Apple Macs and Apple Quicktime top the list of software with critical vulnerabilities this week. Red Hat IPA and LANDesk round it out. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored By Sourcefire, Inc. *********************
Best of Open Source Security (BOSS) Conference
February 8-10, 2009 -- Flamingo -Las Vegas
Be sure to register the first IT security conference dedicated to promoting open source security (OSS) technologies and the commercial products that embrace them.
This long overdue conference will bring together passionate OSS advocates and vendors under the same roof to share ideas and experiences.
For more information, visit http://www.sans.org/info/33239
***********************************************************************
TRAINING SCHEDULE UPDATE - - SANSFire 2008 in Washington DC (7/22-7/31) SANS' biggest summer program http://www.sans.org/info/26774 - - Amsterdam (6/16-6/21) and Brussels (6/16-6/21) http://www.sans.org/secureeurope08 - - Singapore (6/30-7/5) http://www.sans.org/singapore08/ Plus 100 other cites and on line any time: www.sans.org *************************************************************************
************************ SPONSORED LINK ******************************* 1) Get real-world forensic techniques from industry-recognized experts at the Forensics & Incident Response Summit October 13-14 in Las Vegas. http://www.sans.org/info/33244 *************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Apple Mac OS X contains multiple vulnerabilities in various subsystems. The impact of these vulnerabilities ranges from remote code execution to information disclosure and denials-of-service. Most of the remote code execution vulnerabilities stem from file parsing vulnerabilities; however one flaw in the included ClamAV distribution may be triggered by malicious emails. Various other local-only and privilege escalation vulnerabilities are addressed in this update.
Status: Vendor confirmed, updates available.
Description: QuickTime is Apple's streaming media framework for Apple Mac OS X and Microsoft Windows. iTunes is Apple's music and media management application, based on QuickTime. QuickTime contains a flaw in its parsing of certain file constructs. A specially crafted QuickTime file could trigger this flaw, leading to memory corruption. It is believed, though not confirmed, that this could be leveraged to allow remote code execution with the privileges of the current user. This flaw could also be executed via a malicious web page if the user has the QuickTime browser plugin installed; this plugin is installed by default along with the QuickTime framework. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Apple has not confirmed, no updates available.
Description: Red Hat Enterprise IPA is an identity management suite for enterprises. It contains a flaw in its installation procedure that stores the master Kerberos password in such a way that it may be retrieved by an anonymous Lightweight Directory Access Protocol (LDAP) request. Kerberos is a password management and authentication protocol. If the master Kerberos password is compromised, it would be possible to retrieve or change the passwords of users managed by Kerberos. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: LANDesk is a popular system management application. It contains a flaw in its QIP Server service component. This component, which listens for requests from the network, contains a buffer overflow in its handling of QIP "heal" packets. A specially crafted packet could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking access to TCP port 1275 at the network perimeter.
Description: Red Hat Directory Server is Red Hat's Lightweight Directory Access Protocol (LDAP) server. It contains a flaw in its handling of parameters to some of the CGI scripts used to manage the server. A specially crafted request to one of these scripts could result in a buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually 'nobody'). It is not known if authentication is required to reach the vulnerable CGI applications. Various other denial-of-service and related vulnerabilities have also been addressed.
Status: Vendor confirmed, updates available.
Description: Trend Micro OfficeScan is a popular enterprise antivirus solution. It contains a flaw in its CGI-based web interface. Its "cgiRecvFile" component fails to properly handle overlong parameters. A specially crafted request to this component could lead to a buffer overflow. This would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Some technical details are publicly available for this vulnerability. It is currently not known if authentication is required to exploit this vulnerability.
Status: Vendor confirmed, updates available.
Description: Data Dynamics ActiveReports is a popular report development system for Microsoft Visual Basic. It contains multiple vulnerabilities in various methods. A malicious web page that instantiated this control could call one of these methods. Successfully exploiting one of these vulnerabilities would allow an attacker to overwrite arbitrary files with the privileges of the current user. This could be leveraged to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "8569D715-FF88-44BA-8D1D-AD3E59543DDE".
Description: Adobe Illustrator is a popular vector graphics drawing program. It contains a flaw in its parsing of its native "Ai" file format. A specially crafted Ai file could trigger this flaw, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that only the versions of Adobe Illustrator for the Apple Macintosh are affected; Microsoft Windows versions are not affected. Depending upon configuration, malicious files may be opened by the vulnerable program upon receipt, without first prompting the user.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
For a free subscription, (and for free posters) or to update a current subscription, visit http://portal.sans.org/