Oracle and Microsoft have announced very critical bugs. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - Toronto 5/5-5/13 (15 courses) http://www.sans.org/toronto09/event.php - - SANSFIRE in Baltimore 6/13-6/20 (24 long courses, 12 short courses) http://www.sans.org/sansfire09/event.php - - New Orleans 5/5-5/10 (6 courses) http://www.sans.org/securityeast09/event.php - - Washington DC (Tyson's Corner) 4/14-4/22 (5 long courses and 8 short courses) http://www.sans.org/tysonscorner09/event.php - -- Plus San Diego, Amsterdam and more, too. See www.sans.org - - Log Management Summit in Washington 4/5-4/7 http://www.sans.org/logmgtsummit09/ - - Looking for training in your own community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
********************* SPONSORED LINK **********************************
1) Complete Firewall Security Audits in 25% of the time with Tufin. Learn how and get your free shirt. http://www.sans.org/info/42588
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: There are multiple vulnerabilities that have been identified in Microsoft Internet Explorer. The first issue is an error in the way Internet Explorer locates and open files on the system. This could cause the Internet Explorer to load downloaded files from the desktop rather than the Windows system. The second issue is an error in Windows Internet application programming interface (WinInet), which doesn't correctly use the NTLM credential-reflection protection, when a victim connects to an attacker's server via HTTP protocol. This could cause the user's credentials to be reflected back to the attacker. The third issue exists because of the manner in which Internet Explorer handles transition while navigating between Web pages. This error might lead to memory corruption which might cause arbitrary code execution. The fourth issue is due to an error when Internet Explorer accesses an object that has not been deleted or correctly initialized. This could lead to memory corruption with successful exploitation leading to arbitrary code execution. The fifth issue is also a memory corruption error due the way Internet Explorer accesses an object that has not been deleted or properly initialized. The sixth issue is also a memory corruption error due the way Internet Explorer accesses an object that has not been deleted or properly initialized. In both the cases successful exploitation may lead to arbitrary code execution. And in all the cases, the attacker will have to entice the user in some way to visit the website with the malicious web page.
Status: Vendor confirmed, updates available.
Description: Microsoft Excel, a spreadsheet-application from Microsoft, contains multiple vulnerabilities in its parsing of Excel documents. The first issue is a memory corruption error in "excel.exe" while parsing specially crafted excel documents. The specific error is caused due to improper calculation of memory, which depends on a particular offset and a two-byte value in the document. Successful exploitation might lead to arbitrary code execution. The second issue is the one that is already discussed in http://www.sans.org/newsletters/risk/display.php?v=8&i=9#widely1. The vendor has provided a patch for it in the latest release. User interaction is needed to exploit these vulnerabilities since, in most configurations; users will be prompted before opening the potentially malicious Excel files. Some technical details are publicly disclosed.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows HTTP Services (WinHTTP), which provides developers with an HTTP client API to send requests to other HTTP servers via HTTP protocol, has got multiple vulnerabilities. The first issue is an error due to the way the WinHTTP Services handle specific values returned from a remote web server without proper validation. This could ultimately lead to remote code execution. An attacker needs to entice the victim to visit the malicious web server. The second issue is an error caused due to lack of proper checks of the distinguished name in the digital certificate by the WinHTTP Services. The combination of DNS spoofing with this vulnerability could allow an attacker to spoof a digital certificate of a Web Site that uses WinHTTP services. The third issue is caused due to WinHTTP services not correctly handling NTLM credential-reflection protections when a user connects to an attacker's web server. This could cause the user's credentials to be reflected back to the attacker. An attacker needs to entice the victim to visit the malicious web server to carry out this attack.
Status: Vendor confirmed, updates available.
Description: Oracle has released a cumulative security patch for a wide range of products on July 15, 2009. This Critical Patch Update contains 43 new security fixes across different products. Flaws addressed in this update include remote code execution vulnerabilities, SQL injection vulnerabilities, elevation of privilege, Format string vulnerability and information disclosure vulnerabilities. Successfully exploiting one of the vulnerabilities could potentially allow an attacker to execute arbitrary code or SQL queries with the privileges of the database user. Authentication is not required to exploit some of these vulnerabilities but for some vulnerabilities authentication is required. Technical details regarding some of the security issues have been publicly posted.
Status: Vendor confirmed, updates available.
