@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By SANS ****************************
SAVE BIG! Get 30% off of any of these courses when you sign up for OnDemand's pre-paid program. SEC 309: Intro to Information Security, SEC503: Intrusion Detection In-Depth, AUD507: Auditing Networks, Perimeters and Systems will all be available by July 31, 2007. For more information please contact ondemand@sans.org.
************************************************************************* TRAINING UPDATE: The early registration discount for SANS 2007 expires in three weeks. SANS 2007 is the world's largest security training conference with 56 immersion courses and a huge expo. It is in San Diego March 29 - April 5. Complete program: http://www.sans.org/sans2007/event.php *************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Office contains a memory corruption vulnerability in the processing of certain file formats. A specially-crafted file could exploit this vulnerability and execute arbitrary code with the privileges of the current user. This vulnerability is reported as being actively exploited in the wild. Currently, the public exploit is using Microsoft Excel files, but other file formats may be vulnerable. The extent of exploitation in the wild is currently believed to be very low. Note that Microsoft Office documents are not opened by default on versions of Office after Office 2000, or if the Office Document Confirmation Tool has been installed. No technical details for this vulnerability are believed to be publicly available.
Status: Microsoft confirmed, no updates available.
Description: Sun Solaris ships by default with a vulnerable version of the FreeType open source font engine. A specially-crafted font file could result in an integer overflow, and lead to arbitrary code execution. Depending on system setup, code could be executed with the privileges of the current user, or with root or other privileges. Note that this vulnerability exists only in the older version of FreeType shipped with Solaris; the current version of FreeType is not affected. This issue was discussed in an earlier issue of @RISK.
Status: Sun confirmed, updates available.
Council Site Actions: Only one of the responding council sites is using the affected software. However, they are not specifically running any graphical applications, but they are checking to see if the systems could still be vulnerable. If they find vulnerable systems, they will load the patches during their next regularly scheduled rollout of other system related patches.
Description: Cisco devices that support Voice-over-IP (VoIP), but that are not properly configured for VoIP, are prone to a denial-of-service vulnerability. Currently, the nature of the vulnerability is not publicly known, but has been confirmed to involve traffic on UDP port 5060 and the Session Initiation Protocol (SIP). Note that devices that are properly configured for VoIP are not vulnerable. Users are advised to block UDP port 5060 at the network perimeter, if possible.
Status: Cisco confirmed, updates available.
Council Site Actions: Most of the responding council sites are using the affected software. Their respective network support teams plan to roll-out the patched during their next regularly scheduled system update process.
Description: CHMlib, a library used to read Microsoft Compressed HTML (CHM) files (used commonly for eBooks and online help), contains a memory corruption vulnerability. A specially-crafted CHM file could trigger this vulnerability and execute arbitrary code with the privileges of the current user. Because CHMlib is open source software, technical details for this vulnerability may be discovered via source code analysis.
Status: Vendor confirmed, updates available.
Council Site Actions: Only one of the responding council sites is using the affected software. They have notified their server support team and plan to load the patches during their next regularly scheduled system update process.
Description: Technical details have been publicly posted for a vulnerability patched in Microsoft Security Bulletin MS06-068. A specially-crafted string in a Microsoft Agent file (acf) with a length specified as greater than 0x7FFFFFFF will trigger a buffer overflow. Successful exploitation of this buffer overflow can result in arbitrary code execution with the privileges of the current user. This vulnerability was discussed in a previous issue of @RISK.
Council Site Actions: Most of the responding council sites are already in the process of updating their systems.
Description: Technical details have been publicly posted for a vulnerability patched in Oracle's January Critical Patch Update. A specially-crafted request to the "EmChartBean" component of the Enterprise Manager could exploit a directory traversal vulnerability. Successful exploitation of this vulnerability could disclose arbitrary file contents. This vulnerability was discussed in a previous issue of @RISK.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Technical details have been publicly posted two vulnerabilities in Computer Associates BrightStor ARCserve. Specially-crafted traffic sent to the "LGSSERVER.EXE" process can exploit these vulnerabilities and execute arbitrary code with SYSTEM privileges:
Council Site Actions: Only one of the responding council sites is using the affected software and they plan to load the patches during their next regularly schedule system update process.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5247 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.