The big one this week is a critical remote exploitation in Adobe Reader - -- millions and millions of victims of their programming error, and no automatic patching. It's time for the vendors that want to continue to sell to important organizations to take responsibility for active patching. That means Adobe today. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - Phoenix 3/23-3/30 (5 courses) http://www.sans.org/phoenix09/ - - Washington DC (Tyson's Corner) 4/14-4/22 (5 long courses and 8 short courses) http://www.sans.org/tysonscorner09/event.php - - Log Management Summit in Washington 4/5-4/7 http://www.sans.org/logmgtsummit09/ - - Plus Calgary, New Orleans, San Diego and more... - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe Acrobat and Reader have buffer overflow vulnerability while processing malicious JavaScript contained in a specially crafted PDF document. Inadequate checks on the user supplied data as an argument to a javascript "getIcon()" method, leads to buffer overflow. Successful exploitation can lead to arbitrary code execution under the context of the logged on user. Note that the PDF documents are often opened automatically by the vulnerable application without the consent of the user. The user will have to be eniticed on visiting the website hosting the malicious PDF or opening the email having the malicious PDF attachment.
Status: Vendor confirmed, updates available.
Description: The Autonomy KeyView Software Developer's Kit (SDK) provides many file format parsing libraries and are used by many popular vendors, including Lotus Notes and Symantec. It is used to automatically parse and display different document formats one of them being Word Perfect Document (WPD) format. There is a buffer overflow vulnerability in Autonomy KeyView SDK in the "wp6sr.dll", which is used to process the WPD's, as it copies user supplied data while processing certain records without adequate checks. A specially crafted Word Perfect Document when processed by an application using the vulnerable version of Autonomy keyView SDK can cause a buffer overflow followed with arbitrary code execution if the overflow attempt is successful. In some products the attack vector will be via an email attachment with the user having to view the malicious file, however is some cases no user inteaction is required. Some individual vendors have provided some workarounds like for symantec disable "content filtering" and for Lotus Notes disable WPD processing by commenting out specific lines in keyview.ini for any references to "wp6sr.dll". Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: GNOME is a desktop environment for a GNU/Linux or UNIX computer. The base64 encoding and decoding functions in glib has integer overflow vulnerabilities. The user supplied data and platform specifics are used to calculate the heap memory and the flaw resides in the manner in which this is calculated. This can result in overflow condition while processing large strings of data. This vulnerability resides in a number of GNOME-related applications as the same code is used in those applications. Details of this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: PPLive is a peer-to-peer (P2P) streaming video network that combines P2P and Internet TV. Their programmes are mostly targeted to Chinese audiences and are also increasing the amount of English programs. There is a command injection vulnerability in PPLive because of inadequate verification of certain parts of URI by the "synacast://", "Play://" ,"pplsv://" and "ppvod://" URI handlers. This can be used to execute arbitrary code for e.g. by enticing a user into visit a malicious webpage and loading a dll from a remote path via the "/LoadModule" switch. The technical details of this security issues have been publicly posted along with proof-of-concepts.
Status: Vendor not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 6724 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.