Apple Safari users should ensure their browsers have the latest updates as multiple critical vulnerabilities were fixed in the latest update, and companies that rely on EMC's DiskXtender for enterprise backup should get patched right away. Attackers swarm over back-up vulnerabilities like the ones reported this week in DiskXtender. In fact, back-up products are among the least frequently updated by users. "It ain't broke; don't touch it" seems to be the mindset, but @RISK has shown over and over that backup products have an unending series of security flaws. A good reminder to make sure your software configuration management plans include patching of backup software. ClamAV users and Borland InterBase users also have critical flaws to fix. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored By Sourcefire, Inc. *********************
Learn more about the industry's first 10Gbps IPS _ Sourcefire 3D 9800. It supports copper or fiber networks. Now you can monitor multiple networks from one core. Get high port density and a highly redundant, scalable architecture to handle your high-traffic environment. Call 1.800.917.4134 for more information. http://www.sans.org/info/27858
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, both new Pen Testing courses, CISSP, and SANS' other top-rated courses plus evening sessions with Internet Storm Center handlers. - - SANSFire 2008 in Washington DC (7/22-7/31) SANS' biggest summer program with many bonus sessions and a big exhibition of security products: http://www.sans.org/info/26774 - - London (6/2-6/7) and Amsterdam (6/16-6/21) http://www.sans.org/secureeurope08 - - San Diego (5/9-5/16) http://www.sans.org/securitywest08 - - Toronto (5/10-5/16) http://www.sans.org/toronto08 - - and in 100 other cites and on line any time: www.sans.org
*************************************************************************
************************** Sponsored Links: ***************************
1) Join some of the most advanced application security managers and many people who are just getting their application security program started to learn about the most critical issues and to find the best tools to use resolve them - all at the Application Security Summit June 2-3. http://www.sans.org/info/27863
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Safari is Apple's web browser for its Mac OS X and Microsoft Windows operating systems. It contains multiple vulnerabilities ranging in severity from remote code execution to cross site scripting and address bar spoofing. Flaws in its handling of regular expressions and downloaded files can lead to arbitrary code execution with the privileges of the current user. Note that some of these vulnerabilities are present in portions of Safari that are open source, therefore full technical details may be obtained for these vulnerabilities via source code analysis.
Status: Apple confirmed, updates available.
Description: ClamAV is a popular open source antivirus solution for multiple platforms. Flaws in its handling of a variety of file formats can lead to buffer overflows and memory corruption vulnerabilities. A specially crafted file analyzed by the software could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that, on systems using ClamAV as an email analysis engine, it is sufficient for an email message to transit the server to exploit one of these vulnerabilities; no user interaction is necessary. Full technical details for these vulnerabilities is available via source code analysis. Several proofs-of-concept are publicly available.
Status: ClamAV confirmed, updates available.
Description: EMC DiskXtender is an enterprise backup and data migration application. It exposes several Remote Procedure Call (RPC) interfaces. Several procedures exported by these interfaces contain buffer overflow vulnerabilities. Exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (often SYSTEM). Nominally, these interfaces require authentication, however, several DiskXtender components have hardcoded authentication credentials, allowing attackers to connect to these interfaces. Attackers may also execute arbitrary application commands without exploiting any buffer overflow vulnerabilities by simply connecting to the vulnerable RPC interfaces using the hardcoded credentials.
Status: EMC confirmed, updates available.
Description: InterBase is a popular database server from Borland. It contains a buffer overflow in its handling of certain user requests. A specially crafted request from a user could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by blocking access to TCP port 3050 at the network perimeter, if possible.
Description: ICQ is a popular instant messaging application. It contains a flaw in its handling of remote "user status messages". These messages are used to indicate the status of another user, such as "available" or "away". These messages will be rendered by a remote client when querying the user's status. There is a flaw in the handling of these messages. A specially crafted message could trigger a buffer overflow when rendered by a victim's client, allowing an attacker to execute arbitrary code with the privileges of the current user. A user would have to be monitoring the status of an attacker to be vulnerable to this issue. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: CUPS is the Common Unix Printing System, and is the standard printing system on a variety of Unix, Unix-like, and Linux operating systems. It contains a flaw in its handling of Portable Network Graphics (PNG) images. A specially crafted PNG image could trigger one of several integer overflow vulnerabilities. It has been confirmed that successfully exploiting one of these vulnerabilities would allow an attacker to create a denial-of-service condition. It is also believed, but not confirmed, that remote code execution is possible. In most common configurations, attackers would either require authentication or local network access to exploit these vulnerabilities. Full technical details are publicly available on these vulnerabilities, via source code analysis.
Status: Vendor confirmed, updates available.
Description: Rsync is a popular open source file and directory synchronization tool. On certain operating systems, it supports the concept of "extended attributes". These are data associated with files but distinct from the file's content. Rsync fails to properly handle certain extended attribute operations. A specially crafted request involving extended attributes could result in an integer overflow, and potentially allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that the extended attribute functionality is not supported on all platforms, and may be disabled entirely via configuration.
Status: Rsync confirmed, updates available.
Description: Web browsers that are based on the Mozilla codebase, including the popular Firefox web browser, contain a flaw in their handling of certain JavaScript constructs. The JavaScript engine in these browsers has a flaw in its implementation of garbage collection (a method of automatic memory management). A specially crafted JavaScript script embedded in a web page could exploit this vulnerability and lead to a crash. It is not currently believed that this crash could be leveraged to execute arbitrary code, but similar bugs in the past have lead to remote code execution. Full technical details are available for this vulnerability via source code analysis.
Status: Mozilla confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.