Firefox, Thunderbird, Opera, Novell eDirectory and a widely-used C library are all on the "critical list" this week. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************** SPONSORED BY THE SANS THOUGHT LEADERSHIP SERIES ********
Check out the latest interviews in the SANS Thought Leadership series: http://www.sans.edu/resources/securitylab/41/ John Pirc, IBM, ISS Product Line & Services Executive: Security and Intelligent Network Leigh Purdie, InterSect Alliance, co-founder of Snare: Evolution of log analysis Bill Worley, Chief Technology Officer, Secure64 Software Corporation
*************************************************************************
TRAINING UPDATE - - Phoenix 3/23-3/30 (5 courses) http://www.sans.org/phoenix09/ - - Washington DC (Tyson's Corner) 4/14-4/22 (5 long courses and 8 short courses) http://www.sans.org/tysonscorner09/event.php - - Log Management Summit in Washington 4/5-4/7 http://www.sans.org/logmgtsummit09/ - - Plus Calgary, New Orleans, San Diego and more... - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
****************************** Sponsored Link: **************************
1) Listen to industry leaders discuss issues and solutions - Penetration Testing and Ethical Hacking Summit June 1-2 http://www.sans.org/info/39783
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Products based on the Mozilla codebase, including the Mozilla Firefox web browser, contain multiple vulnerabilities in their handing of a variety of inputs. A specially crafted web page or script could trigger one of these vulnerabilities, leading to a variety of exploit conditions. Most severely, a specially crafted web page could result in memory corruption leading to arbitrary code execution with the privileges of the current user. Attackers could also exploit the errors in the PNG library, used by the vulnerable browser, to execute arbitrary code or crash the browser. There is also a same-origin error which can be used to read sensitive information. Technical details for these vulnerabilities is publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: Opera, a popular cross-platform web browser developed by Opera Software Company, has multiple vulnerabilities which can be exploited by attackers to carry out remote code execution, denial-of-service, cross-site scripting attacks. A specially crafted JPEG image file could trigger one of these issues leading to memory corruption. Successful exploitation may allow the attacker to either cause denial-of-service condition or execute arbitrary code in the context of the application. A second unspecified issue related to plug-ins, may be exploited to execute script code in a different domain. There are some unspecified errors of low criticality with no further information. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: libsndfile, a C library for reading and writing files containing sampled sounds, has an integer overflow vulnerability. Some versions of NullSoft Winamp which uses the vulnerable libsndfile code is also affected by this vulnerability. A specially crafted Core Audio Format (CAF) file could be used to trigger this vulnerability, caused mainly due to inadequate boundary checks by libsndfile while processing these CAF files. Successful exploitation can be leveraged by an attacker to execute arbitrary code in the context of the application using the library. Technical details for this vulnerability is publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: Novell eDirectory, a product by Novell, Inc is used for central managing access to resources on multiple servers and computers. The iMonitor component of Novell eDirectory has a buffer overflow vulnerability caused due to inadequate boundary checks on incoming HTTP requests. A specially crafted HTTP request with malformed "Accept-Language" headers could trigger this vulnerability. Successfully exploiting this vulnerability could allow the attackers to execute arbitrary code with system or root privileges. And unsuccessful attempts can lead to a Denial-of-Service condition. Note that as of now a partial update from the vendor is available. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, partial updates available.
Description: NovaNET, a professional network backup from NovaStor, is prone to a buffer overflow vulnerability caused due to errors in 'DtbClsLogin()' function. A specially crafted request with overly long username can trigger this vulnerability during authentication to a NovaNET domain. Successful exploitation can lead to arbitrary code execution on a Linux system and a crash on a Windows system. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, no updates available.
Description: Fujitsu Jasmine2000 Enterprise Edition is prone to multiple vulnerabilities which can be leveraged to cause a denial-of-service, execute arbitrary code or carry out cross-site scripting attacks. By gaining access to a Jasmine Weblink managed website in a particular way, attackers are in a position to cause a buffer to overflow. Successful exploitation may lead to arbitrary code execution or denial of service condition. There is another unspecified error which can be used to inject HTML and script code via cross-site scripting attacks. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Media Commands, a media player for synchronizing and playing media files simultaneously in real time, is prone to a buffer overflow vulnerability. The issue is due to a boundary error while processing playlist files e.g. "m3u", and hence a specially crafted playlist file can be used to trigger this vulnerability. Successful Exploitation can lead to either arbitrary code execution with the privileges of the user running the application or a denial-of-service condition. User interaction is required in that the user has to open the malicious playlist file. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, no updates available.
Description: Hex Workshop is a Hex Editor by BreakPoint Software for the Windows platorm. It has a buffer overflow vulnerability due to a boundary error while processing '.hex' files. A specially crafted '.hex' file could be used by an attacker to trigger this vulnerability. Successful exploitation may allow the attacker to execute arbitrary code with the privileges of the logged on user, or to cause a denial-of-service condition. User interaction is needed where the victim has to open the malicious file with the vulnerable application. Technical details are available in the form of a PoC.
Status: Vendor confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 6599 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.