The only vulnerability rated CRITICAL this week is a buffer overflow in TrendMicro's antivirus tool. No patch available yet. Notice, however, that more than 100 new vulnerabilities were reported this week - lots of them in web applications. We cannot ask programmers to write safe code if we don't teach them how to do it. SANS has just completed the first major course in secure coding in Java. If you know anyone who builds web apps in Java, tell them we have a special 35% discount on the Secure Coding in Java course April 22-25 in Orlando. (in return for the discount we will ask them to provide critical feedback so we can discover ways to make the course even better). Course info at http://www.sans.org/sans2008/description.php?tid=1937 Get the discount code from Mason Brown at mbrown@sans.org. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************************** Sponsored By SANS **************************
Application security is rapidly passing the other hot areas to be the highest priority investment organizations are making in protecting their growing online presence. Join other professionals at the Application Security Summit June 2-3. Hear what your peers are doing in this space and what the best tools are to address Application Security. http://www.sans.org/info/24649
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, CISSP, and SANS' other top-rated courses? - - SANS 2008 in Orlando (4/18-4/25) SANS' biggest program with myriad bonus sessions and a huge exhibition of security products: http://www.sans.org/sans2008 - - Washington DC (Tyson's) 3/24-3/31 http://www.sans.org/tysonscorner08 - - San Diego (5/9-5/16) http://www.sans.org/securitywest08 - - Toronto (5/10-5/16) http://www.sans.org/toronto08 - - and in 100 other cites and on line any-time: www.sans.org
*************************************************************************
************************* Sponsored Links: ***************************
1) Learn what's effective in penetration testing and vulnerability assessments. Penetration Testing and Ethical Hacking Summit June 2-3. http://www.sans.org/info/24654
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: OfficeScan is an enterprise antivirus product from Trend Micro. It contains a buffer overflow in its handling of passwords when authenticating users. A specially crafted request containing an overlong password could trigger this buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details and multiple proofs-of-concept are publicly available for this vulnerability. Note that some versions of OfficeScan crash rather than allow remote code execution, meaning that on those versions of OfficeScan, this vulnerability is only a denial-of-service. An additional denial-of-service vulnerability is also disclosed in this advisory.
Status: Trend Micro has not confirmed, no updates available.
Description: Mozilla Thunderbird is an email and news client from the Mozilla Foundation. Thunderbird supports Multipurpose Internet Mail Extensions (MIME), a set of extensions to core email protocols to support non-textual data in email messages. A flaw in parsing certain MIME headers could result in a heap buffer overflow. A specially crafted email message could exploit this buffer overflow to execute arbitrary code with the privileges of the current user. This vulnerability can be exploited whenever an email is viewed in Thunderbird. Some technical details are provided in the advisories, and full technical details are available via source code analysis.
Status: Mozilla confirmed, updates available. A workaround is also available, as documented in the iDefense and Mozilla advisories below.
Description: Novell iPrint is a printing technology from Novell that allows users to submit print jobs from web browsers to remote printers using the Internet Printing Protocol (IPP). Part of its functionality is provided by an ActiveX control. This control contains a buffer overflow vulnerability in its "ExecuteRequest" method. A specially crafted web page that invokes this method with an overlong argument could trigger this buffer overflow. Successfully exploiting this flaw would allow an attacker to execute arbitrary code with the privileges of the current user. Some technical details are publicly available for this vulnerability.
Status: Novell confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism. Note that this will impact normal application functionality.
Description: Symantec Scan Engine is a version of Symantec's antivirus engine designed to be included in other products. The engine supports scanning requests submitted via the Internet Content Adaptation Protocol (ICAP). A specially crafted RAR archive file submitted from a remote user could trigger a heap overflow in the scan engine process. Successfully exploiting this overflow would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Note that, depending on how the scan engine is integrated with other products, it may be possible to exploit this vulnerability remotely and without any user interaction. Any product using the scan engine should be considered vulnerable.
Status: Symantec confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking access to TCP port 1344 at the network perimeter, if possible. Also patched in this update is a denial-of-service vulnerability.
Description: ActivePDF is a popular server application for generating Portable Document Format (PDF) files. It contains a flaw in its handling of user requests. A specially crafted packet set to the server could trigger a buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Some technical details are publicly available for this vulnerability.
Status: ActivePDF confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking access to TCP port 53535 at the network perimeter.
Description: ICQ is a popular instant messaging application. It contains a flaw in its handling of received messages. A specially crafted message containing certain formatting characters could trigger a format string vulnerability. Successfully exploiting this vulnerability could allow an attacker to execute arbitrary code with the privileges of the current user. Note that if a user has ICQ configured to accept incoming messages (the default configuration), no user interaction is required to exploit this vulnerability. Some technical details and a simple proof-of-concept are publicly available for this vulnerability.
Status: ICQ has not confirmed, no updates available.
Description: Ghostscript is an open source parsing and display engine for the PostScript (PS) and Portable Document Format (PDF) page description languages. It is the default PS and PDF viewer for a variety of Linux distributions and forms the basis of other PS and PDF viewers. It contains a flaw in its handling of certain PostScript constructions. A specially crafted PS file could trigger this flaw, leading to a stack-based buffer overflow. Successfully exploiting this buffer overflow would allow an attacker to execute arbitrary code with the privileges of the current user. Depending upon configuration, Ghostscript may be used to open PostScript documents upon receipt, without further user interaction. Full technical details for this vulnerability and a proof-of-concept are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.