One interesting lesson from this week's report is that critical vulnerabilities are more and more often found in products that are NOT automatically updated.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* SPONSORED BY SANS *****************************
SANS is presenting a special workshop on Sunday, March 2, 2008, prior to the Gartner Wireless & Mobile Summit which is being held March 3-5 at the Hyatt Regency Chicago in Chicago, Illinois.
SANS instructor Matt Luallen will present: Mobile Information Security = People + Operations + Technology. Matt Luallen is one of the many experts you'll be hearing from at this event, which includes 40 analyst-led sessions presenting the latest research and case studies, as well as actionable recommendations for next steps you can implement immediately. Find out more about this event at http://www.sans.org/info/23443
*************************************************************************
SECURITY TRAINING UPDATE: Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP, and SANS' other top-rated courses? - - Las Vegas (3/17 - 3/18) Penetration Testing Summit: (an ultra cool program) http://www.sans.org/pentesting08_summit - - Phoenix (2/11 - 2/18) http://www.sans.org/phoenix08/event.php - - Prague (2/18-2/23): http://www.sans.org/prague08 - - SANS 2008 (4/18-4/25) In Orlando SANS' biggest program with myriad bonus sessions: http://www.sans.org/sans2008 - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
************************** SPONSORED LINK *************************
1) Learn about testing network security and encryption technology. Complimentary Tested with Spirent Security Testing Seminar. http://www.sans.org/info/23448
*********************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Titan FTP Server is a popular enterprise File Transfer Protocol (FTP) server for Microsoft Windows. It contains multiple buffer overflow vulnerabilities in its handling of user-supplied authentication credentials. An overlong username or password passed to the server could trigger these buffer overflows. Successfully exploiting one of these buffer overflows would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). Full technical details and a proof-of-concept are publicly available for this vulnerability. No authentication is required to exploit this vulnerability.
Status: Titan has not confirmed, no updates available.
Description: Yahoo! Jukebox is Yahoo's popular music management service. Part of its functionality is provided by two ActiveX controls, "mediagrid.dll" and "datagrid.dll". These controls contain multiple buffer overflow vulnerabilities in their handling of a variety of parameters. A malicious web page that instantiated one of these controls could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. Multiple proofs-of-concept and technical details are publicly available for these vulnerabilities.
Status: Yahoo! has not confirmed, no updates available. Users can mitigate the impact of these vulnerabilities by disabling the affected controls via Microsoft's "kill bit" mechanism for CLSIDs "22FD7C0A-850C-4A53-9821-0B0915C96139" and "5F810AFC-BB5F-4416-BE63-E01DD117BD6C". Note that this may affect normal application functionality.
Description: Multiple image uploading ActiveX controls contain buffer overflows in their handling of control properties. These controls are used by several web sites to facilitate image uploading. Most importantly, these controls are used by two extremely popular social networking sites, MySpace and Facebook. A specially crafted web page that instantiates one of these controls could exploit this buffer overflow to execute arbitrary code with the privileges of the current user. A proof-of-concept and full technical details are publicly available for this vulnerability.
Status: MySpace has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected controls via Microsoft's "kill bit" mechanism using CLSIDs "48DD0448-9209-4F81-9F6D-D83562940134" and "6E5E167B-1566-4316-B27F-0DDAB3484CF7". Note that this may affect normal application functionality.
Description: eLynx SwiftView is a popular enterprise document printing and viewing system. Part of its functionality is provided via a web browser plugin and an ActiveX control. Both the plugin and control contain a buffer overflow vulnerability. A malicious web page that uses the plugin or instantiates the control could trigger this buffer overflow and allow an attacker to execute arbitrary code with the privileges of the current user. Some technical details are publicly available for this vulnerability.
Status: eLynx confirmed, updates available. Users can mitigate the impact of the ActiveX version of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "7DD62E58-5FA8-11D2-AFB7-00104B64F126". Note that this may affect normal application functionality.
Description: UltaVNC is a client and server package for the Virtual Network Computing (VNC) desktop sharing protocol. Its client component contains a buffer overflow in its handling of protocol negotiation requests. A malicious VNC server could exploit this vulnerability by sending a malformed version string to the client upon connection. A client could also be exploited if the client is run in "listening" mode, in which it acts like a VNC server. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. The UltraVNC server component is not affected. Technical details for this vulnerability are available via source code analysis.
Status: UltraVNC confirmed, updates available.
Description: IrfvanView is a popular image viewing application for Microsoft Windows. Its FlashPix plugin allows it to display FlashPix image files. This plugin contains a memory corruption vulnerability. A specially crafted FlashPix file could exploit this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that, depending upon configuration, FlashPix files may be opened automatically by IrfanView, without first prompting the user. A proof-of-concept and technical details are publicly available for this vulnerability.
Status: IrfvanView has not confirmed, no updates available.
Description: Gnumeric is a popular cross-platform spreadsheet application, developed as part of the GNOME project. It is distributed by default with several Linux and UNIX-like operating system distributions. Versions are also available for Microsoft Windows. Gnumeric contains a memory corruption vulnerability in its handling of Microsoft Excel formatted files. A specially crafted file could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. Full technical details are available for this vulnerability via source code analysis.
Status: Gnumeric confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.