What a Week! Vulnerabilities on the most critical list this week: 1 Microsoft, 2 Apple, 1 Novell, 1 Symantec, and 2 Adobe and 1 ClamAV. Add 9 more "high" criticality vulnerabilities and 3 of moderate criticality and you have the most challenging security week in many months.
Note how many of these vulnerabilities are NOT patched by Microsoft's automatic updaters. Too many companies are not updating applications other than Windows products. That's more than dangerous.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************** Sponsored By SANS ***************************
SANS returns to Denver, Colorado, for SANS Rocky Mountain Bootcamp 2008 June 8-13. A special feature of this event is the evening hands-on lab sessions where senior faculty members will guide you through using the tools presented in class. This may be the most intense and productive learning environment you ever experience! http://www.sans.org/info/23438
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP, and SANS' other top-rated courses? - - SANS 2008 in Orlando (4/18-4/25) SANS' biggest program with myriad bonus sessions and a huge exhibition of security products: http://www.sans.org/sans2008 - - Washington DC (Tyson's) 3/24-3/31 http://www.sans.org/tysonscorner08 - - Prague (2/18-2/23): http://www.sans.org/prague08 - - San Diego (5/9-5/16) http://www.sans.org/securitywest08 - - Toronto (5/10-5/16) http://www.sans.org/toronto08 - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
************************** SPONSORED LINK *************************
1) Learn about testing network security and encryption technology. Complimentary Tested with Spirent Security Testing Seminar. http://www.sans.org/info/23928
*********************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Web Distributed Authoring and Versioning, known as WebDAV, is a protocol allowing filesystem-like access to resources exported via HTTP. The WebDAV mini-redirector is a kernel-level resource in Microsoft Windows that allows systems to transparently access WebDAV resources. The WebDAV mini-redirector contains a heap-based buffer overflow in its handling of WebDAV traffic. A malicious WebDAV server could exploit this vulnerability, allowing an attacker to execute arbitrary code with SYSTEM privileges. Note that WebDAV resources can be accessed by clicking links on web pages or email messages. Technical details are publicly available for this vulnerability.
Status: Microsoft confirmed, updates available.
Description: Apple has released Security Update 2008-001, addressing multiple vulnerabilities in Mac OS X. Vulnerabilities in URL handling, photocasts and web page rendering can lead to arbitrary code execution with the privileges of the current user. Flaws in the handling of network accessible filesystems can lead to arbitrary code execution with root or kernel level privileges. Additional vulnerabilities can lead to denials-of-service or privilege escalation. Some technical details are available via source code analysis, and technical details for other vulnerabilities are publicly available.
Status: Apple confirmed, updates available.
Description: Apple QuickTime is Apple's streaming media framework, available for both Apple Mac OS X and Microsoft WIndows. On Microsoft Windows, some functionality is provided by an ActiveX control. This ActiveX control contains multiple vulnerabilities in its handling of parameters passed to various methods. A malicious web page that instantiates this control could exploit one of these vulnerabilities to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for these vulnerabilities. Note that the affected control is installed along with Apple iTunes and Apple Safari.
Status: Apple has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "02BF25D5-8C17-4B23-BC80-D3488ABDDC6B". Note that this may affect normal application functionality.
Description: The Novell Client for Microsoft Windows allows Windows users to access services provided by Novell servers. The client contains a Remote Procedure Call (RPC) interface that is exposed by default. Various methods exported by this interface contain buffer overflow vulnerabilities. A specially crafted call to one of these methods would allow an attacker to exploit these vulnerabilities and execute arbitrary code with SYSTEM privileges. Novell had patched this vulnerability, but it was discovered that the patch contains a logical flaw re-exposing the original vulnerability. The original vulnerability was discussed in an earlier edition of @RISK.
Status: Novell confirmed, updates available.
Description: Symantec Backup Exec System Recovery Manager is a popular enterprise backup component. It contains a web-based administration interface. This interface provides facilities to upload files to the server. The file upload component fails to properly validate the paths given to it by users. A specially crafted request would allow an attacker to upload an arbitrary file to any location on the administration server. The administration server runs with SYSTEM privileges and this vulnerability can be leveraged to run arbitrary code with SYSTEM privileges. A proof-of-concept is publicly available for this vulnerability.
Status: Symantec confirmed, updates available.
Description: Adobe Reader is Adobe's reader for the Portable Document Format (PDF). Reader contains multiple vulnerabilities in its handling of JavaScript embedded in PDF documents. A specially crafted PDF containing calls to certain JavaScript functions could exploit these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that PDF documents are generally viewed upon receipt, and without further user action. Several proofs-of-concept are publicly available for these vulnerabilities, and these vulnerabilities are being actively exploited in the wild.
Status: Adobe confirmed, updates available.
Description: Adobe Flash Media Server is Adobe's media and data server. It contains multiple vulnerabilities in its handling of user requests. A specially crafted Real Time Messaging Protocol (RTMP) message sent to the server could trigger one of several vulnerabilities. Successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). Some technical details are publicly available for these vulnerabilities.
Status: Adobe confirmed, updates available.
