats - - Encryption Summit, April 23-25. http://www.sans.org/info/5096
b) Protect your company from phishing expeditions. New FREE report has the facts. http://www.sans.org/info/5101
c) Test your secure programming skills. Sample tests. Blueprints. http:/www.sans-ssi.org *************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Helix DNA Server is a popular open source media streaming server based on code from Real. The server contains a heap-based buffer overflow that can be triggered by sending an overlong "LoadTestPassword" header in the "DESCRIBE" command. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the Helix Server process, often root or SYSTEM. Full technical details and a working exploit are publicly available for this vulnerability.
Status: Helix confirmed, updates available.
Description: Atrium MERCUR Messaging, a popular mail and messaging suite for Microsoft Windows, contains multiple vulnerabilities: (a) A specially crafted SUBSCRIBE command, sent to the IMAP server, could allow an authenticated attacker to exploit a stack-based buffer overflow, and execute arbitrary code with the privileges of the server process. A working exploit and technical details are available for this vulnerability. Authentication is required to exploit this flaw. (b) A specially-crafted NTLM authentication request sent to the IMAP server could allow an attacker to exploit a stack-based buffer overflow and execute arbitrary code with the privileges of the server process. Note that no authentication is necessary for this vulnerability. A simple proof-of-concept is publicly available, and a working exploit is available to members of Immunity's partners program.
Status: Atrium has not confirmed, no updates available.
Description: OpenOffice.org, a popular open source office suite included with many Unix, Unix-like, and Linux systems, contains multiple vulnerabilities: (a) A specially-crafted Word Perfect document could trigger several integer overflows in the "LibWPD" library, used to parse Word Perfect files. Successfully exploiting these integer overflows could allow an attacker to execute arbitrary code with the privileges of the current user. Note that "LibWPD" is used internally by OpenOffice.org and by other open source word processors, such as AbiWord. (b) A specially crafted link in an OpenOffice.org document could execute arbitrary commands when the link in clicked by a user. (c) A specially crafted OpenOffice.org document could trigger a buffer overflow in the "Calc spreadsheet" portion of the application. Successfully exploiting this buffer overflow could allow the attacker to execute arbitrary code with the privileges of the current user. Note that since all of the affected code is open source, technical details are available via source code analysis. Depending on operating system and configuration, malicious files may be opened without prompting, after downloading.
Status: OpenOffice.org confirmed, updates available.
Description: Asterisk, a popular open source Voice-over-IP (VoIP) system contains multiple denial-of-service vulnerabilities. A specially-crafted Session Initiation Protocol (SIP) request could trigger these vulnerabilities. Note that this could deny legitimate users access to the phone system. The technical details required to trigger the DoS have been publicly posted.
Status: Asterisk confirmed, updates available.
Description: The IASystemInfo.DLL ActiveX control, installed along with several popular multimedia applications, contains a buffer overflow vulnerability. A malicious web page that instantiates this control and passes an "ApplicationType" argument longer than 260 bytes could trigger this buffer overflow and execute arbitrary code with the privileges of the current user. Note that reusable exploit code for arbitrary ActiveX controls exists and is easily adaptable to this control. Some technical details for this control are publicly available.
Status: InterActual has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the control via Microsoft's "kill bit" mechanism, using the following CLSIDs: "B727C210-2022-11D4-B2C6-0050DA1BD906", "B727C212-2022-11D4-B2C6-0050DA1BD906", "B727C217-2022-11D4-B2C6-0050DA1BD906", "B727C219-2022-11D4-B2C6-0050DA1BD906", "B727C21B-2022-11D4-B2C6-0050DA1BD906", "B727C21D-2022-11D4-B2C6-0050DA1BD906", "B727C220-2022-11D4-B2C6-0050DA1BD906", and "B727C222-2022-11D4-B2C6-0050DA1BD906".
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5406 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.