In addition to critical vulnerabilities in three Microsoft products this week (Windows, Internet Explorer, and Exchange), a critical vulnerability was also found in a widely used security product (CA eTrust Antivirus Server). The CA tool has also been found to be easily exploitable just through the logon screen.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** SANS Secure Europe **************************
The first SANS Secure Europe. Biggest SANS event ever in Europe. Register and view details at www.sans.org/brussels07. Seven Immersion Hands-On Classes: Hacker Exploits, Intrusion Detection, Security Auditing, Wireless Security, Security Essentials, Forensics, Wireless, Perimeter Protection. All in Brussels. The faculty for SANS Secure Europe is made up of the leaders in the information security industry. Eric Cole, Chris Brenton and David Hoelzer are all Course Authors and SANS Faculty Fellows. They are the industry's Top Guns when it comes to instruction. Jess Garcia, David Perez, Raul Siles, and James Tarala are all seasoned Instructors that use their real-world experience to show you how to apply what you are learning so you are ready to put the material to work as soon as you return to the office. Big program of additional events through the week - Monday is SANS@Home night; Tuesday is Vendor Day; Wednesday night is SANS Community Night; Thursday is SANS @Home night.
If you're interested in accepting the challenge, then join us in Brussels on 25-30 June. You can visit the SANS website to register at http://www.sans.org/brussels07/.
*********************************************************************
************************* Sponsored Link ***************************
SANS OnSite Training Receive bonus seat for SANS OnSite (up to $5100 value) Your Location! Your Schedule! Lower Cost! Enter today! http://www.sans.org/info/7036
*********************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Microsoft DNS server exports a Remote Procedure Call (RPC) interface for remote administration of the server. Certain function calls do not properly handle malformed DNS zone names. A specially-crafted call to these functions containing a malformed zone name could trigger a buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). Note that public exploit code has been posted. This issue was originally disclosed prior to Microsoft's official announcement as a zero-day vulnerability. A previous @RISK entry discussed this vulnerability at the time of its disclosure.
Status: Microsoft confirmed, updates available. Users are advised to disable the RPC management interface on the DNS server if it is not needed.
Council Site Actions: All of the reporting council sites are responding to this issue. Most plan to distribute the patch during their next regularly scheduled maintenance cycle.
Description: Microsoft Internet Explorer contains multiple vulnerabilities in its handling of COM objects, web pages containing scripts, and HTML documents. A specially-crafted web page could exploit any of these vulnerabilities to execute arbitrary code with the privileges of the current user or to overwrite arbitrary files with the permission of the current user. Technical details for some of these vulnerabilities are publicly available, as are working exploits.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to this issue. Most sites plan to distribute the patch during their next regularly scheduled maintenance cycle.
Description: Microsoft Exchange contains multiple vulnerabilities: (a) Exchange fails to properly handle certain specially-crafted MIME-encoded data. MIME encoding is often used to attach files to email messages. A specially-crafted email message could trigger this vulnerability and execute arbitrary code with the privileges of the server process. Note that the email need only transit the vulnerable server to trigger this vulnerability. (b) Several denial-of-service conditions exist in Exchange's handling of iCal messages and IMAP commands. An email message containing a specially-crafted iCal file (used to store calendaring and scheduling information) could cause the server to crash and stop processing further messages. Additionally, a flaw in the handling of IMAP commands could allow an attacker to crash the mail service. Note that an attacker need only send an email or connect to the IMAP server to exploit these vulnerabilities. Note that crashing the mail service may cause other Internet services, such as web and FTP servers, to also crash. Some technical details and proofs-of-concept are available for these vulnerabilities.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to this issue. Most sites plan to distribute the patch during their next regularly scheduled maintenance cycle.
Description: Computer Associates eTrust AntiVirus Server, a popular antivirus solution, contains a buffer overflow in its handling of user login credentials. The "inoweb" component, which listens on TCP port 12168 fails to properly handle an overlong username or password. An attacker who sent a long value for either parameter could trigger a buffer overflow and execute arbitrary code with the privileges of the vulnerable process (often SYSTEM).
Status: Computer Associates confirmed, updates available. Users are advised to block TCP port 12168 at the network perimeter, if possible.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: The Microsoft CAPICOM ActiveX control provides access to the cryptography system included with Microsoft Windows. This control fails to properly handle certain malformed inputs to exported methods. A web page that instantiates this control could call these vulnerable methods. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user.
Status: Microsoft confirmed, updates available.
Council Site Actions: Two of the reporting council sites are using the affected software and plan to deploy the patch during their next regularly scheduled maintenance cycle.
Description: Microsoft Office contains a flaw in the way it handles drawing objects embedded in Office documents. These objects are used to provide graphics and other imaging data in documents. An Office document containing a specially-crafted drawing object could trigger a memory corruption vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Note that recent versions of Office do not open documents without prompting.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to this issue. Most plan to distribute the patch during their next regularly scheduled maintenance cycle.
Description: Microsoft Word contains multiple vulnerabilities in the way it handles Word and Rich Text Format (RTF) documents. A Word document containing a specially-crafted array or document stream element, or an RTF document containing a specially-crafted property could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that at least one of these vulnerabilities is believed to have exploits available in the wild.
Status: Microsoft confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to this issue. Most sites plan to distribute the patch during their next regularly scheduled maintenance cycle.
Description: Microsoft Excel contains multiple vulnerabilities in the way it handles Excel spreadsheet files. An Excel spreadsheet containing a specially-crafted BIFF, filter, or font record could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that some technical details for these vulnerabilities are publicly available.
Council Site Actions: All of the reporting council sites are responding to this issue. Most sites plan to distribute the patch during their next regularly scheduled maintenance cycle.
Description: McAfee Security Center, used to centrally administer of McAfee security products, contains a buffer overflow in an included ActiveX component. A specially-crafted web page that instantiates this control could exploit this buffer overflow and execute arbitrary code with the privileges of the current user. Note that some technical details and a working exploit for this vulnerability are publicly available.
Status: McAfee confirmed, updates available. Note that users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism, using CLSID "9BE8D7B2-329C-442A-A4AC-ABA9D7572602".
Council Site Actions: Only one of the responding council sites is using the affected software. They plan to deploy the patch during their next regularly scheduled maintenance cycle.
Description: Trend Micro Server Protect, a popular enterprise antivirus product, contains multiple vulnerabilities in its handling of Remote Procedure Call (RPC) requests. The server exports two vulnerable interfaces, one running on TCP port 5168 and the other on port 3628. An attacker who sent a specially-crafted RPC request to one of these interfaces could trigger a buffer overflow. Successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that technical details for these vulnerabilities are publicly available. A working exploit for one of these vulnerabilities is known to be available to members of Immunity's partners program.
Status: Trend Micro confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5452 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.