Lots of critical problems with Microsoft software this week, but don't miss the critical Apple Safari vulnerability (#5). Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored By AccelOps ****************************
Be sure to register NOW for the Tool Talk Webcast: The Future of SIM and Log Management - Becoming a Part of the Mainstream, IT Operations and Service Delivery:
Enterprises seek to improve service reliability, drive down operational costs and reduce business risks. Are current log management and SIEM solutions potentially sidelining the security professional?
Wednesday, 9/2/09 at 1:00 PM EDT (1700 UTC/GMT) http://www.sans.org/info/47199
*************************************************************************
TRAINING UPDATE - - SANS Network Security, San Diego Sept. 14-22; the Fall's biggest security training conference-- 20 full length courses and 16 short courses plus a big exhibition http://www.sans.org/ns2009 - - SANS Virginia Beach August 28 - Sept. 4. 11 full-length courses plus short courses: http://www.sans.org/vabeach09/ - - The Virtualization and Cloud Security Summit on August 17-18 in Washington; courses in the following days http://www.sans.org/info/43118 Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Atlanta, Canberra, Cairo, Stockholm, Dubai, Dublin & Rome all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
**************************** Sponsored Links: *************************
1) ***NEW*** SANS Free Vendor Audio Casts! Visit the SANS Reading Room http://www.sans.org/info/47204 and click on the Free Vendor Audio Casts link. 2) WEBCAST: How Browser Exploits Lead to Web 2.0 Hacking with keynote from IDC http://www.sans.org/info/47209
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Office Web Components, a collection of Component Object Model (COM) controls used for manipulating office documents, contains multiple vulnerabilities in them. A memory corruption error, heap corruption errors and a buffer overflow error have been reported in Microsoft Office Web Components. A malicious web page that instantiates the vulnerable component could trigger these vulnerabilities and execute arbitrary code with the privileges of the current user. The users will have to be tricked into visiting the website that hosts such a web page, typically by persuading them to click on the links in e-mail messages. Some technical details are publicly available for some of the vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Active Template Library (ATL), a set of C++ classes developed by Microsoft to make programming of Component Object Model (COM) objects easier, has been identified with multiple vulnerabilities. The first issue is an error in the function "CComVariant::ReadFromStream", used in the ATL headers, since it does insufficient checks on the data that is read from a stream. This might result in data being read directly onto the stack thereby resulting in arbitrary code execution. The second issue is caused due to an error in the ATL Load method of the "IPersistStreamInit" interface, which might allow an attacker to execute arbitrary code. The third issue is an uninitialized vulnerability caused due to an error in ATL headers and this allows VariantClear to be called on a VARIANT that has not been initialized correctly. The fourth issue is errors in the ATL headers in the way they instantiate an object from data streams which might allow bypassing of security policies. The fifth issue is an error in the ATL headers caused due to insufficient checks on the variant read from a stream which might allow an attacker to control memory that might be freed unintentionally when the variant was deleted. Some technical details on these vulnerabilities are publicly available. Note that there is some overlap with MS09-035 which was released on July 28th but that addressed vulnerabilities in the Visual Studio Active Template Library (ATL) whereas MS09-037 addresses the ATL vulnerabilities in several Windows components.
Status: Vendor confirmed, updates available.
Description: Remote Desktop Protocol (RDP), a propriety protocol from Microsoft that helps create a virtual session with Windows based applications running on a server, has been identified with multiple vulnerabilities. The first issue is a flaw in Remote Desktop client within "mstscax.dll" while parsing specific parameters returned by the RDP server. This might result in heap overflow in the client and eventually code execution. The second issue is a heap-based buffer overflow in Remote Desktop Web Connection ActiveX control caused due to insufficient checks while processing malformed parameters. A malicious web page that instantiates the vulnerable ActiveX control could trigger this vulnerability and execute arbitrary code with the privileges of the current user. The users will have to be tricked into visiting the website that hosts such a web page, typically by persuading them to click on the links in e-mail messages.
Status: Vendor confirmed, updates available.
