A backup product is once again on the "critical list" and again it is CA's ARCServe. A big problem is that many people think back up software patches automatically. It doesn't. If you use ARCServe, quick action is really important. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored By SANS ********************************
Team with your Security, Operations and Help Manager and attend the Data Leakage and Insider Threat Summit December 3-4. Listen to the hard 'lessons learned' from other companies and agencies who have deployed data leakage prevention programs. Learn what software and hardware solutions are available and see how other have used them. http://www.sans.org/info/16991
****************************************************************************
TRAINING UPDATE Where can you find Hacker Exploits, Security Essentials and SANS other top-rated courses? New Orleans (1/12-1/17): http://www.sans.org/security08/event.php Washington DC (12/13-12/18): http://www.sans.org/london07/ Chicago (11/2-11/7): http://www.sans.org/chicago07/event.php Tokyo (11/5-11/10): http://www.sans.org/sanstokyo2007_autumn/event.php London (11/26 - 12/1): http://www.sans.org/london07/ Plus in 100 other cities and even on-line at your convenience. How good are the courses? Here's what past attendees said: "An extraordinary amount of information covered in a week, backed up with excellent documentation for those long winter nights." (Keith Mellism, Canada Life) "This course has valuable information that can be implemented immediately in the work place." (Christopher O'Brien, Booz Allen Hamilton) "You will never ever find anything more valuable than SANS super knowledge. Worth the price!!" (Carlos Fragoso, CESCA)
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: CA ARCServe Backup for Laptops and Desktops is a popular enterprise backup solution. It contains an authentication bypass vulnerability and multiple buffer overflow vulnerabilities. The buffer overflow vulnerabilities require the attacker to be authenticated, but the authentication bypass vulnerability allows this requirement to be bypassed as well. Therefore, all of these vulnerabilities are exploitable by unauthenticated attackers, and all can lead to arbitrary code execution with SYSTEM privileges. Some technical details for these vulnerabilities are publicly available.
Status: CA confirmed, updates available. Users can partially mitigate the impact of these vulnerabilities by blocking access to TCP port 1900.
Description: IBM Tivoli Storage Manager is IBM's enterprise storage management solution. The client component of this application contains multiple vulnerabilities. A flaw in the Client Acceptor Daemon (CAD) can lead to a buffer overflow. Successfully exploiting this buffer overflow could lead to an attacker executing arbitrary code with the privileges of the vulnerable process. Additionally, an undisclosed flaw in the scheduling component can lead to data disclosure and possibly other vulnerabilities. Some technical details for the buffer overflow vulnerabilities are publicly available.
Status: IBM confirmed, updates available.
Description: OpenOffice.org is a popular cross-platform open source office suite. OpenOffice.org fails to properly handle certain malformed Tagged Image File Format (TIFF) image files. A specially crafted TIFF image file could lead to an integer overflow. Successfully exploiting this overflow could lead to arbitrary code execution with the privileges of the current user. Note that this vulnerability may be exploited by image files embedded in other documents; such documents may be opened in OpenOffice.org without first prompting the user. OpenOffice.org is installed by default on many Unix, Unix-like, and Linux operating systems, and is commonly installed on Microsoft Windows systems. Technical details for this vulnerability are available via source code analysis.
Status: OpenOffice.org confirmed, updates available.
Description: Sun Java Web Start is a method of distributing Java-based applications via the web. Facilities for using Web Start are included in the Sun Java Runtime Environment. On Microsoft Windows, these facilities include an ActiveX control. This ActiveX control contains a buffer overflow in its "dnsResolve" method. A specially crafted web page that instantiates this control could exploit this vulnerability to execute arbitrary code with the privileges of the current user. The Sun Java Runtime Environment is very often installed on Microsoft Windows systems. A proof-of-concept for this vulnerability is publicly available.
Status: Sun has not confirmed, no updates available. Users can partially mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kil lbit" mechanism for CLSID "5852F5ED-8BF4-11D4-A245-0080C6F74284". Note that this will disable normal application functionality.
Description: Adobe Acrobat PDF Reader, the most common Portable Document Format (PDF) reader application, contains an undisclosed code execution vulnerability. A specially crafted PDF document could exploit this vulnerability to execute arbitrary code with the privileges of the current user. PDF documents are generally opened without further prompting. Adobe has confirmed the existence of this vulnerability, and a proof-of-concept is present in the wild.
Status: Adobe confirmed, no updates available.
Description: VMware Workstation, VMware's popular virtualization product, contains multiple vulnerabilities in its Dynamic Host Configuration Protocol (DHCP) server, used to dynamically configure clients' network settings. A specially crafted DHCP request or web page could exploit these vulnerabilities to execute arbitrary code with the privileges of the vulnerable process. The exact exploitation vectors are currently undisclosed.
Status: VMware confirmed, updates available.
Description: Pegasus Mercury/32 IMAP is a popular IMAP server for Microsoft Windows. The server fails to properly handle overlong IMAP SEARCH commands. A specially crafted IMAP SEARCH command could trigger a buffer overflow and allow an authenticated user to execute arbitrary code with the privileges of the vulnerable process (often SYSTEM). A proof-of-concept for this vulnerability is publicly available. Note that an attacker would need valid login credentials to exploit this vulnerability.
Status: Vendor has not confirmed, no updates available.
Description: ImageMagick is a suite of graphics manipulation utilities for several operating systems. ImageMagick contains multiple integer overflows, buffer overflows, and off-by-one errors in the processing of various image formats. A specially crafted image file could trigger one of these vulnerabilities to execute arbitrary code with the privileges of the current user. Image files are generally not opened by ImageMagick by default, but some applications that open images may link to the ImageMagick libraries, and may therefore also be vulnerable. Technical details for these vulnerabilities can be obtained by source code analysis. ImageMagick is installed by default on many Unix, Unix-like, and Linux systems.
Status: ImageMagick confirmed, updates available.
Description: Ipswitch IMail, a popular mail server for Microsoft Windows, contains a buffer overflow vulnerability in its Simple Mail Transport Protocol (SMTP) module. An email transiting a vulnerable server would be able to exploit this buffer overflow to execute arbitrary code with the privileges of the vulnerable process (often SYSTEM). A proof-of-concept and full technical details for this vulnerability are publicly available.
Status: Ipswitch has not confirmed, no updates available.
Description: NetSupport Manager, a popular desktop support package, contains an authentication bypass vulnerability in its client application. An attacker could exploit this vulnerability to access and completely take control of a vulnerable system without authentication. No further technical details are available for this vulnerability.
Status: NetSupport confirmed, updates available.
Description: MW6 Technologies provides popular software for the reading and encoding of barcodes and barcoded data. The QRCode ActiveX control provides access to these capabilities as an ActiveX component. This control contains multiple arbitrary file creation and overwriting vulnerabilities. A specially crafted web page that instantiates this control could trigger one of these vulnerabilities and overwrite arbitrary files on the system with the privileges of the current user. Depending on which files are overwritten, remote code execution or other exploit conditions may result. A proof-of-concept for this vulnerability is publicly available.
Status: Vendor has not confirmed,n o updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kill bit" mechanism for CLSID 3BB56637-651D-4D1D-AFA4-C0506F57EAF8.
Description: The Alcatel-Lucent OmniPCX Unified Maintenance Tool is used by telephony support technicians to monitor and display information about telephony systems. This tool provides a web-based interface to its functionality. A specially crafted request to this web interface can result in arbitrary commands being executed with the privileges of the web server process. A proof-of-concept and full technical details are available for this vulnerability.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.