Real Networks RealPlayer and the SSL capability in MySQL are the newly discovered critical vulnerabilities for this week.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* SECURITY TRAINING UPDATE *********************
Where can you find Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP Prep, and SANS' other top-rated courses? - - San Jose (2/2 - 2/8): http://www.sans.org/siliconvalley08/event.php - - Phoenix (2/11 - 2/18) http://www.sans.org/phoenix08/event.php - - Prague (2/18-2/23): http://www.sans.org/prague08 - - Washington DC (VA) (3/24-3/31) http://www.sans.org/tysonscorner08 - - Orlando (SANS2008) (4/18-4/25) http://www.sans.org/sans2008 - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: YaSSL is an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) standards, used for adding authentication and encryption to network traffic. It contains multiple vulnerabilities in its handling of SSL streams. A specially crafted request from a client could exploit one of these vulnerabilities, and allow an attacker to execute arbitrary code with the privileges of the vulnerable process using the library. Full technical details and proofs-of-concept are publicly available for these vulnerabilities. Note that the popular MySQL database server uses yaSSL; if SSL support is enabled on MySQL, it has been confirmed that it is vulnerable to a pre-authentication code execution attack. A proof-of-concept for the MySQL vulnerability is also publicly available.
Status: YaSSL has not confirmed, no updates available.
Description: Real Networks RealPlayer, a popular streaming media player, and Helix Server, a popular streaming media server, contain an undisclosed remote code execution vulnerability. A specially crafted RealPlayer datastream or Real Time Streaming Protocol (RTSP) request could trigger one of these vulnerabilities and allow an attacker to execute arbitrary code with the privileges of the vulnerable process. RealPlayer content is generally displayed by default, without first prompting the user, and Helix Server generally accepts arbitrary requests. No further technical details are publicly available for this vulnerability, but a proof-of-concept is available for members of the Immunity Security Partners' Program. It is believed that RealPlayer on all supported platforms is vulnerable.
Status: Real Networks has not confirmed, no updates available.
Description: SWF is the native file format for Adobe/Macromedia Flash content. Several tools that automatically generate SWF files for web content do so in an insecure manner, allowing arbitrary injection of JavaScript code. Servers that host these files are vulnerable to a cross site scripting (XSS) attack. Full technical details and multiple proofs-of-concept for these vulnerabilities are publicly available. The advisory indicates that numerous tools are vulnerable; however, only those tools that have have been fixed are listed in the advisory. Several of these vulnerabilities may have been addressed in earlier editions of @RISK detailing updates to individual products.
Status: Vendors confirmed, updates available.
Description: Georgia SoftWorks SSH2 Server is a popular Secure Shell server for Microsoft Windows. Secure Shell is an internet-standard secure data transmission and session protocol. It is often used for remote administration. Georgia SoftWorks SSH2 server contains multiple vulnerabilities in the handling of user input, including two buffer overflows in the handling of log messages and overlong passwords, and a format string vulnerability in the handling of log messages. Successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process, or create a denial-of-service condition. Full technical details and a proof-of-concept are publicly available for these vulnerabilities.
Status: Georgia SoftWorks has not confirmed, no updates available.
Description: "Basic Authentication" is an authentication mechanism defined by the Hypertext Transfer Protocol (HTTP) specification and supported by practically all web browsers. It allows web sites to authenticate users via a username and a password. Most web browsers, including Mozilla Firefox, display the prompt for the username and password in a separate window. In Mozilla Firefox, this window also displays the authentication "realm", which indicates the entity requesting authentication information. Mozilla Firefox fails to properly sanitize the server-provided realm information. A specially crafted web page could exploit this vulnerability to arbitrarily rewrite the realm as displayed to the user. This would allow an attacker to spoof the source of an authentication request, possibly tricking the user into disclosing personal authentication information. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Mozilla has not confirmed, no updates available.
Description: JustSystems Ichitaro is a popular Japanese-language word processor. It contains a buffer overflow in its "JSFC.DLL" component. A specially crafted Ichitaro document could exploit this vulnerability to execute arbitrary code with the privileges of the current user. Note that, depending upon configuration, Ichitaro documents may be opened upon receipt, without first prompting the user. A similar vulnerability in Ichitaro was exploited in 2007 to facilitate worm propagation; this vulnerability was discussed in a previous edition of @RISK.
Status: JustSystems confirmed, updates available.
Description: Libnemesi is a popular open source library used for developing streaming media applications based on internet standards such as the Real Time Streaming Protocol (RTSP). It is a product of the Politecnico di Torino (Polytechnic University of Turin). This library contains multiple vulnerabilities in its handling of streaming media data. A specially crafted file or stream could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the vulnerable application. Applications that use this library are presumably vulnerable to these issues. Full technical details for these vulnerabilities are publicly available via source code analysis. A proof-of-concept is also available.
Status: Politecnico di Torino confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.