Critical flaws this week in another security product: CA Computer Associates' eTrust, and in another storage product: HP StorageWorks.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING SCHEDULE UPDATE - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program http://www.sans.org/info/26774 - - Amsterdam (6/16-6/21) and Brussels (6/16-6/21) http://www.sans.org/secureeurope08 - - Singapore (6/30-7/5) http://www.sans.org/singapore08/ Plus 100 other cites and on line any time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Computer Associates eTrust Secure Content Manager is a messaging and web content gateway that monitors and secures traffic. It contains multiple vulnerabilities in its handling of remote server responses. If a user connects to a malicious File Transfer Protocol (FTP) server via the secure content manager, the responses from the malicious server could trigger one of several vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). These vulnerabilities could be triggered by links in malicious web pages or emails.
Status: Vendor confirmed, updates available.
Description: StorageWorks is a popular storage management system from HP. Its storage mirroring component contains a flaw in its handling of authentication requests. An overlong authentication request could trigger a stack-based buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that, though this buffer overflow occurs in the processing of authentication requests, no authentication is necessary for exploitation. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available. Users are advised to block TCP ports 1100 and 1106 and UDP port 1105 at the network perimeter, if possible.
Description: Skype is a popular messaging and conferencing application. Among other features, it allows users to send links to one another. Links using the "file:" scheme are validated to ensure that they do not reference executable files. A flaw exists in Skype's verification logic, allowing a specially crafted "file:" link to point to an executable file. Such specially crafted links will not cause Skype to first notify the user that the link points to a potentially harmful executable file. Full technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Sun Java System Active Server Pages is a cross-platform Active Server Pages (ASP) server. It contains multiple vulnerabilities in its handling a variety of user requests. At least one buffer overflow vulnerability is present, allowing arbitrary remote code execution. Other vulnerabilities include authentication bypass, arbitrary file overwrite, directory traversal, and information disclosure vulnerabilities. Full technical details are publicly available for many of these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: The HP Instant Support ActiveX control is used by HP to provide support to HP desktop systems. This control contains multiple vulnerabilities, including several buffer overflows and file overwrite vulnerabilities. A malicious web page that instantiates this control could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "14C1B87C-3342-445F-9B5E-365FF330A3AC". Note that this will affect normal application functionality.
Description: The Akamai Download Manager provides download management facilities. Part of its functionality is provided by an ActiveX control. This control contains an input validation flaw in its handling of its "URL" parameter. A malicious web page that instantiated this control could exploit this vulnerability to download an arbitrary file to an arbitrary location on the victim's computer. This vulnerability could be leveraged to result in arbitrary remote code execution with the privileges of the current user. Full technical details are publicly available for this vulnerability, as is a simple proof-of-concept.
Status: Vendor confirmed, updates available.
Description: Microsoft has released a security advisory stating that a flaw in Apple's Safari web browser can interact with Microsoft Windows in such a way that can lead to remote code execution with the privileges of the current user. Because this flaw is present only due to the interaction of two or more products, it is listed as a "blended threat". The flaw appears to stem from Safari's default download directory (which is the user's desktop directory). Third party articles indicate that this may be related to Microsoft Internet Explorer and may be related to a flaw in Safari referred to as "carpet bombing". Some technical details are publicly available for this vulnerability.
Status: Microsoft confirmed. Apple has not confirmed. Users can mitigate the impact of this vulnerability by changing Safari's default download directory to something other than the user's desktop directory.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.