Two weeks left to register for SANSFIRE 2007 in Washington DC or you can come to Las Vegas at the end of September for 30 award winning, hands-on training course in security. Washington DC: http://www.sans.org/sansfire07/ Las Vegas: http://www.sans.org/ns2007/
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored By SANS *****************************
SANS TRAINING UPDATE: Las Vegas will be the site of the largest fall cyber security training program. SANS Network Security 2007 September 22-30. http://www.sans.org/ns2007/ Complete schedule of all training can be found at: http://www.sans.org/training/bylocation/index_all.php Two other ways to take SANS courses: (1) from your home or office you can learn from top SANS faculty teaching live on line and you asking questions in real time - very cool - called SANS@HOME http://www.sans.org/athome/ (2) Or have SANS faculty come to your site and shape the course to your specific needs: http://www.sans.org/onsite/
*************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: MIT Kerberos, a widely popular implementation of the Kerberos authentication protocol, contains a buffer overflow in its kadmind component. A specially crafted Kerberos request could trigger this buffer overflow. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the kadmind process (usually root). The affected component runs on Kerberos master servers, and therefore successful exploitation of this vulnerability could lead to the disclosure or spoofing of authentication information for other systems in the Kerberos domain. Numerous vendors base their implementation of Kerberos on this implementation; these vendors may also be vulnerable. A working exploit is known to exist, but is not currently believed to be in the wild. Full technical details, including source code, are available for this vulnerability.
Status: MIT confirmed, updates available. Certain vendors may have released updates for their Kerberos implementations.
Description: Real Networks RealPlayer and its open source version HelixPlayer, contain flaws in their parsing of time values in Synchronized Multimedia Integration Language (SMIL) files. These files are used to synchronize and play multiple media streams simultaneously or at given times, as well as to provide metadata about media streams. A specially crafted time value in a SMIL file could trigger this buffer overflow and allow an attacker to execute arbitrary code with the privileges of the current user. Note that, in general, RealPlayer and HelixPlayer will open SMIL files without prompting. This includes the browser-embedded versions of these products, allowing malicious web pages to act as a vector for exploitation. Full technical details and a proof-of-concept exploit for these vulnerabilities are publicly available.
Status: Real Networks confirmed, updates available.
Description: The Sun Java Development Kit, System Development Kit, and Runtime Environment provide the Java Web Start mechanism that allows Java applications to be launched from remote web sites and servers. A flaw in the handling of Java Web Start applications can lead to an arbitrary file overwrite condition, allowing a malicious application to overwrite any file accessible by the current user. Note that, since the permissions accorded to Java Web Start applications are controlled by a local file (known as ".policy.java" on most platforms), an attacker could overwrite this file to remove all execution restrictions on Java Web Start applications. No further technical details are available for this vulnerability.
Status: Sun confirmed, updates available.
Description: Trend Micro OfficeScan, a popular anti-malware suite, contains multiple vulnerabilities in its web-based administration interface. Attackers could exploit a buffer overflow to execute arbitrary code with the privileges of the web server process, or could send a specially crafted HTTP header to bypass administration interface authentication.
Status: Trend Micro confirmed, updates available.
Description: The GD library, a popular open source image generation and manipulation library, contains multiple vulnerabilities. Any program using the GD library would be potentially affected by these vulnerabilities. A specially crafted PNG, XBM or GIF image file could trigger multiple vulnerabilities, including some that could lead to code execution. If an attacker had programmatic access to the library (for example, by being able to upload PHP code or CGI scripts), an attacker could exploit flaws in various API functions. Because GD is open source, technical information for these flaws is available via source code analysis. At least one proof-of-concept is publicly available.
Status: Vendor confirmed updates available.
Description: The Check Point VPN-1 UTM Edge appliance, used to provide threat management to enterprises, contains a cross-site request forgery vulnerability in its web-based administration interface. The interface fails to validate the source of HTTP requests; a specially-crafted web page could simulate valid form submissions to the interface and perform arbitrary commands. Note that any malicious web page would need to know the administration interface's IP address and any attack would need to occur during a valid login session to the web interface.
Status: Check Point has not confirmed, no updates available.
Description: HP Photo Digital Imaging, a popular digital imaging suite, contains an arbitrary file overwrite vulnerability in an included ActiveX control. The "hpqxml.dll" ActiveX control's "saveXMLAsFile" method fails to properly validate the caller or pathname for a given file, allowing a malicious web page that instantiates the control to write arbitrary data to any user-accessible file. Full technical details and a proof-of-concept are available for this vulnerability.
Status: HP has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kill bit" mechanism for CLSID "9C0A0321-B328-466C-8ECA-B9A5522466D3".
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5465 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.