No critical vulnerabilities in any widely used packages this week.
On the other hand, data is leaking out of large organizations at an extraordinary rate. Last week's news is tame compare with news coming in the next week or two. If you have not yet implemented broad-based data leakage protection and thorough encryption programs, mark your calendar for December 2-3 in Orlando the for Data Leakage and Mobile Encryption summits where pioneering uses will share the lessons they learned in implementing these essential technologies. You'll also go home with a short list of vendors to consider ***WhatWorks in Stopping Data Leakage and Insider Threat Summit http://www.sans.org/leakage07_summit/ ***WhatWorks in Mobile Encryption Summit http://www.sans.org/encryption07_summit/ Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Agent is a Microsoft technology that allows for custom "software assistants", small animated characters that can instruct users on how to use applications or provide other services. This service is available as an ActiveX control. A flaw in the handling of certain URLs passed to Microsoft Agent could result in a memory corruption vulnerability. A specially crafted web page that instantiated this control and exploited this vulnerability would be able to execute arbitrary code with the privileges of the current user. A proof-of-concept for this vulnerability is publicly available.
Status: Microsoft confirmed, updates available.
Description: Microsoft Windows Live Messenger, formerly known as Microsoft MSN Messenger, is Microsoft's instant messaging application. This application supports live videoconferencing. Failure to properly handle specially crafted video data could trigger a memory corruption vulnerability. An attacker that successfully exploited this vulnerability would be able to execute arbitrary code with the privileges of the current user. Note that the user must first accept a video chat session from an attacker to be vulnerable. A proof-of-concept for this vulnerability is publicly available. This vulnerability was discussed in a previous edition of @RISK.
Status: Microsoft confirmed, updates available.
Description: Apple QuickTime is Apple's streaming media framework. QuickTime media link files are XML files that can be used to define various media streams and other parameters for QuickTime. A specially crafted media link file containing JavaScript or Mozilla Chrome information could trigger a vulnerability and lead to arbitrary script execution when viewed in a web browser. A malicious website hosting such a file could exploit this vulnerability to execute arbitrary scripting code with the privileges of the current user. Note that, depending on configuration, malicious content may be opened without first prompting the user. It is believed that the vulnerability is exploitable in Mozilla-based browsers (such as Firefox), Microsoft Internet Explorer, and Apple Safari. A proof-of-concept for this vulnerability is publicly available. Note that several Apple applications install QuickTime, including iTunes and Safari. It is believed that both the Mac OS X and Microsoft Windows platforms are vulnerable.
Status: Apple has not confirmed, no updates available.
Description: Multiple HP products install the HPQUTIL.DLL library. This library exports several ActiveX controls. One of these controls contains a buffer overflow vulnerability in its "ListFiles" method. A specially crafted web page that instantiates this control could trigger this buffer overflow and execute arbitrary code with the privileges of the current user. A proof-of-concept for this vulnerability is publicly available.
Status: HP has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kill bit" mechanism for CLSID "F3F381A3-4795-41FF-8190-7AA2A8102F85".
Description: Microsoft Visual Studio, Microsoft's integrated development environment, ships with an embedded copy of Business Objects' Crystal Reports. Crystal Reports is a popular enterprise reporting application. A specially crafted Crystal Reports report file (RPT file) could trigger a vulnerability in Microsoft Visual Studio. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Depending upon configuration, Visual Studio may open such files without first prompting the user. A proof-of-concept for this vulnerability is publicly available.
Status: Microsoft confirmed, updates available. This vulnerability was first publicly reported in November of 2006 for the standalone Crystal Reports product. This advisory concerns the embedded copy in Microsoft Visual Studio.
Description: The ewire Payment Client is a remote payment client for the Danish ewire payment settlement company. Vendors who wish to settle accounts via ewire install this client on their systems. The client is available in two versions, a PHP version and a Windows-based COM version. The PHP version contains a remote command execution vulnerability in its handling of the "paymentinfo" parameter. An attacker who successfully exploited this vulnerability would be able to execute arbitrary commands with the privileges of the web server process. A proof-of-concept and full technical details for this vulnerability are publicly available. Note that the PHP version is vulnerable and available for Microsoft Windows, Linux, and FreeBSD platforms.
Status: Vendor has not confirmed, no updates available.
Description: Callisto Photo Parade Player is a popular slideshow and photo sharing application. It uses a custom ActiveX control. This control contains a buffer overflow in its "FileVersionOf" property. A specially crafted web page that instantiated this control could exploit this buffer overflow and execute arbitrary code with the privileges of the current user. Technical details for this vulnerability are publicly available.
Status: Callisto has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kill bit" mechanism for CLSID "0115A685-ED24-4F7B-A08E-3BD15D84E668".
Description: The PhotoChannel Networks Photo Upload Plugin is an ActiveX control used to upload photos to a server. This control is distributed and used by multiple retailers and photo processors, including Wal-Mart, K-Mar, and Eckard Pharmacy. This control contains a buffer overflow that can be exploited by a specially crafted web page that instantiates the control. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user.
Status: Vendor confirmed, updates available.
Description: The GlobalLink "glitemflat.dll" ActiveX control contas a buffer overflow in its "SetClientInfo" method. A specially crafted web page that instantiates this control could exploit this buffer overflow and allow an attacker to execute arbitrary code with the privileges of the current user. A proof-of-concept for this vulnerability is publicly available.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kill bit" mechanism for CLSID "7D1425D4-E2FC-4A52-BDA9-B9DCAC5EF574".
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.