CA ArcServe once again joins Microsoft Windows and Office, and Apple in the spotlight for the most critical vulnerabilities discovered this past week. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********** Sponsored By Rapid7 Inc. ***********
NeXpose Unified Vulnerability Management offers the broadest, deepest and most accurate vulnerability scanning across networks, databases and Web applications, helping companies understand the risk certain vulnerabilities can have on its IT environment and ensure its network complies with governmental regulations and corporate security policies. Get more information and a free 20 day evaluation. http://www.sans.org/ info/34243"> http://www.sans.org/ info/34243
************************************************************************* TRAINING UPDATE -- SANS CDI in Washington 30 courses; big security tools expo; lots of evening sessions: http://www.sans.org/ cdi08/ -- Monterey (10/31-11/6) http://www.sans.org/ info/30738 -- Sydney Australia (10/27-11/1) http://www.sans.org/ sydney08/ -- Vancouver (11/17-11/22) http://www.sans.org/ vancouver08/ and in 100 other cites and on line any time: www.sans.org
******************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Active Directory is Microsoft's implementation of the Lightweight Directory Access Protocol (LDAP) and is an integral part of several Microsoft products and operating systems. It contains a buffer overflow vulnerability in its handling of LDAP requests. A specially crafted LDAP request could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process (SYSTEM). Some technical details are publicly available for this vulnerability. Note that only systems running Microsoft Windows 2000 and that are configured to be domain controllers are vulnerable.
Status: Vendor confirmed, updates available.
Description: Microsoft Internet Explorer contains multiple vulnerabilities in its handling of a variety of HTML and web scripting constructs. A specially crafted web page could trigger one of these vulnerabilities, leading to a variety of remote code execution vulnerabilities, cross-site scripting and information disclosure vulnerabilities, and information disclosure vulnerabilities. Any remote code execution would be with the privileges of the current user. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: The Microsoft Host Integration Server is a platform designed to aid in the integration of various applications and data sources on the Microsoft Windows platform. This product exports a Remote Procedure Call (RPC) interface. This interface contains an input validation error in its handling of RPC requests. A specially crafted request could execute arbitrary commands with the privileges of the vulnerable process. Technical details are publicly available for this vulnerability, and a proof-of-concept is publicly available.
Status: Vendor confirmed, updates available.
Description: CUPS is the Common Unix Printing System, a cross-platform printer server and access system. The software was purchased by Apple, and it is an integral part of Apple Mac OS X, but it is available and installed by default on a number of Unix and Linux systems. It contains a flaw in its handling of certain input when processing HP-GL (HP Graphics Language) requests. A specially crafted print request containing malformed HP-GL data could trigger this vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details for this vulnerability are available via source code analysis; a proof-of-concept is also publicly available.
Status: Vendor confirmed, updates available.
Description: Apple Mac OS X contains multiple vulnerabilities in a variety of components. Most of the vulnerabilities stem from older versions of third-party components installed as part of the operating system. However, vulnerabilities in the parsing of Microsoft Excel files and certain image file formats could trigger remote code execution vulnerabilities when the files are opened. The user may not be prompted before opening or viewing a malicious file. Vulnerabilities in third-party components range from remote code execution to cross-site scripting. Numerous local-only vulnerabilities are also addressed in this update. Note that this update also addresses the CUPS vulnerability, discussed above.
Status: Vendor confirmed, updates available.
Description: Computer Associates ARCServe Backup, a popular enterprise backup solution, contains multiple vulnerabilities. A flaw in the processing of Remote Procedure Call (RPC) requests can result in arbitrary command execution with the privileges of the vulnerable process. Additional vulnerabilities can lead to denials-of-service for a variety of subsystems. There are unconfirmed reports of an additional authentication bypass vulnerability. A working proof-of-concept for the remote command execution vulnerability is publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Office contains multiple vulnerabilities in its handling of Excel spreadsheet files. A specially crafted Excel file could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that, on recent versions of Microsoft Office, Excel files are not opened upon receipt without first prompting the user, by default. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: The Microsoft Windows Internet Printing Service is Microsoft's implementation of the Internet Printing Protocol (IPP). IPP is an open protocol used to access printers over a network. Microsoft IIS implements IPP as a service. This implementation contains an integer overflow vulnerability in its processing of IPP responses. A specially crafted request to an ISS server could cause it to connect to a malicious server, and thus exploit this vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that authentication is required to exploit this vulnerability in IIS's default configuration.
Status: Vendor confirmed, updates available.
Description: The Microsoft Message Queueing Service (MSMQ) provides an interprocess and inter-system ability to send messages. This services exports a Remote Procedure Call (RPC) interface. This interface contains a heap-based buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the SYSTEM user. Extensive technical details are publicly available for this vulnerability. Note that the vulnerable subsystem is neither installed nor enabled by default.
Status: Vendor confirmed, updates available.
Description: The Sun Java Web Proxy Server is a component of the Sun Java System collection of server applications. It provides a proxying server for a variety of protocols. It fails to properly handle certain conditions in the processing of FTP resources. A specially crafted HTTP request to the server could cause it to issue an FTP request, triggering the vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Adobe CS3 (Creative Suite 3) is Adobe's suite for authoring rich internet content using the Adobe Flash platform. It contains multiple flaws in its parsing of SWF (commonly called "Flash") files. A specially crafted SWF file could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that, depending upon configuration, malicious files may be opened by the vulnerable application upon receipt. The Adobe Flash Player, used by web browsers, was not found to be vulnerable. Currently only Adobe CS3 for Microsoft Windows is confirmed vulnerable.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.