Apple Mac OS and Thunderbird's Firefox are on the critical list this week. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored By Sourcefire, Inc. **********************
Your Network Security Isn't Good Enough Anymore
Today's threats-and networks-are dynamic. Unfortunately most network security systems are not.
Join Martin Roesch, Founder and CTO of Sourcefire(r) and Creator of Snort(r), in a series of seminars, as he shows why network security must include full network visibility, relevant context, and automated impact assessment to be effective.
More information http://www.sans.org/info/44859
*************************************************************************
TRAINING UPDATE - - Rocky Mountain SANS, July 7-13 (6 full-length hands-on courses) http://www.sans.org/rockymnt2009/event.php - - SANS Boston, Aug 2-9 (6 full-length hands-on courses) https://www.sans.org/boston09/index.php - - National Forensiscs Summit, July 6-14 http://www.sans.org/forensics09_summit/ Looking for training in your own community? http://sans.org/community/ Save 25% on all On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Amsterdam, London, Dubai, Riyahd, Cairo, Melbourne, Canberra, and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Several products from the Mozilla Foundation such as its popular web browser Firefox, internet suite SeaMonkey, and email client Thunderbird, contain multiple vulnerabilities. The first vulnerability is caused due to errors in browser engine and JavaScript engine and due to errors that could trigger double frame construction. Successful exploitation may lead to memory corruption, which may allow arbitrary code execution. The second issue which allows spoofing of location bar is caused due to invalid Unicode characters being displayed as whitespace characters. The third issue is access to cookies of arbitrary domain, caused due to inadequate checks while handling "file:" protocol. The fourth issue is caused due to improper rendering of the non-200 response to a CONNECT request within the context of the request "Host:" header, which may lead to arbitrary HTML and script execution. The fifth issue is a use-after-free vulnerability caused due to reading memory that's been freed after the destruction of Java object, a destruction caused due to moving away from WebPages while loading a java applet. The sixth issue is the owner document of an element becoming null after garbage collection leading to execution of JavaScript with chrome privileges through malicious event handlers. The seventh issue is unauthorized access to local files caused due to "file:" resource inheriting the principal of the previous loaded document, when loaded on the location bar. The eight issue is a security restriction bypass issue caused due to improper handling of content-loading policies before loading external scripts into XUL documents. The ninth issue allows attackers to execute code with chrome object privileges. Details for these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, updates available.
Description: The Java Runtime Environment installed by default on Apple Mac OS X contains a remote code execution vulnerability. The error is due to improper validation of input to "apple.laf.CColourUIResource" constructor. The first argument to this constructor, which is a long integer, is interpreted as pointer to a C-object. Successful exploitation may allow an attacker to execute arbitrary code on the vulnerable installations, with the privileges of the logged on user. Attacker will have to entice the user to visit the malicious page to carry out this attack.
Status: Vendor confirmed, updates available.
Description: The Apple iPhone and Apple iPod Touch contain multiple vulnerabilities in their handling of a variety of web page contents, certain image, video and document formats, ICMP echo requests, mails, certain untrusted Exchange server certificates and other inputs. Attackers may use these vulnerabilities to bypass security restrictions, cause information disclosure, carry out cross site scripting and cross site request forgery attacks, cause a denial-of-service condition and possibly compromise a system. These vulnerabilities are caused by integer overflows, buffer overflows, integer underflow, use-after-free memory, uninitialized pointers, input validation errors, and etc. Some technical details are publicly available for some of these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Green Dam is a censorship program aimed at blocking pornography or politically sensitive contents. It has got two buffer overflow vulnerabilities. The first issue is a boundary error in the code that processes web requests and since it has a fixed buffer for processing URL's, an overly long URL cause the buffer to overflow. Successful exploitation might allow an attacker to execute arbitrary code. The second issue is in Blacklist Update due to the way Green Dam reads the filter files using unsafe C string libraries. This could lead to buffer overflow and eventually code execution. Technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: IBM AIX, IBM's UNIX-based operating system, contains a remote buffer overflow vulnerability. The specific flaw is a boundary error in the ToolTalk Library "libtt.a" as it doesn't perform adequate checks. For an exploit to be successful the "rpc.ttdbserver" needs to be enabled in "/etc/inetd.conf". Successful exploitation might allow an attacker to execute arbitrary code on the vulnerable system as a root user. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7127 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.