Users of Skype and Cisco Security Agent both have important vulnerabilities to fix right away.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored By Sourcefire, Inc. ******************
Security 3.0: Are You Ready? Sourcefire Webcast Featuring Gartner Security 3.0 is about getting out of reactive mode and into proactive mode by building network security everywhere it can be. Learn how to build up security before, during, and after an attack with this archived Webcast. Watch Security 3.0 Webcast now
http://www.sans.org/info/20601
*************************************************************************
TRAINING UPDATE Where can you find Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP Prep, and SANS' other top-rated courses? - - Washington DC (12/13-12/18): http://www.sans.org/cdi07 - - New Orleans (1/12-1/17): http://www.sans.org/security08/event.php - - San Jose (2/2 - 2/8): http://www.sans.org/siliconvalley08/event.php - - Phoenix (2/11 - 2/18) http://www.sans.org/phoenix08/event.php - - Prague (2/18-2/23): http://www.sans.org/prague08 - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
************************ Sponsored Links: *****************************
1) Utimaco Launches SafeGuard Enterprise 5.2 Raising the Bar on Cross-platform Data Protection http://www.sans.org/info/20606
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Cisco Security Agent is a software suite providing threat protection for various operating systems. The version for Microsoft Windows contains a flaw in its handling of Server Message Block (SMB) requests. A specially crafted SMB request to a system running Cisco Security Agent would allow an attacker to trigger a buffer overflow in kernel-level code. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with kernel-level privileges. Cisco Security Agent is often installed on both desktop and server systems. Some technical details for this vulnerability are publicly available.
Status: Cisco confirmed, updates available.
Description: Skype, a popular internet telephony and messaging application, contains a flaw in its handling of user-supplied URLs. Upon installation on Microsoft Windows systems, Skype registers itself as the handler for __skype4com__ URLs. A specially crafted __skype4com__ URL could trigger a memory corruption vulnerability and allow an attacker to execute arbitrary code with the privileges of the current user. Such URLs could be embedded in web pages or email messages, or otherwise delivered to users remotely. Some technical details for this vulnerability are publicly available.
Status: Skype confirmed, updates available.
Description: HP OpenView Network Node Manager (NNM) is HP(tm)s network and system monitoring component for its OpenView suite of applications. NNM provides several CGI scripts for web-based management of the NNM server. Several of these scripts contain buffer overflow vulnerabilities. A specially crafted request to one of these scripts would allow an attacker to execute arbitrary code with the privileges of the NNM web server process. NNM configuration often includes SNMP community strings and passwords, thus exploiting NNM could allow for easier exploitation of other systems. Full technical details for these vulnerabilities are publicly available. It is believed that these vulnerabilities can be leveraged to gain SYSTEM access.
Status: HP confirmed, updates available.
Description: Avast! Antivirus is a popular antivirus solution for Microsoft Windows. Avast! contains a flaw in its handling of TAR archive files. TAR is a popular format for archive files, usually associated with Unix and Unix-like systems. A specially crafted TAR file could trigger a memory corruption when scanned by the antivirus engine and allow an attacker to execute arbitrary code with the privileges of the virus scanning process. Depending upon configuration, TAR files may be automatically scanned upon download or receipt, without user interaction. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: 3ivx MPEG-4 Codec is a cross-platform media codec for MPEG-4 media streams. This codec contains a buffer overflow in its handling of MPEG-4 data. A specially crafted MPEG-4 stream could trigger this vulnerability and allow an attacker to execute arbitrary code with the privileges of the current user. Depending upon configuration, MPEG-4 streams may be opened by the vulnerable codec without further user interaction. Multiple proofs-of-concept and technical details are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available.
Description: Novell NetMail is an enterprise email system originally from Novell and now maintained by Messaging Architects. NetMail contains an antivirus service used to scan messages for viruses and other malware. This service contains an integer overflow in its handling of messages. The antivirus service runs on a random TCP port; attackers would need to connect to this port to exploit this vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable service. The vulnerability may be exploitable by email messages transiting the server, but this is unconfirmed. Some technical details for the vulnerability are publicly available.
Status: Messaging Architects confirmed, updates available.
Description: HP Select Identity is an identity and permissions management suite from HP. It contains a flaw in its handling of authentication requests. A specially crafted request would allow an attacker to log in without proper credentials. HP Select Identity is often used to authenticate access to enterprise applications and web services, therefore any application using this authentication scheme could be vulnerable. No technical details for this vulnerabilities are believed to be publicly available.
Status: HP confirmed, updates available.
Description: OpenOffice.org is a popular open source office and productivity suite. Its Database component embeds a version of the HSQLDB database engine known to contain a remote code execution vulnerability. A specially crafted OpenOffice.org Database document could trigger this vulnerability and execute arbitrary Java code with the privileges of the current user. Note that, depending upon configuration, such documents may be opened by OpenOffice.org without first prompting the user. OpenOffice.org is installed by default on numerous Unix, Unix-like, and Linux systems and is available for Microsoft Windows and Apple Mac OS X. Sun StarOffice shares a large codebase with OpenOffice.org; it may be vulnerable as well. Full technical details for this vulnerability are available via source code analysis.
Status: OpenOffice.org confirmed, updates available.
Description: Novell BorderManager is an integrated security platform from Novell providing firewall, proxy, and VPN services. BorderManager contains several flaws in its handling of traffic. Specially crafted requests could bypass the web proxy authentication or HTTP content inspection, and a flaw exists in the handling of client trust. Some technical details are publicly available for these vulnerabilities. The HTTP bypass vulnerability may be related to a vulnerability discussed in an earlier edition of @RISK.
Status: Novell confirmed, updates available.
Description: MIT Kerberos is MIT(tm)s implementation of the Kerberos authentication protocol. It forms the basis of numerous vendor(tm)s Kerberos implementations. Several flaws have been discovered in MIT Kerberos, including several memory corruption and integer overflow vulnerabilities. All of these vulnerabilities are of unknown impact, though they have the potential to lead to remote code execution with the privileges of the vulnerable Kerberos process (often root/SYSTEM). Full technical details for these vulnerabilities is publicly available via source code analysis. Vendor implementations of Kerberos based on MIT(tm)s implementation are presumed vulnerable as well.
Status: MIT has not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.