A breather this week - only Castle Rock Computing users have an immediate security action to take. Novell has not yet confirmed the critical vulnerability in its GroupWise product. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored By Rapid7 Inc. ************************
If developers could produce completely secure Web applications 100% of the time, there would be no vulnerabilities in software. Unfortunately, Web 2.0 and Web applications contain many vulnerabilities. Find out what you need to secure Web 2.0 and Web applications.
http://www.sans.org/info/28453
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, both new Pen Testing courses, CISSP, and SANS' other top-rated courses plus evening sessions with Internet Storm Center handlers. - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program with many bonus sessions and a big exhibition of security products: http://www.sans.org/info/26774 - - London (6/2-6/7) and Amsterdam (6/16-6/21) http://www.sans.org/secureeurope08 - - San Diego (5/9-5/16) http://www.sans.org/securitywest08 - - Toronto (5/10-5/16) http://www.sans.org/toronto08 - - and in 100 other cites and on line any time: www.sans.org
*************************************************************************
*************************** SANS Europe 2008 ************************
If you live in the US and missed all 4 chances to attend Ed Skoudis' extraordinary new Penetration Testing and Ethical Hacking course, (because they were all sold out in less than two weeks), we are running it again at SANS Europe in Amsterdam June 16-21. It's a great excuse to take your family to Europe this summer. And if you want to attend Intrusion Detection, Hacker Exploits, Security Essentials, Firewalls and Perimeter Protection, Auditing, Pen Testing Wireless, Securing Windows or other popular SANS courses, they are spread out over Amsterdam, Brussels and London 3 wonderful cities to visit wherever you live in the world. www.sans.org/SecureEurope08
************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: SNMPc is a popular enterprise and workgroup monitoring and management solution from Castle Rock Computing. It uses the Simple Network Management Protocol (SNMP) for large portions of its functionality. SNMP supports various authentication mechanisms, including the concept of a "community" name. When used, this name is included in all requests, and provides a simple authentication mechanism. SNMPc contains a buffer overflow in its processing of certain SNMP TRAP messages. A specially crafted TRAP message containing an overlong community string could trigger this buffer overflow. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually LocalSystem). Technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Novell GroupWise is a popular mail and groupware application. It contains a flaw in its handling of "mailto:" URLs. These URLs are usually embedded in web pages and other documents and allow users to send email to specified addresses when the URL is accessed. If Novell GroupWise is the user's default mail client, a specially crafted mailto URL could trigger a buffer overflow in the application. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the current user. No user interaction other than viewing a malicious web page is necessary for exploitation. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Novell has not confirmed, no updates available.
Description: Trillian is a popular multi-protocol instant messaging client from Cerulean Studios. It contains a flaw in its handling of remote messages. A specially crafted message sent via the MSN instant messaging network containing an overlong nickname field could trigger this flaw, leading to a buffer overflow. It is believed, but not confirmed, that successfully exploiting this overflow would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a simple proof-of-concept for this vulnerability are publicly available.
Status: Cerulean Studios has not confirmed, no updates available.
Description: The HP HPeDiag ActiveX control is installed as part of the Microsoft Windows software suite for various HP LaserJet printers. This control contains multiple vulnerabilities, including multiple insecure methods and a buffer overflow. A malicious web page that instantiated this control could exploit one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. Technical details for these vulnerabilities are publicly available.
Status: HP confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected controls via Microsoft's "kill bit" mechanism. CLSIDs for the affected control are available in HP's advisory, referenced below.
Description: The Akamai Download Manager is a popular application to assist with downloads. Part of its functionality is provided by an ActiveX control. This control contains a remote code execution vulnerability. A specially crafted web page that instantiates this control could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user.
Status: Akamai confirmed, updates available.
Description: KDE, the K Desktop Environment, is a popular cross-platform desktop environment. Its HTML parsing and rendering engine, KHTML, contains a flaw in its handling of Portable Network Graphics (PNG) files. A specially crafted PNG file could trigger this flaw, leading to a buffer overflow vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details for this vulnerability are publicly available via source code analysis. KDE is the default desktop environment for a number of Linux distributions. Apple's Safari web browser uses a large amount of KHTML code, but it is unknown if Safari is affected.
Status: KDE confirmed, updates available.
Description: IBM Lotus Expeditor is a popular enterprise desktop integration framework. It contains a flaw in its handling of "cal:" URLs. If Expeditor is configured to be the default handler for these URLs, users can be exposed to this vulnerability. A specially crafted web page containing a "cal:" URL could trigger this vulnerability, allowing an attacker to execute arbitrary commands with the privileges of the current user. Technical details and a proof-of-concept are publicly available for this vulnerability.
Status: IBM confirmed, updates available.
Description: Sun Java System Directory Server is an enterprise Lightweight Directory Access Protocol (LDAP) server. It contains a flaw in its handling of user authentication requests. A specially crafted request could bypass authentication, allowing arbitrary users to log in to the system with administrative privileges. The exact nature of the vulnerability is currently unknown; few technical details are publicly available.
Status: Sun confirmed, updates available.
Description: QuickTime is Apple's streaming media framework for Microsoft Windows and Apple Mac OS X. The Windows version is reported to contain a flaw in its handling of user input; a specially crafted data stream could trigger this flaw and allow an attacker to execute arbitrary code with the privileges of the current user. A proof-of-concept reportedly exists in the hands of the discoverer; it is unknown if the proof-of-concept is more widely available. Very few technical details are publicly available for this issue.
Status: Apple has not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.