Description: Audio Video Interleave (AVI) is a multimedia container format for audio and video data and is used with applications that handle audio-video sequences. Two vulnerabilities have been reported in Microsoft Windows which can be triggered by processing a specially crafted AVI file. One of the vulnerability is caused due to improper handling of AVI files with malformed headers and the second vulnerability is caused due to an integer overflow error in the windows component that parses AVI files. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. An attacker will have to entice the user into opening a malformed AVI file; either by sending the malicious file as an e-mail attachment or by sending a link, which hosts such a malformed AVI file, in an e-mail message.
Status: Vendor confirmed, updates available.
Description: Safari, Apple's web browser for Mac OS X and Microsoft Windows, contains multiple vulnerabilities in its handling of a variety of inputs. A specially crafted web page or URL could trigger one of these vulnerabilities, with a variety of consequences, including remote code execution with the privileges of the current user. The first issue is a heap-based buffer overflow in CoreGraphics in the way it handles long text strings. The second issue is a buffer overflow error in Apple ImageIO in the way it handles EXIF metadata. The third issue is an error in the Top Sites feature which can result in malicious websites promoting sites in the Top Sites view. The fourth issue is a buffer overflow error in WebKit in the way it handles floating point numbers. There is an information disclosure error in WebKit since it allows the "pluginspage" attribute of the "embed" element to reference file URL's. The last issue is an error in International Domain Name (IDN) support and Unicode fonts embedded in Safari which might allow an attacker to direct an unsuspecting user to a spoofed site. Some Technical details for some of these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Internet Name Service (WINS) is a protocol designed to support NetBIOS over TCP/IP and provide a mapping of host names to network addresses. Two vulnerabilities have been identified in WINS which can be triggered by a specially crafted WINS network packet. The first issue is a heap overflow vulnerability caused due to an error in the calculation of buffer length while processing WINS push packets. The second issue is integer overflow vulnerability in WINS caused due to inadequate checks on the data structures within WINS network packets. This vulnerability only affects Windows 2000 server. Note that WINS service is not installed by default on Windows 2000/2003 servers. Successful exploitation of these might allow an attacker to execute arbitrary code. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Telnet Service, a bidirectional communications facility that allows for remote access, has credential reflection vulnerability. The issue is in the way the Telnet service handles NTLM authentication, and more specifically it does not correctly opt in to NTLM credential-reflection protections. As a result of this user's credentials might be reflected back and might be used to gain unauthorized access into the system with the privileges of the user. An attacker will have to set up a crafted Telnet server and will have to entice a user to access the server usually by sending a link to the specially crafted Telnet server, in an e-mail message and convincing the user to click on the link.
Status: Vendor confirmed, updates available.
Description: Multiple Computer Associates products contain remotely-exploitable buffer overflows. The specific flaw is a boundary error in "dtscore.dll" library, which is a token searching routine that copies a user supplied data into a fixed length buffer. A specially crafted message sent to the multiple processes that use this functionality can trigger the vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the user. An attacker doesn't need to be authenticated to exploit this vulnerability.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Workstation Service, a Windows component that supports inter-system communication (including file and printer sharing), contains an elevation of privilege vulnerability. A specially crafted RPC message can be used to trigger this vulnerability. The specific flaw is a "Double-Free" condition occurring in the Workstation Service while processing the arguments for the "NetrGetJoinInformation" function. Successful exploitation might lead to code execution with elevated privileges. An attacker must have valid user credentials to exploit this vulnerability.
Status: Vendor confirmed, updates available.
Description: ASP.NET is a web application framework within the Microsoft .NET framework that allows developers to build web applications and web services. ASP.NET has been identified with a vulnerability which can lead to a denial-of-service condition. A specially crafted HTTP request can be used to trigger this vulnerability. The specific error is an error in ASP.NET in the way it handles request scheduling. Note that only servers with ASP 2.0 hosted on Internet Information Services (IIS) 7.0 and configured in integrated mode are vulnerable to this attack. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: EMC Replication Manager is used to manage EMC replication technologies through a centralized management console. Remote code execution vulnerability has been reported in EMC Replication Manager. The specific flaw resides in irccd.exe" process, which communicates over XML-based protocol and listens by default around TCP port 6700. By supplying a malicious "RunProgram" message to this service, which it accepts without adequate checks, an attacker can execute arbitrary code on the vulnerable system. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7361 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.