QuickTime has this week's most critical flaw, and QuickTime is installed by default on every Apple OS/X system and with iTunes on Windows systems. Malicious web sites (including otherwise trusted web sites that have been compromised by attackers) can take advantage of this and almost certainly will.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********* Sponsored by The Application Penetration Testing Folks ********
Most network and system penetration testers do not have the application testing knowledge to application penetration testing, the most in-demand job in security - creating big opportunities for newcomers. Ed Skoudis and the team at Intelguardians have developed an important and exciting new course to prepare these people: Advanced Web Application Penetration Testing. The first opportunity to take this four day course is in New Orleans, January 14-17. http://www.sans.org/security08/description.php?tid=1722
*************************************************************************
*********************** Sponsored Links *******************************
1) Security professionals focus on fighting the most common data threats - - Encryption Summit, December 3-4. http://www.sans.org/info/19742
2) Stop data leaks and sanitize your servers before they leave your premises. Blancco them today. http://www.sans.org/info/19747
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: QuickTime is Apple's streaming media framework for Apple Mac OS X and Microsoft Windows. QuickTime can stream media from remote servers using a variety of protocols. It handling of server responses to Real Time Streaming Protocol (RTSP) requests contains a buffer overflow vulnerability. A specially crafted response from a QuickTime server could trigger this buffer overflow and allow the attacker to execute arbitrary code with the privileges of the current user. Note that QuickTime is installed by default on all Apple Mac OS X systems, and is installed as part of the iTunes suite on Microsoft Windows. Full technical details and multiple proofs-of-concept are available for this vulnerability. Note that, depending upon configuration, QuickTime content may be opened automatically when visiting web pages.
Status: Apple has not confirmed, no updates available.
Description: Apple's Mail.app is the default mail client included with Mac OS X. It allows extended attributes associated with a file attached to an email message to be included in the attachment using a special encoding known as "AppleDouble". This allows for enhanced information about the file to be accessed by the operating system. These extended attributes can define the application to be used to open a file, as well as a file's associated icon. A specially crafted attachment to an email could appear to be a non-executable file type (such as an image), but execute arbitrary commands when opened by the user. A user would need to manually open the attachment to be affected. This vulnerability may be related to a previously disclosed and patched vulnerability.
Status: Apple has not confirmed, no updates available.
Description: Wireshark is a network traffic capture and protocol analysis tool. It is a continuation of the older Ethereal project. Wireshark contains multiple vulnerabilities in the parsing of network traffic, both traffic captured live from a network and traffic read from an offline packet capture file. A specially crafted packet or packet capture could exploit one of these vulnerabilities to execute arbitrary code with the privileges of the vulnerable process. When capturing traffic live, Wireshark is often run with administrative privileges. Depending on configuration, packet capture files may be opened automatically by Wireshark. Wireshark is installed by default on large numbers of Unix, Unix-like, and Linux systems. Technical details for these vulnerabilities are available via source code analysis.
Status: Wireshark confirmed, updates available.
Description: BitDefender Online is an online virus scanner for Microsoft Windows systems. Some of its functionality is provided by an ActiveX control installed on users' systems. This control contains a flaw in its "InitX" method. A malicious web page that instantiated this control could call this method and exploit the resulting buffer overflow. Successful exploitation would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.