Microsoft Office products (3) Cisco User Changeable Password (1) and McAfee ePolicy Orchestrator (1) products had critical new vulnerabilities reported this week. The most enticing story aspect of this week's report is that all of the monthly Microsoft vulnerabilities are in Office products like Excel. That doesn't mean they are writing worse code; it means the really bad guys are using fuzzing tools to find zero day vulnerabilities in Word and Excel that they can use to penetrate organizations with otherwise very good security.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************************** Sponsored By SANS **************************
Are you a penetration tester who wants to learn about the latest testing procedures and tools to improve your skills? Come to the Penetration Testing and Ethical Hacking Summit to hear experts discuss policy, process and technical aspects of testing. June 2-3, Las Vegas. http://www.sans.org/info/25688
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP, and SANS' other top-rated courses? - - SANS 2008 in Orlando (4/18-4/25) SANS' biggest program with myriad bonus sessions and a huge exhibition of security products: http://www.sans.org/sans2008 - - Washington DC (Tyson's) 3/24-3/31 http://www.sans.org/tysonscorner08 - - San Diego (5/9-5/16) http://www.sans.org/securitywest08 - - Toronto (5/10-5/16) http://www.sans.org/toronto08 - - and in 100 other cites and on line any-time: www.sans.org
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Excel contains multiple vulnerabilities in its handling of a variety of Excel document features. Failure to properly parse Excel files could lead to a variety of memory corruption vulnerabilities. A specially crafted Excel file containing one of these features could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that, on recent versions of Microsoft Office, Excel files are not opened upon receipt without user interaction. Some technical details are publicly available for these vulnerabilities. At least one of these vulnerabilities is being actively exploited in the wild.
Status: Microsoft confirmed, updates available.
Description: Microsoft Outlook fails to properly sanitize the contents of "mailto:" URLs that are passed to it as arguments. A "mailto:" URL is used to provide a link to an email address. On Microsoft Windows, clicking a "mailto:" URL will invoke the application associated with "mailto:" URLs; this is often Outlook. A specially crafted "mailto:" URL could bypass sanitization, allowing for the injection of arbitrary commands. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary commands with the privileges of the current user. Some technical details are publicly available for this vulnerability.
Status: Microsoft confirmed, updates available.
Description: Microsoft Office contains a flaw in its handling of Microsoft Excel and Office files. A specially crafted file could trigger one of two memory corruption vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that, on recent versions of Microsoft Office, documents are not opened upon receipt without user interaction. Some technical details are publicly available for these vulnerabilities.
Status: Microsoft confirmed, updates available.
Description: Cisco User Changeable Password is a Cisco utility to provide password and other authentication credential updates via a web-based interface. It contains multiple buffer overflow vulnerabilities in its handling of user input. A specially crafted request would allow an unauthenticated attacker to exploit one of these buffer overflows. Successfully exploiting one of these buffer overflows would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that this may afford the attacker access to an authentication database, potentially leading to further exploitation. Note that full technical details and a proof-of-concept are publicly available for this vulnerability. An additional cross-site-scripting vulnerability was also discovered in this product.
Status: Cisco confirmed, updates available.
Description: McAfee ePolicy Orchestrator is an enterprise policy management framework. It contains a format string vulnerability in its logging subsystem. A specially crafted request could trigger this vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details and a proof-of-concept are publicly available for this vulnerability. Note that other products using the McAfee Framework may also be vulnerable.
Status: McAfee has not confirmed, no updates available.
Description: The Microsoft Office Web Components are a collection of ActiveX controls used for manipulating office documents. They contain several flaws in their handling of method calls. A specially crafted web page that instantiated one of these components could trigger a memory corruption vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user.
Status: Microsoft confirmed, updates available. Users can mitigate the impact of these vulnerabilities by disabling the affected controls via Microsoft's "killbit" mechanism for CLSIDs "0002E533-0000-0000-C000-000000000046", "0002E530-0000-0000-C000-000000000046", "0002E510-0000-0000-C000-000000000046", and "0002E511-0000-0000-C000-000000000046".
Description: MaxDB is an enterprise database system from SAP. It contains multiple flaws in its handling of user requests. A specially crafted user request could trigger one of several memory corruption vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that some versions of MaxDB are open source, and these versions are presumed vulnerable. Therefore, technical details for these vulnerabilities are publicly available via source code analysis.
Status: SAP confirmed, updates available. Users can mitigate the impact of these vulnerabilities by blocking access to TCP port 7210.
Description: RealPlayer provides some of its functionality on Microsoft Windows via an ActiveX control. This control contains a flaw in its handling of its "Console" property. A specially crafted web page that instantiates this control could trigger this flaw, leading to memory corruption. Successfully exploiting this corruption would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details are publicly available for this vulnerability, as is a proof-of-concept.
Status: Real has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control using Microsoft's "killbit" mechanism using CLSIDs "2F542A2E-EDC9-4BF7-8CB1-87C9919F7F93" and "CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA".
Description: Adobe Form Designer is a tool allowing developers to deploy forms as HTML or PDF documents. The Adobe Form Client is used to view this documents. A specially crafted form file could trigger one of multiple vulnerabilities in the affected application. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. No technical details are publicly available for these vulnerabilities.
Status: Adobe confirmed, updates available.
Description: Timbuktu Pro is a remote computer management product. It contains a flaw in its handling of files uploaded to a remotely managed computer. A specially crafted upload request could trigger a directory traversal vulnerability, allowing the attacker to place a file in any location on the system. A proof-of-concept for this vulnerability is available. Note that this vulnerability does not allow already-existing files to be overwritten or replaced. Authentication may be required to exploit this vulnerability; this is unconfirmed.
Status: Vendor has not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.