This week it is Firefox, Thunderbird and the Blackberry that have announced critical security problems. The first two have vulnerabilities related to memory corruption, cross-site scripting, cross-site request forgery, script injection, bypass same origin policy, information disclosure and url spoofing. The Blackberry problem is in handling pdf attachments. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - Toronto 5/5-5/13 (15 courses) http://www.sans.org/toronto09/event.php - - SANSFIRE in Baltimore 6/13-6/20 (24 long courses, 12 short courses) http://www.sans.org/sansfire09/event.php - - New Orleans 5/5-5/10 (6 courses) http://www.sans.org/securityeast09/event.php - -- Plus San Diego, Amsterdam and more, too. See www.sans.org - - Log Management Summit in Washington 4/5-4/7 http://www.sans.org/logmgtsummit09/ - - Looking for training in your own community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Multiple Mozilla products, including the popular Firefox web browser, Thunderbird email client, and SeaMonkey application suite, contain multiple vulnerabilities in their handling of a variety of inputs. Memory corruption, cross-site scripting, cross-site request forgery, script injection, bypass same origin policy, information disclosure and url spoofing are some of the vulnerabilities in these products. Some of these vulnerabilities upon successful exploitation might lead to arbitrary code execution. Full technical details for these vulnerabilities are publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: The Research In Motion BlackBerry is a popular mobile telephone and messaging device. The BlackBerry handheld devices are integrated with an enterprise's messaging infrastructure through BlackBerry Enterprise Server. This server software and the professional software version of BlackBerry have vulnerabilities in the BlackBerry Attachment Service, a service used to view different file formats. The errors are within the PDF distiller component of the Attachment Service. A specially crafted PDF file opened on BlackBerry could trigger this vulnerability. Successful exploitation can lead to arbitrary code execution. Note that a user must first open the PDF on a BlackBerry mobile device for exploitation to occur. No technical details publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Whale Intelligent Application Gateway (IAG) is a VPN solution that provides secure remote access to corporate networks remotely. It installs with "WhlMgr.dll" ActiveX control, which has been identified with multiple stack based buffer overflows. ActiveX control is identified by CLSID:8D9563A9-8D5F-459B-87F2-BA842255CB9A. The specific errors are in the "CheckForUpdates()" and "UpdateComponents()" methods while passing specially crafted arguments to them. A malicious web page that instantiated this control could exploit these vulnerabilities to execute arbitrary code with the privileges of the current user. The user will have to be enticed to visit these malicious pages.
Status: Vendor confirmed, updates available.
Description: Linux kernel is prone to a buffer overflow vulnerability which could be used by attackers to cause a denial-of-service condition or execute arbitrary code on the affected system. The issue is that the handling of unicode string area alignment is wrong in "decode_unicode_ssetup()". This cascaded with the improper buffer sizing for the Common Internet File System (CIFS) serverDomain string can lead to a buffer overflow condition. Technical details for these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, no updates available.
Description: HP StorageWorks is a popular storage management system. Its Storage Mirroring software is vulnerable to remote code execution and denial-of-service attacks. There are unspecified errors which can be used to cause a denial-of-service condition, gain unauthorized access, and execute arbitrary code on the vulnerable system. No other details are provided for these vulnerabilities as yet.
Status: Vendor confirmed, updates available.
Description: Xpdf is a Portable Document Format (PDF) viewer for the X Window System and Motiff. It is open source and runs on almost any Unix-like operating system. Multiple vulnerabilities have been identified in Xpdf which could be triggered by processing a specially crafted PDF file that contain JBIG2 data. There is a buffer overflow error while decoding JBIG2 symbol dictionary segments. There are multiple integer and buffer overflows in the JBIG2 decoder. All these errors stem from "xpdf/JBIG2Stream.cc" file when processing a malicious PDF file. Successful exploitation might lead to arbitrary code execution. Note that, depending on the application and configuration, PDF documents may be opened automatically upon download. Technical details for these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, updates available.
Description: cTorrent is a BitTorrent Client written in C and C++ programming languages and runs on most of Linux based variants. dTorrent is the enhanced version of cTorrent. Both cTorrent and dTorrent have buffer overflow vulnerabilities which can be triggered by a specially crafted torrent file. The specific error is in the "btFiles::BuildFromMI()" function in btfiles.cpp while processing a malicious torrent file. By tricking the user to open a malicious torrent file, an attacker might crash the affected application or execute arbitrary code. Technical details for these vulnerabilities are available via source code analysis and a proof of concept is publicly available.
Status: Vendor confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 6937 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.