It's a big week for critical vulnerabilities: Microsoft, SAP, McAfee, Apple QuickTime and IBM Tivoli users all have work to do this week.
Plus, in the complete list you'll find nearly 100 new vulnerabilities this week. More than half are web application errors. And those are the commercial tools. There are *hundreds of thousands* of web applications being written by people for custom web sites; and more than 80% of those have vulnerabilities, too. Does your organization have a secure application development initiative? If yes, please tell us about it. apaller@sans.org
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************Sponsored By Hewlett Packard ***********************
In his latest report, ESG security analyst Jon Oltsik comments that, "This slapdash approach to security management is no longer adequate". Find out why in this informative HP-sponsored webinar based on research with hundreds of security professionals. Discover the latest trends and where your organization ranks in terms of best practices and compliance. http://www.sans.org/info/22083
************************* SECURITY TRAINING UPDATE *********************
Where can you find Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP Prep, and SANS' other top-rated courses? - - Orlando (SANS2008) (4/18-4/25) http://www.sans.org/sans2008 (Our biggest training program) - - San Jose (2/2 - 2/8): http://www.sans.org/siliconvalley08/event.php - - Phoenix (2/11 - 2/18) http://www.sans.org/phoenix08/event.php - - Prague (2/18-2/23): http://www.sans.org/prague08 - - Washington DC (VA) (3/24-3/31) http://www.sans.org/tysonscorner08 - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
*************************** SPONSORED LINK ****************************
1) This winter, train with warm weather and spectacular sunsets as a backdrop. SANS Phoenix 2008, Feb 11-16. http://www.sans.org/info/22088
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Windows contains multiple flaws in its handling of certain network protocols. Flaws exist in the handling of Internet Control Message Protocol (ICMP), Internet Group Management Protocol (IGMP), and Multicast Listener Discovery (MLD). A specially crafted message in one of these protocols could trigger a memory corruption condition in the Windows kernel. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with kernel-level privileges. Note that Router Discovery Protocol (RDP) must be active for systems to be vulnerable to the ICMP processing flaw. This protocol is disabled by default on all versions of Microsoft Windows. Some technical details are publicly available for these vulnerabilities.
Status: Microsoft confirmed, updates available.
Description: SAP MaxDB is a popular enterprise database system. It fails to sanitize arguments to certain internal functions. A specially crafted call containing shell characters to one of these functions would allow an attacker to execute arbitrary commands with the privileges of the vulnerable process. Some of these functions are callable without authentication. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: SAP has not confirmed, no updates available.
Description: McAfee E-Business Server provides encryption services to enterprise clients. It contains a buffer overflow vulnerability in its administrative interface. A specially crafted call to this interface would trigger this buffer overflow and allow an attacker to execute arbitrary code with root-level privileges. No authentication is necessary to exploit this vulnerability. Full technical details and a proof-of-concept are publicly available for this vulnerability. This vulnerability may be related to another vulnerability discussed in a previous edition of @RISK.
Status: McAfee confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking access to TCP port 1718 at the network perimeter, if possible.
Description: Apple QuickTime is Apple's streaming media framework for Apple Mac OS X and Microsoft Windows. It contains a flaw in its handling of responses sent by remote servers when attempting to stream media from them. An overlong Hypertext Transfer Protocol (HTTP) error response could trigger a buffer overflow in QuickTime Player. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the current user. This vulnerability manifests itself when HTTP is used as a fallback from a failed Real Time Transport Protocol (RTSP) connection. Note that QuickTime may launch automatically upon encountering a malicious link, depending upon configuration. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Apple has not confirmed, no updates available.
Description: IBM Tivoli Storage Manager Express is a storage and backup management application from IBM. It contains a heap overflow vulnerability in its handling of client requests. A specially crafted request could exploit this buffer overflow to execute arbitrary code with the privileges of the vulnerable process (often SYSTEM). Note that it appears only versions running on Microsoft Windows are affected. Some technical details for this vulnerability are publicly available.
Status: IBM confirmed, updates available.
Description: Open Group OpenPegasus is an open source implementation of the Common Information Model (CIM) and Web-Based Enterprise Management (WBEM) standards. It is used to manage information technology and enterprise infrastructure. It contains a buffer overflow vulnerability in its authentication subsystem. A specially crafted authentication request could trigger this buffer overflow, and allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details for this vulnerability are available via source code analysis. OpenPegasus is used as a component of some other products, most notable VMWare ESX Server. Other products using OpenPegasus are presumably vulnerable. Note that the vulnerable interface is disabled by default on VMWare ESX Server.
Status: Open Group confirmed, updates available.
Description: AOL Radio is a streaming media service from AOL. Part of its functionality is implemented as an ActiveX control. This control contains a flaw in its "AppendFileToPlaylist" method. A specially crafted web page that instantiates this control could leverage this flaw into a buffer overflow vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Some technical details for this vulnerability are publicly available.
Status: AOL confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism for CLSIDs "B49C4597-8721-4789-9250-315DFBD9F525" and "FA3662C3-B8E8-11D6-A667-0010B556D978". Note that this may affect normal application functionality.
Description: The Gateway Web Launch ActiveX control is used to provide troubleshooting and launch services to users of Gateway computers. It is installed by default on many Gateway systems. This control contains multiple vulnerabilities in its "DoWebLaunch" method. This method does not validate its parameters, leaving it vulnerable to a path traversal attack. Additionally, it contains multiple buffer overflows in the parsing of other arguments. Successfully exploiting either of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Gateway has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "93CEA8A4-6059-4E0B-ADDD-73848153DD5E". Note that this may affect normal application functionality.
Description: Microsoft Visual FoxPro is an integrated development environment for the FoxPro database language. Several ActiveX controls installed by the application contain arbitrary command execution vulnerabilities. These controls provide methods explicitly designed to execute commands upon request, and do not verify the caller. A malicious web page that instantiated one of these controls could exploit one of these vulnerabilities to execute arbitrary code with the privileges of the current user. Multiple proofs-of-concept are publicly available for these vulnerabilities. Note that these vulnerabilities may be related to issues discussed in previous editions of @RISK.
Status: Microsoft has not confirmed, updates are not available. Users can mitigate the impact of these vulnerabilities by disabling the affected controls via Microsoft's "kill bit" mechanism for CLSIDs "008B6010-1F3D-11D1-B0C8-00A0C9055D74" and "A7CD2320-6117-11D7-8096-0050042A4CD2".
Description: The Microsoft Rich Text Box ActiveX control provides a user interface widget for editing Rich Text Format (RTF) documents. This control provides a "SaveFile" method that, when called, will save the contents of the text box to an arbitrary file on the system. A specially crafted web page that instantiated this control would be able to exploit this vulnerability to create or overwrite arbitrary files with the privileges of the current user. A proof-of-concept is publicly available for this vulnerability.
Status: Microsoft has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism for CLSID "B617B991-A767-4F05-99BA-AC6FCABB102E".
Description: VideoLAN Client, known as VLC, is a popular open source multiplatform media player. VLC contains a buffer overflow in its handling of Session Description Protocol (SDP) requests. SDP is used to setup media streaming sessions. A specially crafted server responses to a request could trigger this vulnerability and allow an attacker to execute arbitrary code with the privileges of the current user. Note that, depending upon configuration, VLC may be launched automatically when a user accesses media that VLC is configured to play. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: VLC has not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.