Some of the most damaging attacks have targeted security and storage products - and this week we report on major new problems with products from EMC (the main enterprise storage control center product), Symantec (BackUp Exec), and several anti-virus vendors.
Registration just opened for the world's biggest security training conference, SANS 2009 in Orlando in early March. This is the SANS program where classes fill up fastest so early registration actually matters. Details at: http://www.sans.org/sans2009 Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored By SANS *********** ******************
Join Storage, Security and Database professionals at the Log Management Summit April 6-7. Get help in selecting and implementing the right log management tools to ensure you meet regulatory requirements and improve security as well as improve operational efficiency. http://www.sans.org/info/35969
*************************************************************************
*************************************************************************
TRAINING UPDATE - - SANS CDI in Washington 30 courses; big security tools expo; lots of evening sessions: http://www.sans.org/ cdi08/ - - Las Vegas (1/24-2/01) http://sans.org/securitywest09/ - - London (12/1- 12/9) http://sans.org/london08/ - - Vancouver (11/17-11/22) http://www.sans.org/ vancouver08/ and in 100 other cites and on line any time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: EMC Control Center is a collection of applications to manage, discover, and monitor enterprise storage and other resources. It contains multiple vulnerabilities in its handling of user requests. A specially crafted "SENDFILE" request could allow an attacker to download arbitrary files from the vulnerable system. A specially crafted "CTGTRANS" object could result in a buffer overflow condition, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process (SYSTEM). Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available. Users are advised to block access to TCP port 10444 at the network perimeter, if possible.
Description: Several antivirus and security gateway solutions have been found to be vulnerable to processing flaws when inspecting PDF documents. It is unknown, but assumed, that at least some of these vulnerabilities arise from the use of the same parsing library by these applications. A specially crafted PDF document could trigger one of these vulnerabilities when processed by a vulnerable application. Successfully exploiting one of these vulnerabilities could have a variety of effects, including arbitrary code execution with the privileges of the vulnerable process. At lease one proof-of-concept is publicly available.
Status: Please check with individual vendors for status.
Description: Symantec Backup Exec, a popular multiplatform backup solution, contains multiple vulnerabilities in its handling of a variety of inputs. Failure to properly validate login credentials can result in an authentication bypass vulnerability. Additionally, a specially crafted request could trigger a buffer overflow condition. Exploiting either of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable system. Versions for Microsoft Windows, Linux, and other systems are affected.
Status: Vendor confirmed, updates available.
Description: The Apple iPhone and Apple iPod Touch contain multiple vulnerabilities in their handling of a variety of web page contents, image formats, document formats, and other inputs. A malicious web page containing or referencing one of these file formats could result in a variety of conditions, including remote code execution. Successful remote code execution would allow an attacker to take complete control of the affected device. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: FlexCell is a popular ActiveX control used to view spreadsheet and other tabular data. It contains an arbitrary file overwrite vulnerability in its "HttpDownloadFIle" method. A specially crafted web page that instantiates this control could trigger this vulnerability, allowing an attacker to overwrite any file with the privileges of the current user. This vulnerability could be leveraged to execute arbitrary code with the privileges of the current user. Technical details are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism.
Description: BlackBerry Desktop Software is the desktop software used to manage a BlackBerry handheld device. Part of its functionality is provided by an ActiveX control, the FlexNET Connect control. This control was previously discovered to contain multiple vulnerabilities. BlackBerry Desktop Software uses a vulnerable version of this control. A specially crafted web page that instantiates this control could trigger these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. Technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.