The Real Player vulnerability is for real. Needs fixing.
Also see the Data Leakage Summit information. CIOs seem to have made the switch from "why" to "how soon can you get it in?" You might as well not waste the money. Find out what other companies and agencies have done in data leakage control. http://www.sans.org/info/18226
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********* Data Leakage is the Fastest Growing Area of Security *************
PCI, HIPAA, GLBA, SB1386, breach disclosure?? What are the regulatory requirements around these? Attend the Data Leakage and Insider Threat Summit December 3-4 in Orlando and find out. Then hear what tools work best and how other companies have implemented a data leakage strategy. http://www.sans.org/info/18226
****************************************************************************
TRAINING UPDATE: Where can you find Hacker Exploits and SANS other top-rated courses? London (11/26 - 12/1): http://www.sans.org/london07/ Washington DC (12/13-12/18): http://www.sans.org/london07/ New Orleans (1/12-1/17): http://www.sans.org/security08/event.php Chicago (11/2-11/7): http://www.sans.org/chicago07/event.php Tokyo (11/5-11/10): http://www.sans.org/sanstokyo2007_autumn/event.php
How good are the courses? Here's what past attendees said: "An extraordinary amount of information covered in a week, backed up with excellent documentation for those long winter nights." (Keith Mellism, Canada Life) "This course has valuable information that can be implemented immediately in the work place." (Christopher O'Brien, Booz Allen Hamilton) "You will never ever find anything more valuable than SANS super knowledge. Worth the price!!" (Carlos Fragoso, CESCA)
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Real Networks Real Player, a popular multiplatform streaming media player, contains a flaw in an included ActiveX control. A malicious web page that instantiates this control could trigger a buffer overflow in the control and execute arbitrary code with the privileges of the current user. This vulnerability is being actively exploited in the wild. Some technical details are publicly available for this vulnerability, but the exploit code currently being used is not publicly disclosed.
Status: Real has confirmed, preliminary updates available. Users can mitigate the impact of this vulnerability by disabling the control via Microsoft's "kill bit" mechanism for CLSID FDC7A535-4070-4B92-A0EA-D9994BCC0DC5. Note that this could impact normal functionality.
Description: Mozilla Firefox contains multiple vulnerabilities ranging in severity from remote code execution to information disclosure. A specially crafted web page or JavaScript script could corrupt memory in such a way that an attacker could execute arbitrary code with the privileges of the current user. Other vulnerabilities in the handling of web pages or URLs could lead to arbitrary file uploads or facilitate cross-site scripting or phishing. Technical details for these vulnerabilities is available via source code analysis. Proofs-of-concept for some of these vulnerabilities are publicly available. These vulnerabilities may also affect other products based on the Mozilla engine, such as Mozilla SeaMonkey or Mozilla Thunderbird.
Status: Mozilla confirmed, updates available.
Description: The Apple iPhone and iPod Touch allow web browsing and image viewing using built-in applications. It has been discovered that these applications use a vulnerable version of the LibTIFF library, used to read Tagged Image File Format (TIFF) image files. A specially crafted TIFF image could trigger a buffer overflow in this library and potentially use this to execute arbitrary code. Full technical details and a proof-of-concept are publicly available for this vulnerability. The vulnerability in LibTIFF itself has been discussed in a previous @RISK.
Status: Apple has not confirmed, no updates available.
Description: Microsoft Visual FoxPro is Microsoft's integrated development environment for the FoxPro programming language. It installs the "FPOLE.OCX" ActveX control. This control provides the "FoxDoCmd" method. This method allows arbitrary commands to be executed with the privileges of the current user by passing these commands as the method's arguments. This ActiveX control and method were discussed in an earlier @RISK entry detailing a buffer overflow exploit. Full technical details and a proof-of-concept for this vulnerability are publicly available.
Status: Microsoft has not confirmed, no updates available.
Description: Opera is a popular multiplatform web browser. Opera fails to properly sanitize calls to external applications such as email and news applications. A specially crafted URL or web page that causes Opera to call one of these external applications could trigger this vulnerability and execute arbitrary code with the privileges of the current user. This vulnerability is believed to affect Opera on all supported platforms. Other vulnerabilities discovered in Opera include several cross-site scripting vulnerability and an undisclosed vulnerability involving Opera and Adobe Flash Player.
Status: Opera confirmed, updates available.
Description: IrfanView is a popular image viewing application for Microsoft Windows. IrfanView supports loading palettes of colors from files. A specially crafted palette file could trigger a buffer overflow in the application. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Depending on configuration, palette files may be opened automatically by IrfanView.
Status: Vendor confirmed, updates available.
Description: The Cisco Unified Communications Manager and Cisco Unified Call Manager applications are used to manage enterprise voice communications. These systems allow for transfer of files via the Trivial File Transfer Protocol (TFTP). A specially crafted TFTP request containing an overlong filename could trigger a buffer overflow in this application and potentially allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that the system is not vulnerable to this issue in its default configuration. Additionally, a denial-of-service condition exists due to the improper handling of multiple Session Initiation Protocol (SIP) requests to the system.
Status: Cisco confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking access to ports 5060/UDP and 69/UDP.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.