This week four CA products (eTrust IDS, Unicenter, CleverPath, and BrightStor) were found to all use a common service that has a critical buffer overflow error.
Ten days to the early registration deadline (Wednesday, August 8) for SANS Network Security in Las Vegas. Registration url: http://www.sans.org/ns2007
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
SECURITY TRAINING UPDATE
SANS Network Security 2007 (September 22-30, in Las Vegas) is the largest fall conference on cybersecurity with more than 40 courses and wonderful evening sessions and a big vendor exposition. Most importantly, it brings together the top rated teachers in cybersecurity in the world. How good are they? Here's what past attendees said: "This course has valuable information that can be implemented immediately in the work place." (Christopher O'Brien, Booz Allen Hamilton) "The quality of teachers, speakers, and even attendees is far superior to any other training event I've attended." (Corinne Cook, Jeppesen) "SANS provides by far the most in-depth security training with the true experts in the field as instructors." (Mark Smith, Costco Wholesale)
Registration information: http://www.sans.org/ns2007/
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Yahoo! Widgets engine is used to run small applications, called "widgets". The Yahoo! Widgets engine contains an ActiveX control, which contains a buffer overflow. A malicious web page that instantiates this control could trigger this buffer overflow, and allow an attacker to execute arbitrary code with the privileges of the current user. Note that only the Yahoo! Widgets engine on Microsoft Windows is vulnerable.
Status: Yahoo! confirmed, updates available. Users may mitigate the impact of this vulnerability by disabling the affected ActiveX control via Microsoft's "kill bit" mechanism. Doing so, however, may impact normal functionality.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. Most of the responding council sites are not taking any action; however, a few sites plan to notify their users in case they are running the affected software.
Description: The Computer Associates Message Queuing Server ("cam.exe") is a component used by multiple Computer Associates products. This component contains a buffer overflow. A specially crafted request to this service would allow an attacker to exploit this buffer overflow and execute arbitrary code with the privileges of the vulnerable process (often SYSTEM). Additionally, the Computer Associates eTrust Intrusion Detection System installs an ActiveX control that does not properly validate its input. A malicious web page that instantiates this control would be able to load arbitrary DLLs and therefore execute arbitrary code with the privileges of the current user.
Status: Computer Associates confirmed, updates available. Users may be able to mitigate the impact of the ActiveX control vulnerability by disabling the control via Microsoft's "kill bit" mechanism for CLSID "41266C21-18D8-414B-88C0-8DCA6C25CEA0".
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: The BakBone NetVault Reporter is used to produce reports and other information in the BakBone NetVault system. The product consists of both a client and a server application. Both the client and server applications contain a buffer overflow when processing filenames. By sending an overlong filename to either the client or the server in a GET or POST request, an attacker could trigger this buffer overflow and execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). Note that some technical details are available for this vulnerability.
Status: Vendor confirmed, updates available. Users may be able to mitigate the impact of this vulnerability by blocking access to TCP ports 7977 and 7978 at the network perimeter.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: Panda products using the Panda Antivirus engine or the Panda AdminSecure agent contain remotely exploitable vulnerabilities. A specially-crafted Microsoft Windows executable file cold trigger a buffer overflow in the antivirus scanning engine, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that the antivirus engine may be configured to scan emails or other files automatically. In such cases, simply sending an email to a vulnerable server or otherwise causing a file to be scanned would be sufficient for exploitation. Additionally, a flaw in the Panda AdminSecure agent would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. The AdminSecure agent is used for remote administration of Panda products.
Status: Panda confirmed, updates available. Users can mitigate the impact of the AdminSecure vulnerability by blocking access to TCP ports 19226 and 19227 at the network perimeter.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: Borland InterBase is a popular database engine used in a variety of applications. The database engine contains a buffer overflow in its handling of certain remote commands. An overlong string sent to the "create" command could trigger this buffer overflow and allow an attacker to execute arbitrary code with the privileges of the current user. Note that some technical details are publicly available for this vulnerability.
Status: Borland confirmed, updates available. Users may be able to mitigate the impact of this vulnerability by blocking TCP port 3050 at the network perimeter.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: ESET NOD32 is a popular enterprise antivirus solution. The antivirus engine contains a flaw in its handling of of CAB ("cabinet") archive files. A specially crafted CAB file could trigger a heap corruption vulnerability and potentially execute arbitrary code with the privileges of the vulnerable process. Note that the antivirus engine may be configured to automatically scan email or other files. In such cases, it is sufficient for exploitation to simply cause an email to transit a vulnerable server or otherwise cause a file to be scanned. The antivirus engine also suffers from two denials-of-service in the processing of compressed executable files.
Status: ESET confirmed, updates available.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: Norman Antivirus, a popular antivirus solution for the small-to-medium business market, contains multiple vulnerabilities. A specially-crafted ACE or LZH archive file could trigger a buffer overflow in the scanning engine and allow an attacker to execute arbitrary code with the privileges of the current user. Additionally, flaws in the processing of Microsoft Word documents could allow a malicious document to bypass antivirus inspection or cause a denial-of-service condition. Note that, because the antivirus software may be configured to automatically scan emails or other files, simply causing a malicious email message to transit a vulnerable server could trigger these vulnerabilities. Note that some technical details are available for these vulnerabilities.
Status: Norman has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: ISC BIND, by far the most popular DNS server on the internet, contains a flaw in its algorithm used to generate transaction ID numbers. All DNS requests have a random transaction ID number embedded within them to identify the request in the current set of pending requests. If this transaction ID is guessed, an attacker could provide a false reply to the DNS server or otherwise impersonate actors in other requests, and potentially poison the DNS cache. A poisoned DNS cache will return false information in response to requests, allowing an attacker to divert traffic to attacker-controlled systems. The flaw in BIND's transaction ID generator provides predictability of transaction IDs by observing several preceding transaction IDs. Two different proofs-of-concept are publicly available, as are technical details.
Status: ISC confirmed, updates available.
Council Site Actions: All of the reporting council sites are responding to this item. They plan to upgrade to the latest version during their next maintenance cycle. A few sites are still investigating if the vendor version they have installed is vulnerable.
Description: LinkedIn is a popular social networking web site. The LinkedIn Browser Toolbar allows users to access LinkedIn content from a special toolbar in their web browser. This toolbar installs an ActiveX control that contains a buffer overflow vulnerability. A malicious web page that instantiates this control could trigger this buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the current user. Note that technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the responding council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5533 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.