Description: WordPad, a simple text editor, is a default component of Microsoft Windows. Text converters in WordPad allow users who do not have Microsoft Office Word installed to open documents in Microsoft Windows Write (.wri) and Microsoft Office Word 6.0, Microsoft Office Word 97, 2000, 2002 (.doc) file formats. WordPad and the Office Text converters have multiple vulnerabilities which can be triggered by opening a specially crafted Word 6 file, or Word 97 document, or WordPerfect 6.x document. The first issue is a memory corruption error in WordPad and Office Text converters, specifically in Word 6 converter, while processing malformed Word 6 file. The second issue is memory corruption vulnerability in Microsoft WordPad while parsing specially crafted Word 97 document. The user needs to open the malformed Word 97 document with the affected version of WordPad for this vulnerability to work. The third issue is stack corruption vulnerability in WordPerfect 6.x Converter included in Microsoft Office Word 2000 while parsing a specially crafted WordPerfect 6.x document. The user needs to open the malformed WordPerfect document with Microsoft Office Word 2000 for this vulnerability to work. The fourth issue is buffer overflow vulnerability in WordPad while parsing a specially crafted Word 97 document. The user needs to open the malformed Word 97 document with the affected version of WordPad for this vulnerability to work. Some technical details are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft DirectShow is the architecture for streaming media produced by Microsoft which provides for capture and playback of multimedia streams. It has a vulnerability while processing specially crafted MJPEG files. The issue is caused due to an error while decompressing the MJPEG content of these specially crafted MJPEG files. Successful exploitation can lead to arbitrary code execution. To carry out this attack, an attacker needs to trick the user into opening the malformed MJPEG file, or the user into receiving a specially crafted streaming content from a Website. Another attack vector is via e-mail, wherein the attacker sends media file, with the malformed MJPEG file embedded in it, as an e-mail attachment and coaxes the user to open the file.
Status: Vendor confirmed, updates available.
Description: SAP GUI is a graphical user interface (GUI) to the SAP Enterprise Resource Planning application. Part of its functionality is provided via KWEdit ActiveX Control. This control contains a possible remote code execution vulnerability in its handling of input. The specific error is that KWEdit ActiveX control (KWEDIT.DLL) has an insecure method "SaveDocumentAs()". This method saves an HTML document to a specified location. When this is used in combination with "OpenDocument()" method an attacker can disclose the contents of some arbitrary files or execute arbitrary code with the privileges of the logged on user. The vendor's patch to this vulnerability is to effectively set a killbit for the ActiveX control.
Status: Vendor confirmed, updates available.
Description: EMC RepliStor provides data recovery and protection for Microsoft Windows platforms. It is exposed to a heap based buffer overflow vulnerability. The specific issue is a buffer overflow error in "ctrlservice.exe" and "rep_srv.exe" services. By sending a specially crafted message to those services over TCP a remote attacker can trigger this vulnerability. No authentication is required to carry out this attack. Successful exploitation might lead to arbitrary code execution.
Status: Vendor confirmed, updates available.
Description: Microsoft Internet Security and Acceleration Server (ISA Server) is a firewalling and security product designed to publish server systems securely. Microsoft Forefront Threat Management Gateway (TMG) is the latest version of ISA server. Both the ISA server and the Forefront TMG have two vulnerabilities which could be exploited to cause a denial-of-service condition or execute arbitrary code. The first issue is an error in the way that a firewall engine handles a TCP session state for Web proxy or Web publishing listeners. This could lead to not used open connections that might eventually lead to a denial-of-service condition. The second issue is caused due to improper input validation in "cookieauth.dll", which is an HTML forms authentication component in ISA Server or Forefront TMG. This could be exploited to carry out cross site scripting attacks, which could lead to running a malicious code on another user's machine, or spoofing, or information disclosure. An attacker will have to convince the user to follow a specially crafted URL sent in an e-mail or Instant Messenger message, to carry out this attack.
Status: Vendor confirmed, updates available.
Description: DivX Web Player is a media player that is used to play HD-quality DivX video in a web browser. There is a heap-based buffer overflow vulnerability in the player which can be triggered via a specially crafted DivX file. The specific issue is an signedness error while processing Stream Format (STRF) chunks within a DivX file. An attacker will have to trick the victim to either visit the website with the malicious DivX file or open the malicious file sent as an email attachment. Successful exploitation may lead to arbitrary code execution.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows SearchPath function is used to search a specified file in a specified path. There is an Elevation of Privilege vulnerability in this function. The specific error is due to the way the SearchPath function in Windows locates and opens files on the system. As a result of this error Internet Explorer could open a specially crafted file from the desktop. There is a blended attack wherein files that are downloaded on the user's system without their notice, might be loaded unintentionally by Internet Explorer from the desktop rather than the Windows system. Successful exploitation might allow an attacker to execute arbitrary code.
Status: Vendor confirmed, updates available.
Description: Multiple Elevation of Privilege Vulnerabilities has been identified in Microsoft Windows. The first issue is an error in Microsoft Distributed Transaction Coordinator (MSDTC) transaction facility, since it leaves the NetworkService token open to be impersonated by any process that calls into it. The second issue is an error caused due to improper isolation of processes running under the NetworkService or LocalService accounts by Windows Management Instrumentation (WMI) provider. This could allow an attacker to gain elevated privileges. The third issue is caused due improper isolation of processes running under the NetworkService or LocalService accounts by RPCSS service. This could allow an attacker to gain elevated privileges and possible code execution. The fourth issue is an error caused due to Windows placing incorrect access control lists (ACLs) on threads in the current ThreadPool. This could also lead to elevated privileges and possible code execution. Technical details are available for them.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 6903 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.