A tough week - probably worse than it appears. Substantial numbers of critical vulnerabilities were reported for users of widely deployed software - Microsoft Bluetooth, Internet Explorer, and DirectX, Apple QuickTime and Cisco and other vendors' SNMP. But also in the less visible world of web applications where a massive wave of attacks against web apps became more visible in this week's data - nearly 80 new vulnerabilities in commercial web apps this week alone -- and hundreds of thousands of sites compromised because of flaws in their custom-developed web applications. Several organizations have completed a joint draft benchmarking assessment for web app security. If you are responsible for web app security in a medium or large organization, and have a pretty robust program, yell (apaller@sans.org) and I'll send it to you so you can compare the maturity of your program with those of others. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING SCHEDULE UPDATE - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program http://www.sans.org/info/26774 - - Amsterdam (6/16-6/21) and Brussels (6/16-6/21) http://www.sans.org/secureeurope08 - - Singapore (6/30-7/5) http://www.sans.org/singapore08/ Plus 100 other cites and on line any time: www.sans.org
************************ SPONSORED LINK *******************************
1) Free whitepaper: Five Code RED Security Threats to Windows Servers - - - How to Detect Them http://www.sans.org/info/29569
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Bluetooth is an industry standard, short-range wireless networking protocol. It is often used to provide connectivity for keyboards, mice, cell phones, cameras and printers, among other devices. The Microsoft Windows Bluetooth protocol stack contains a flaw in its handling of Service Discovery Protocol (SDP) packets. A large number of SDP packets could trigger this vulnerability, leading to arbitrary code execution with the kernel-level privileges. Any attacker within Bluetooth range of an affected system could exploit this vulnerability. A computer must be discoverable by Bluetooth to be vulnerable, but otherwise, no authentication is necessary to exploit this vulnerability. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: Microsoft Internet Explorer contains multiple vulnerabilities. Flaws in the handling of script calls to HTML object methods can result in memory corruption. A specially crafted web page containing such calls could exploit this vulnerability to execute arbitrary code with the privileges of the current user. Additionally, a flaw in the handling of HTTP request headers can bypass normal cross-domain protections. A specially crafted web page could trigger this vulnerability, allowing cross-domain information disclosure. Some technical details are available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: DirectX is Microsoft's multimedia authoring programming interface. It contains a flaw in its handling of Motion JPEG (MJPEG) video streams embedded in Advanced System Format (ASF) and Audio-Video Interleave (AVI) streams. It also contains a flaw in its handling of Synchronized Accessible Media Interchange (SAMI) files. These files are used to add captioning to multimedia. A malicious AVI, ASF, or SAMI file could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. AVI, ASF, and SAMI files are often opened by applications upon receipt, without first prompting the user.
Status: Vendor confirmed, updates available.
Description: QuickTime is Apple's streaming media platform for Apple Mac OS X and Microsoft Windows. It contains multiple flaws in its handling of various file formats. A specially crafted PICT, AAC, or QuickTime stream content could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. QuickTime media is generally opened upon receipt, without first prompting the user. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: The Simple Network Management Protocol (SNMP) is an internet-standard protocol to manage and monitor devices on a network. Devices may also be configured to allow modification of their configuration via SNMP. Several versions of SNMP are defined, with the most recent (and increasingly most common) version being 3. Version 3 SNMP requests can be authenticated using a secure hashing algorithm. Several popular implementations of SNMP have a flaw in their handling of this hashing algorithm. A specially crafted SNMP packet could trigger this vulnerability, allowing an attacker to bypass authentication. Depending upon configuration, this would allow an attacker to obtain sensitive configuration information, or modify the configuration of a managed device. Note that an attacker would still need to know a valid username to exploit this vulnerability. Full technical details and a proof-of-concept for this vulnerability are available via source code analysis.
Status: Vendors confirmed, updates available.
Description: OpenOffice.org is a popular open source office suite. It is included by default in most Unix, Unix-like, and Linux operating system distributions. It is also available for Microsoft Windows and Mac OS X. It contains a flaw in its handling of malformed documents. A specially crafted OpenOffice.org document could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. Depending upon configuration, documents may be opened upon receipt without first prompting the user. Full technical details are available for this vulnerability via source code analysis. Note that Star Office, a popular commercial fork of OpenOffice.org is vulnerable as well.
Status: Vendor confirmed, updates available.
Description: FreeType is a popular open source font handling and rendering library. It is used by a variety of applications, including the X.Org X Window System server and the Sun Java Runtime Environment. It contains multiple vulnerabilities in its handling of font files. A specially crafted font file could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. Depending upon which application using the library is compromised, malicious fonts may be opened automatically upon receipt without first prompting the user. Full technical details for these vulnerabilities are publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: Novell GroupWise is a popular enterprise instant messaging application. Its client for Microsoft Windows contains a flaw in its handling of server responses. A specially crafted response from a malicious server could trigger this flaw, leading to a buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the current user. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: The Pragmatic General Multicast protocol (PGM) is an Internet experimental protocol for reliable multicasting. The implementation of this protocol in Microsoft Windows contains multiple denial-of-service vulnerabilities in its handling of PGM streams. A specially crafted PGM packet could trigger one of these vulnerabilities, causing the affected system to crash. Note that PGM is not enabled in the default installation of Microsoft Windows.
Status: Vendor confirmed, updates available.
Description: Microsoft Active Directory is Microsoft's implementation of the Lightweight Directory Access Protocol (LDAP). It contains a denial-of-service vulnerability in its handling of certain LDAP requests. A specially crafted LDAP request could trigger this vulnerability, potentially crashing the affected system. On systems other than Microsoft WIndows 2000, an attacker must have valid authentication credentials to exploit this vulnerability.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.