Description: ClamAV is a popular open source antivirus system. It contains multiple vulnerabilities in its parsing of executables. A specially crafted Portable Executable (PE) file or executable file compressed with the MEW application could trigger a memory corruption vulnerability. Successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that, on systems using ClamAV to scan email, it is sufficient for exploitation to have an email transit the system; no user interaction is necessary. Technical details for these vulnerabilities are available via source code analysis.
Status: ClamAV confirmed, updates available.
Description: Microsoft Object Linking and Embedding (OLE) is Microsoft Windows component used for application communication and control. It is related to the ActiveX suite of technologies. OLE contains a flaw in its handling of certain user requests. A specially crafted web page could exploit this flaw, leading to a memory corruption. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user.
Status: Microsoft confirmed, updates available.
Description: Microsoft Word contains a flaw in its handling of certain Word documents. A specially crafted Word document could trigger a memory corruption vulnerability in Word. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Note that on recent versions of Microsoft Office, Word documents are not opened upon receipt without user interaction. Some technical details are publicly available for this vulnerability.
Status: Microsoft confirmed, updates available.
Description: Microsoft Internet Explorer contains multiple vulnerabilities in its handling of a variety of web page elements, image formats, and ActiveX controls. A specially crafted web page containing one of these objects could trigger a memory corruption vulnerability. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user.
Status: Microsoft confirmed, updates available.
Description: Microsoft Office Publisher contains multiple vulnerabilities in its handling of Publisher files. A specially crafted Publisher file could trigger a memory corruption vulnerability upon opening. Some technical details are publicly available for this vulnerability. Note that on recent versions of Microsoft Office, Publisher files are not opened upon receipt without user intervention.
Status: Microsoft confirmed, updates available.
Description: Microsoft Office allows document authors to embed objects in documents. A document with a specially crafted embedded object could trigger a memory corruption vulnerability in Office. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Note that on recent versions of Microsoft Office, documents are not opened upon receipt without user intervention.
Status: Microsoft confirmed, updates available.
Description: The Microsoft Works Converter is used to convert documents created by Microsoft Works into other formats. It contains multiple flaws in its handling of invalid Works documents. A specially crafted Works document could trigger one of these flaws, leading to a memory corruption vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Note that on recent versions of Microsoft Office, documents are not opened upon receipt without user intervention.
Status: Microsoft confirmed, updates available.
Description: IBM DB2 Universal Database (DB2) is IBM's enterprise database. It provides an administrative interface (known as the Administration Server). The Administration Server contains a memory corruption vulnerability due to a failure to validate client input. A specially crafted request could trigger this vulnerability, and it is believed that this vulnerability might allow remote code execution with the privileges of the vulnerable process. Some technical details are available for this vulnerability. Note that an additional local privilege escalation vulnerability was also found in the main DB2 system.
Status: IBM confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking access to TCP port 523 at the network perimeter, if possible.
Description: SAP SAPSprint and SAPlpd are printing components used in the SAP GUI interface to the SAP system. SAPlpd is a server for the Line Printer Daemon Protocol, and SAPSprint is a newer service designed to replace SAPlpd. These products contain multiple vulnerabilities. An attacker who sent a specially crafted request to one of these components could trigger one of these vulnerabilities, allowing the attacker to execute arbitrary code with the privileges of the current user. Multiple proofs-of-concept are publicly available for these vulnerabilities.
Status: SAP confirmed, updates available.
Description: Sun's Java Runtime Environment contains multiple vulnerabilities in its handling of Java applets and applications. A specially crafted applet or application could bypass the normal sandbox provided by the runtime environment. Bypassing the sandbox environment would allow an otherwise untrusted applet or application to modify files or execute arbitrary commands with the privileges of the current user. Note that Java applets embedded in web pages are often run without first prompting the user. Sun's Java Runtime Environment is installed on Apple Mac OS X and many Unix, Linux, and Unix-like systems by default. It is also installed on a large number of Microsoft Windows systems.
Status: Sun confirmed, updates available.
Description: Microsoft Active Server Pages (ASP) is a Microsoft technology for dynamically generating web pages. A flaw in the handling of certain ASP functions could trigger a remote code execution vulnerability on a vulnerable server. Note that an attacker would need access to upload or otherwise insert ASP code into a web page. Note that ASP.NET is not affected by this vulnerability, and the vulnerable versions of the software are not installed by default on recent versions of Microsoft Windows. Note that a proof-of-concept for this vulnerability is available to members of Immunity Security's Partners' Program.
Status: Microsoft confirmed, updates available. References; Microsoft Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms08-006.mspx Proof-of-Concept https://www.immunityinc.com/downloads/immpartners/iisasp.py SecurityFocus BID http://www.securityfocus.com/bid/27676
Description: Apple iPhoto, Apple's photo management application, contains a vulnerability in its handling of "photocasts", or syndicated collections of photos. A specially crafted photocast could trigger this vulnerability, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that the victim must explicitly subscribe to a malicious photocast to be vulnerable.
Status: Apple confirmed, updates available.
Description: MPlayer is a popular cross-platform media player, used predominately on Linux, Unix, and Unix-like systems. It contains multiple vulnerabilities in its processing of media files. A specially crafted movie or audio file could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that, depending on configuration, media content may be opened upon receipt, without user intervention. MPlayer is installed by default on numerous Linux distributions. A proof-of-concept for these vulnerabilities is publicly available, and full technical details are available via source code analysis.
Status: MPlayer has has confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.