Another week and another security flaw is discovered in Computer Associates' ARCserve backup software. All these vulnerabilities found in widely used backup software reflect a sad truth: criminals use badly written backup software for immediate access to sensitive and valuable information as well as back doors into corporations and government agencies' networks.
Alan
PS. Useful check for December 2007: When was the last time your backup software was patched? A surprising number of people are unaware that Microsoft's automatic updates do not cover Symantec and CA backup software.
PPS. Useful check for 2008. What are the GSSP (secure programming) scores of the programmers who wrote the software you use? If you don't ask, you'll have no way of verifying that the developers have even a clue about writing secure code. http://www.sans.org/gssp
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** Sponsored By Core Security Technologies *****************
Check-off PCI requirements! Learn how to get the low-hanging fruit with a free, on-demand webcast: "Security Testing: The Easiest Part of PCI Certification." You'll see how security testing with CORE IMPACT provides compliance with Requirement 11.3 and validates multiple other PCI mandates for successful compliance audits. View the webcast now: http://www.sans.org/info/20311
*************************************************************************
TRAINING UPDATE Where can you find Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP, and SANS' other top-rated courses? - - Washington DC (12/13-12/18): http://www.sans.org/cdi07 - - New Orleans (1/12-1/17): http://www.sans.org/security08/event.php - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
************************ Sponsored Links: *****************************
1) Don't let incorrect changes to device configurations bring down your network. FireMon: keeping networks operational. http://www.sans.org/info/20316
2) Utimaco Launches SafeGuard Enterprise 5.2 Raising the Bar on Cross-platform Data Protection http://www.sans.org/info/20321
3) A review and analysis of complex security threats and their impact on the SMB. http://www.sans.org/info/20326
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Computer Associates BrightStor ARCserve is a popular suite of enterprise backup software. It exposes several Remote Procedure Call (RPC) interfaces. One of these interfaces exposes several operations that can manipulate arbitrary files and Microsoft WIndows Registry keys. No authentication is required to call these operations. An attacker who called these functions could execute arbitrary code or otherwise manipulate the system with the privileges of the vulnerable process (often SYSTEM). Technical details for this vulnerability are available in the advisory.
Status: Computer Associates confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking TCP port 6504 at the network perimeter, if possible.
Description: Web browsers based on the Mozilla suite, including Firefox, contain multiple vulnerabilities in their handling of web content. A specially crafted web page or script could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that other browsers or applications based on the Mozilla framework could be vulnerable. Details for these vulnerabilities are available via source code analysis.
Status: Mozilla confirmed, updates available.
Description: Autonomy KeyView is a media viewing component distributed with IBM's Lotus Notes groupware suite. This component contains several buffer overflows in the processing of various file formats. A specially crafted file attached to a message could trigger one of these overflows, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that Lotus Notes determines what icon to display for an attachment and what application to open it using different data; it is therefore possible to spoof malicious attachments as more innocuous formats. A proof-of-concept and full technical details for these vulnerabilities are publicly available. Note that other products using Autonomy KeyView may be vulnerable.
Status: IBM confirmed, updates available.
Description: The VideoLAN Client Media Player (VLC) is a popular cross-platform media player. The version for Microsoft Windows provides an ActiveX control, allowing developers to embed VLC functionality in their applications. This control can be instantiated by web pages. This control contains a vulnerability in its handling of certain calls. A malicious web page that instantiates this control could exploit these vulnerabilities to execute arbitrary code with the privileges of the current user. Technical details for these vulnerabilities is available via source code analysis.
Status: VideoLAN confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.