It's a bad week! The widely used Intel wireless driver can get you infected if you are in range even if you are not connected. Multiple Adobe products have critical vulnerabilities for which Adobe has not yet made a patch available. Oracle has a critical (remote code execution) patch update, but many organizations don't install the patches for long periods of time. OpenOffice.org appears to have vulnerabilities that will open infected files even without user approval. Add to that Active X vulnerabilities in CA-Unicenter and other CA products and in Microsoft Works, and you have a LOT of people with a lot of vulnerabilities they do not know how to patch or they will not be patching soon. A bad week. BTW the only two practicable, large-scale solution to these problems and the hundreds of others like them that will be announced over the next few years is for Microsoft and Apple and the other system vendors to provide a service to other vendors to patch any software that runs on their operating systems. Longer term, the Phase II S-CAP initiative from NSA (with help from NIST) may provide an even more comprehensive solution. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored By SANS Europe 2008 ********************
If you live in the US and missed all 4 chances to attend Ed Skoudis' extraordinary new Penetration Testing and Ethical Hacking course, (because they were all sold out in less than two weeks), we are running it again at SANS Europe in Amsterdam June 16-21. It's a great excuse to take your family to Europe this summer. And if you want to attend Intrusion Detection, Hacker Exploits, Security Essentials, Firewalls and Perimeter Protection, Auditing, Pen Testing Wireless, Securing Windows or other popular SANS courses, they are spread out over Amsterdam, Brussels and London 3 wonderful cities to visit wherever you live in the world. www.sans.org/SecureEurope08
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, both new Pen Testing courses, CISSP, and SANS' other top-rated courses plus evening sessions with Internet Storm Center handlers. - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program with many bonus sessions and a big exhibition of security products: http://www.sans.org/info/26774 - - London (6/2-6/7) and Amsterdam (6/16-6/21) http://www.sans.org/secureeurope08 - - San Diego (5/9-5/16) http://www.sans.org/securitywest08 - - Toronto (5/10-5/16) http://www.sans.org/toronto08 - - and in 100 other cites and online any time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Intel Centrino 2200BG is a popular wireless network (802.11) card, commonly used in laptop computers. Its driver for Microsoft Windows contains a buffer overflow in its handling of wireless network traffic. A specially crafted wireless network frame could trigger this vulnerability, allowing an attacker to execute arbitrary code with kernel level privileges, completely compromising the vulnerable system. The wireless network interface on the vulnerable system need only be in range of the attacker; it need not be connected to any particular wireless network to be vulnerable. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Intel confirmed, updates available. The patch can be accessed through Intel site reverenced below.
Description: Multiple Adobe products contain a buffer overflow in their handling of the Bitmap (BMP) image format. A specially crafted BMP image could trigger this buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability. Note that, depending upon configuration, BMP files may be opened automatically by the vulnerable applications without first prompting the user.
Status: Adobe confirmed, no updates available.
Description: Oracle has released its Critical Patch Update for April of 2008. This update address multiple vulnerabilities ranging in severity from unauthenticated remote code execution with the privileges of the vulnerable process to SQL injection and information disclosure. Some technical details are available for several of these vulnerabilities. Some of these vulnerabilities have been discussed in earlier editions of @RISK.
Status: Oracle confirmed, updates available.
Description: OpenOffice.org is a popular open source office suite. It is included by default in a large number of Unix, Unix-like, and Linux systems. It contains multiple vulnerabilities in its handling of a variety of file formats. A specially crafted Microsoft Office file, Microsoft Extended Metafile file, or Quattro Pro file could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that, depending upon configuration, these files may be opened by default with the vulnerable application without first prompting the user. Full technical details for these vulnerabilities are publicly available via source code analysis. OpenOffice.org shares most of its code with the StarOffice suite; StarOffice is presumed vulnerable to these issues as well.
Status: OpenOffice.org confirmed, updates available.
Description: Microsoft Works is a popular office suite from Microsoft. Part of its functionality is provided by an ActiveX control, "WkImgSrv.dll". This control contains remote code execution vulnerability. A malicious web page that instantiates this control could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. Technical details, and a proof-of-concept are publicly available for this vulnerability.
Status: Microsoft has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "00E1DB59-6EFD-4CE7-8C0A-2DA3BCAAD9C6".
Description: Multiple Computer Associates applications contain the "gui_cm_ctrls.ocx" ActiveX control, used by the "DSM" component of these applications. This control contains a remote code execution vulnerability in its handling of various method parameters. A specially crafted web page that instantiates this control could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. Some technical details are publicly available for this vulnerability.
Status: Computer Associates confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "E6239EB3-E0B0-46DA-A215-CFA9B3B740C5".
Description: The Microsoft HeartbeatCtl ActiveX control is used to play games on the Microsoft Network (MSN) Games site. This control contains a buffer overflow in its handling of its "Host" parameter. A specially crafted web page that instantiated this control could trigger this buffer overflow, and allow an attacker to execute arbitrary code with the privileges of the current user. Technical details for this vulnerability are publicly available.
Status: Microsoft confirmed, updates available. This vulnerability was silently patched in Microsoft Security Bulletin MS07-069. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "E5D419D6-A846-4514-9FAD-97E826C84822". Note that this will affect normal application functionality.
Description: Big Ant Server is an enterprise instant messaging server. It contains a buffer overflow in its handling of user requests. A specially crafted user request could trigger this buffer overflow. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Big Ant has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by blocking TCP port 6080 at the network perimeter. Update (2008-05-19): BigAnt IM Server HTTP GET Request Remote Buffer Overflow Vulnerability has been fixed in new released BigAnt IM Server v2.35. New release can be downloaded from: http://www.bigantsoft.com/download.html
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.