@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************** Sponsored By SANS **************************
Join other security professionals at the SANS Encryption Summit April 23-25 and benefit from an in-depth program aimed at getting you the information you need to protect your sensitive data. http://www.sans.org/info/5471
************************************************************************* SANSFIRE 07 in Washington DC Features the Internet Storm Center Experts
No one knows the newest attacks better than the Internet Storm Center Incident Handlers, and they are sharing the newest attacks and defenses in evening sessions during SANSFIRE in Washington DC, July 25-August 7, 2007. Anyone who attends a course can also attend Internet Storm Center Threat Updates. For a list of courses http://www.sans.org/sansfire07/
If you cannot come to Washington or cant wait that long, SANS award winning security training is available in more than 70 cities in nine countries just in the next four months. Better still, you can schedule SANS training on-site or even take it live online or on demand. *Complete schedule: http://www.sans.org/training/bylocation/index_all.php *SANS courses on site at your facility: http://www.sans.org/onsite/ *************************************************************************
************************ Sponsored Links: ******************************
1) Take the 2007 Log Management Survey and be eligible to win a Nintendo Wii system. Click here to take the survey. http://www.sans.org/info/5476
2) CALLING ALL SANS ALUMNI!!! Please visit http://www.sans.org/info/5481 to get a 15% discount off any SANS OnDemand course, offer ends April 18th. If you have any questions please email ondemand@sans.org.
*************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft has issued a security update (MS07-017) earlier than its monthly patching schedule for the 0-day flaw in the Windows' handling of animated cursor files. This flaw is being exploited in the wild. For more details about this 0-day, please refer to the previous issue of the @RISK newsletter. In addition to the ANI issues, the MS07-017 patch also addresses several locally exploitable vulnerabilities and a remote denial of service vulnerability in the Windows GDI graphical subsystem. The remote DoS can be triggered by a specially-crafted Windows Metafile (WMF) image file, and exploited to cause a system hang or reboot.
Status: Microsoft confirmed, updates available. Please ensure that the patch is applied to all the affected systems. Problems after installing MS07-017 patch: On Windows XP SP2, some 3rd party applications may not start. Microsoft has provided mitigation steps here: http://support.microsoft.com/kb/925902 and http://support.microsoft.com/kb/935448/
Council Site Actions: All of the responding council sites are taking action. One site has already pushed the updates. The other sites are depolying on an expedited basis. One site noted they sent out an organization-wide notice explaining the threat and asking users to verify that the patch installs.
Description: The Audio Conferencing ActiveX control shipped by default with Yahoo! Messenger contains a buffer overflow vulnerability. A malicious web page that instantiates this control, and specifies large values for its "socksHostname" and "hostname" properties could exploit this buffer overflow to execute arbitrary code with the privileges of the current user. Note that some technical details are publicly available for this vulnerability.
Status: Yahoo! confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary. One site commented that the block Yahoo Messenger.
Description: Several Kaspersky security products contain multiple vulnerabilities:
Status: Kaspersky confirmed, updates available. Users can mitigate the impact of issue #2 by disabling the affected controls via Microsoft's "kill bit" mechanism. The affected CLSIDs are "D9EC22E7-1A86-4F7C-8940-0303AE5D6756" and "BA61606B-258C-4021-AD27-E07A3F3B91DB".
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: AOL Nullsoft Winamp, a popular media player for Microsoft Windows, contains multiple vulnerabilities: (a) Failure to properly process malformed Matlab Sound File files can trigger a memory corruption vulnerability. This flaw stems from code in the "libsndfile.dll" library; it is possible that any application using this library is vulnerable. (b) The "in_mod.dll" Winamp plugin contains memory corruption vulnerabilities in the processing of "S3M" and "IT" files. Specially-crafted S3M or IT files could trigger these vulnerabilities. Successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that, depending on configuration, the vulnerable file types could be opened without prompting by Winamp. Full technical details and a proof-of-concept are publicly available for these vulnerabilities.
Status: AOL has not confirmed, no updates available.
Description: Symantec Enterprise Security Manager is designed to automate the discovery of vulnerabilities and deviations in the security policies of e-business applications and servers. The product installs agents on the servers that are being monitored. This agent contains a vulnerability in processing "upgrade" requests. The agent does not verify that the upgrade request has been issued by a trusted source. As a result, an attacker can directly request the agent to perform an upgrade and thereby install any malicious program such as a backdoor on the agent system. Note that the agent runs with SYSTEM/root privileges. Hence, the vulnerability can be exploited to compromise critical servers in an enterprise. In order to exploit the flaw, an attacker would require the knowledge of the protocol between the agent and the ESM manager.
