Big problems this week with Cisco IOS and Citrix. Plus more than 50 new vulnerabilities confirmed in web applications.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
SECURITY TRAINING UPDATE: Several of the hands-on immersion security training courses at SANS 2007 (San Diego, March 29 - April 4) are starting to fill up. If you want a place, register early. You'll also save hundreds of dollars if you do it in the next few weeks. Full Schedule (53 courses): http://www.sans.org/sans2007/event.php
*************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The NCTsoft NCTAudioFile2 ActiveX control contains a buffer overflow vulnerability in the processing of arguments passed to its "SetFormatLikeSample()" method. A web page that instantiates this control could trigger this vulnerability, and execute arbitrary code with the privileges of the current user. Technical details for this vulnerability are publicly available, as is a simple proof-of-concept. Reusable exploit code targeting ActiveX control vulnerabilities is widely available and easily adaptable to this specific vulnerability. Users can mitigate the impact of this vulnerability by disabling the control via Microsoft's "kill bit" mechanism for GUID "77829F14-D911-40FF-A2F0-D11DB8D6D0BC".
Status: NCTsoft has not confirmed, no updates available.
Description: Cisco IOS is Cisco's custom operating system used in its routing products. The majority of internet traffic is routed via systems running IOS. Cisco IOS contains the following vulnerabilities: 1) A specially-crafted IP options field in an Internet Control Message Protocol (ICMP), Protocol Independent Multicast version 2 (PIMv2), Pragmatic General Multicast (PGM), or URL Rendezvous Directory (URD) packet could trigger a vulnerability, leading to a denial-of-service condition. It is believed that this vulnerability could lead to arbitrary code execution, but this has not yet been proven. 2) A specially-crafted Transmission Control Protocol (TCP) packet can lead to a small memory leak on certain vulnerable systems. Large numbers of these packets can exhaust all available memory on a system, leading to a denial-of-service condition. 3) An Internet Protocol version 6 (IPv6) packet containing a specially-crafted Type 0 Routing header could lead to a denial-of-service condition by crashing the vulnerable system. IOS is vulnerable to the first two issues in its default configuration; IPv6 processing is not enabled by default. In all cases, the malicious traffic must be directed specifically to the router; traffic transiting the router will not trigger these vulnerabilities. These vulnerabilities can be partially mitigated by configuring firewall rules and access lists to limit the types of traffic that can reach the vulnerable systems directly.
Status: Cisco confirmed, updates available.
Description: A print provider installed by several Citrix products contains a remotely-exploitable buffer overflow. By passing an overly-long argument to the "EnumPrintersW()" or "OpenPrinter()" functions, an attacker could exploit this buffer overflow and execute arbitrary code with "LocalSystem" privileges. These calls can be issued via an unauthenticated RPC request. Note that some technical details for this vulnerability are publicly available, and a working exploit is available to the members of Immunity's partner program. Users are advised to block access to TCP and UDP ports 135, 137, 138, 139, 445, and 593 at the network perimeter, if possible.
Status: Citrix confirmed, updates available.
Description: Microsoft Word is vulnerable to a code execution vulnerability. The exact nature of this vulnerability is currently undisclosed. According to SecurityFocus, Symantec believes this vulnerability is being actively exploited in the wild.
Status: Microsoft is investigating this issue.
Description: Multiple Computer Associates products contain remotely-exploitable buffer overflows. The exact nature of these buffer overflows is currently not publicly known, but the vendor has stated that successful exploitation can lead to arbitrary code execution with SYSTEM or root privileges. It is unknown if these vulnerabilities are related to those discussed in @RISK Volume 6, Issue 3. Special Note: CA BrightStor ARCServe buffer overflows have been actively exploited for the past couple of years. SANS recommends that you block all the ports that are opened by the software, at the network perimeter. A list of the ports to block may be found at: http://www.ca.com/at/local/partner/techtalk_mar05_faq.pdf http://supportconnectw.ca.com/public/ca_common_docs/brightstorwinxpsp2matrix.asp
Status: Computer Associates confirmed, updates available.
Description: Apple Mac OS X contains a flaw when parsing PICT image files. PICT is an old, rarely-used image file format. A PICT file with a specially-crafted "ARGB" field could exploit this vulnerability and create a denial-of-service condition. It is believed that this vulnerability could also lead to arbitrary code execution with the privileges of the current user, but this has not been confirmed. Technical details and a proof-of-concept for this vulnerability are publicly available. PICT files are opened automatically by Safari, Mail, and other applications. It is currently unknown if Apple QuickTime on Microsoft Windows is vulnerable.
Status: Apple has not confirmed, no updates available.
Description: Apple iChat, Apple's instant messaging client installed by default on Mac OS X systems, contains a format string vulnerability. A specially-crafted "aim://" URL, used to initiate an AOL Instant Message chat session, could exploit this vulnerability and execute arbitrary code with the privileges of the current user. The specially-crafted URL can be placed in a web page, and can be made to automatically open upon viewing the page. Technical details and a simple proof-of-concept for this vulnerability are publicly available. This vulnerability was disclosed by the Month of Apple Bugs project, whose goal is to disclose a security vulnerability in Apple or Apple-related software every day for a month.
Status: Apple has not confirmed, no updates available.
Description: Apple Software Update, a part of Apple Mac OS X used to download and install software updates, contains a format string vulnerability. A Software Update catalog file with a specially-crafted name can exploit this vulnerability. It is believed that code execution is possible with this vulnerability, though this has not been confirmed. Software Update catalog files are not opened by default in any software. Technical details and a simple proof-of-concept are publicly available.
Status: Apple has not confirmed, no updates available.
Description: Voice-over-IP (VoIP) phones that use the Aredfox chipset are vulnerable to a session-hijacking vulnerability. If an administrator logs into the phone's web-based administrative interface, that session can be easily hijacked by an attacker to execute arbitrary commands with adminitrative privilege. Note that the attacker's session is valid only so long as the administrator is logged in. A simple proof-of-concept for this vulnerability is available.
Status: Aredfox has not confirmed, no updates available.
Description: Apple has released a patch for the QuickTime RTSP URL handler buffer overflow, described in the @RISK volume 6, issue 1. This patch should be automatically downloaded via the Software Update facility on Mac OS X. Windows users may need to manually download an updated version of QuickTime.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5351 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.