Microsoft DirectX DirectShow, Apple QuickTime and Apple iTunes are the top priorities this week. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored By Sourcefire, Inc. ******************
Your Network Security Isn't Good Enough Anymore
Today's threats-and networks-are dynamic. Unfortunately most network security systems are not.
Join Martin Roesch, Founder and CTO of Sourcefire(r) and Creator of Snort(r), in a series of seminars, as he shows why network security must include full network visibility, relevant context, and automated impact assessment to be effective.
More information http://www.sans.org/info/44289
*************************************************************************
TRAINING UPDATE - - SANSFIRE in Baltimore 6/13-6/20 (24 long courses, 12 short courses) http://www.sans.org/sansfire09/event.php - - Rocky Mountain SANS, July 7-13 (6 full-length hands-on courses) http://www.sans.org/rockymnt2009/event.php - - SANS Boston, Aug 2-9 (6 full-length hands-on courses) https://www.sans.org/boston09/index.php - - National Forensiscs Summit, July 6-14 http://www.sans.org/forensics09_summit/ Looking for training in your own community? http://sans.org/community/ Save 25% on all On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Amsterdam, London, Dubai, Riyahd, Cairo, Melbourne, Canberra, and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft DirectX is a multimedia framework for its Windows operating system. The DirectShow, a component of Microsoft DirectX, is used for streaming media on Windows with the ability to capture and playback high quality streams. There is vulnerability in Microsoft's quartz.dll, a part of Microsoft DirectShow platform, in the way it processes QuickTime format files. A specially crafted malicious QuickTime file when opened by a Windows Media Player can trigger this vulnerability. The media playback plug-ins of browsers can also be used as an attack vector wherein an attacker creates a webpage that uses that feature to play the malicious QuickTime file. Successful exploitation will lead to arbitrary code execution. Note that all the versions of Windows Vista and Windows Server 2008 are not affected by this issue. Technical details of the vulnerability are not publicly available.
Status: Vendor confirmed, no updates available.
Description: QuickTime is Apple's streaming media framework for their Mac OS X operating systems and also for Microsoft's Windows operating systems. It contains multiple vulnerabilities in its handling of a variety of media and image files. The specific flaws include a) vulnerability in the decompression of a delta-encoded chunk, b) heap overflow vulnerabilities while parsing malformed .PSD image file, PICT files in .qts, Jopen2000 image files c) heap overflow vulnerability while parsing Clipping Region atom types in QuickTime movie files. Successful exploitation may lead to arbitrary code execution with the privileges of the current user. Most QuickTime supported files are opened upon receipt without any prompts to the user. QuickTime is installed by default on all Apple Mac OS systems, and is installed as part of a variety of Apple products for Microsoft Windows, including iTunes. Some technical details are available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: iTunes is a digital media player by Apple Inc, used for music and media management. There is a stack overflow vulnerability in the URI handlers associated with the iTunes. The specific vulnerable URI handlers are "itms", "itmss", "daap", "pcast", and "itpc", and one reaches the exploit condition when URL's are processed via these protocol handlers. Successful exploitation might lead to arbitrary code execution under the context of the logged in user. Technical details for this vulnerability are available in the form of publicly disclosed Proof-of-Concept. In order to exploit, an attacker will have to entice the unsuspecting user to visit the website hosting the malicious page.
Status: Vendor confirmed, updates available.
Description: Apple Terminal is a terminal emulator, included in Apple's Mac OS X operating system, which allows the user to use the command line interface to interact with the operating system. There is an integer overflow vulnerability in the handling of Terminal window sizes. The specific flaw is in the Terminal.app while handling an xterm escape sequence 'CSI[4', a sequence that handles window resizing. A very low negative value to (x,y) size might result in an integer overflow leading to memory corruption. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the logged in user. In order to exploit, an attacker will have to entice the unsuspecting user to visit the website hosting the malicious page.
Status: Vendor confirmed, updates available.
Description: SafeNet is a supplier of encryption technologies that protect identities, provide secure communications and secure intellectual property. SafeNet SoftRemote is remote access client application from SafeNet, used for connecting users to corporate Virtual Private Networks (VPN) remotely. There is a stack-based overflow vulnerability in some installations of SoftRemote. The specific flaw is in the "ireIke.exe" service, since the process does not handle long requests adequately. This service listens on UDP port 62514. An attacker, by sending an overly long request sent to UDP port 62514, can exploit this vulnerability and execute arbitrary code with SYSTEM credentials. Authentication is not required to carry out this attack.
Status: Vendor has confirmed, updates available.
Description: CUPS is the Common UNIX Printing System, and is the standard printing system on a variety of UNIX, Unix-like, and Linux operating systems. It is an open source printing system developed by Apple for Mac OS X and is their default printer. Multiple integer overflow vulnerabilities were identified in the CUPS "pdftops" filter, which is used to convert PDF files into PostScript. A specially crafted PDF file, if printed, would either crash the "pdftops" or execute arbitrary code as the "lp" user. The denial-of-service vulnerability is in the function "ippReadIO()", in "cups/ipp.c", while processing a specially crafted Internet Printing Protocol (IPP) that has two consecutive "IPP_TAG_UNSUPPORTED" tags. Full technical details are publicly available on these vulnerabilities, via source code analysis.
Status: Vendor has confirmed, updates available.
Description: IBM WebSphere MQ is a family of network communication software from IBM to provide connectivity and integration between independent and non-concurrent applications on distributed systems. There is a buffer overflow vulnerability in WebSphere MQ which can allow attackers to compromise the vulnerable system. The flaw is in the way the MQ server processes inbound data on a client connection, and a specially crafted client request can be used to cause the buffer to overflow. The attackers might need valid authentication under some conditions to exploit this vulnerability. Successful exploitation might lead to arbitrary code execution.
Status: Vendor has confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7070 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.