Status: Symantec has released version 6.5.3 to fix this issue. The ESM manager needs to be upgraded to version 6.5.3 as well to work with the 6.5.3 agent. A possible workaround is to block the ports 5601/udp and 5601/tcp at the network perimeter.
Description: MIT Kerberos, the reference implementation of the Kerberos authentication protocol, contains multiple vulnerabilities: (a) Telnet servers that use Kerberos for authentication contain an authentication bypass vulnerability. By passing a username beginning with "-e", an attacker could bypass all authentication and login as arbitrary users. (b) The Kerberos Administration Daemon, which runs on the Kerberos master server, contains a buffer overflow vulnerability. A specially-crafted Kerberos request could trigger this buffer overflow and execute arbitrary code with the privileges of the Kerberos Administration Daemon process (often SYSTEM/root). (c) The Kerberos Administration Daemon contains a double free vulnerability. An authenticated attacker could trigger this vulnerability to execute arbitrary code with the privileges of the administrative process (often SYSTEM/root). Note that, since the master server usually contains authentication information for the entire Kerberos domain, compromising this server generally leads to compromise of other systems in the same authentication domain. The technical details are available for these vulnerabilities. MIT Kerberos is used by a wide variety of operating systems, including various UNIX and UNIX-like operating systems. Kerberos authentication may not be enabled by default on affected systems, lessening the impact of attacks.
Status: MIT confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: HP Mercury Quality Center is a web-based application that facilitates software quality testing. Users of this application must install the "SPIDERLib" ActiveX control. This control contains a buffer overflow in its handling of its "ProgColor" property. A malicious web page that instantiates this control could exploit this buffer overflow to execute arbitrary code with the privileges of the current user. Some technical details for this vulnerability are publicly available.
Status: HP confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism for CLSID "98C53984-8BF8-4D11-9B1C-C324FCA9CADE". However, doing so will prevent legitimate use of the affected application.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: WordPress, a popular cross-platform blogging suite, contains an SQL injection vulnerability. An authenticated attacker with access to a WordPress "contributor", "author", or "editor" account could trigger this vulnerability. By successfully exploiting this vulnerability an attacker could execute arbitrary SQL commands against the backend WordPress database and read arbitrary files with the privileges of the database process. This vulnerability is exploitable via WordPress's XML-RPC interface. A working exploit and full technical details are publicly available for this vulnerability. Note that WordPress is often installed by hosting providers as a service to their users; these users will often have the necessary credentials to exploit this vulnerability.
Status: WordPress has not confirmed, no updates available.
Description: The SAP RFC library, users by most SAP applications to interface with the main SAP system, contains multiple vulnerabilities: (a) The "RFC_START_GUI" and "SYSTEM_CREATE_INSTANCE" functions contain buffer overflow vulnerabilities. Successfully exploiting these buffer overflows would allow arbitrary code execution with the privileges of the affected process. No further technical details for these vulnerabilities are publicly available. (b) The "RFC_START_PROGRAM" function fails to properly validate certain requests. A specially-crafted request to this function could bypass execution restrictions or trigger a buffer overflow, allowing for arbitrary code execution with the privileges of the affected process. Additionally, information disclosure and denial-of-service vulnerabilities have been discovered in the SAP RFC library.
Status: SAP confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: SolidWorks is a popular Computer Aided Design (CAD) package for Microsoft Windows. Its "sldmidownload" ActiveX control contains a remote code execution vulnerability. A malicious web page that instantiates this control can invoke this control's "Run" method to run arbitrary code with the privileges of the current user. Note that some technical details for this vulnerability are publicly available.
Status: SolidWorks confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism for CLSID "AB6633A8-60A9-4F5D-B66C-ABE268CC3227".
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: FireBug is a popular Mozilla Firefox extension providing in-depth JavaScript debugging support. Failure to properly handle certain JavaScript constructs can lead to arbitrary JavaScript being executed without sandbox restrictions. Since there are no sandbox restrictions, the malicious scripts can execute arbitrary code with the privileges of the current user. Note that FireBug is not installed by default. Working exploit code and full technical details are publicly available for this vulnerability.
Status: Vendor acknowledged, updates available.
Council Site Actions: Only one of the responding council sites is using the affected software, although it is not officially supported. The users who are running it have automatic updates turned on, including for extensions.
Description: The AOL SuperBuddy ActiveX control contains a vulnerability discussed in last week's @RISK. A working exploit has been released for this vulnerability.
Part II - Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 15, 2007
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.