A LOT of critical vulnerabilities in Mac OS X reported this week. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - - SCADA Security Summit, Stockholm, Oct. 27-30, http://www.sans.org/euscada09_summit/ - - - SANS Chicago North Shore, Oct. 26-Nov. 2, http://www.sans.org/chicago09/ - - - SANS San Francisco, November 9-14, http://www.sans.org/sanfrancisco09 - - - SANS CDI, Washington DC, Dec. 11-18, http://www.sans.org/cyber-defense-initiative-2009 Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus London, Tokyo, Dubai, Sydney Hong Kong, and Vancouver, all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
************************** Sponsored Link: ****************************
Register Today and receive 10% off for SANS vLive course SEC542, Web App Penetration Testing and Ethical Hacking, November 2nd - November 9th. Please use the code @Risk542 when registering. http://www.sans.org/info/48642
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Multiple Vulnerabilities have been identified in Apple Mac OS X in several of its components. Specially crafted input or data handled by one of these components could trigger vulnerability, leading to a variety of exploitable conditions. (a) There is a buffer overflow error in the handling of alias files. (b) There is a memory corruption error in Resource Manager, in its handling of resource forks. (c) Multiple vulnerabilities have been identified in ClamAV 0.94.2, which is distributed only with Mac OS X Server systems. Some of these vulnerabilities might lead to remote code execution. (d) There is an integer overflow error in the handling of images with an embedded ColorSync profile. (e) There is an integer overflow error in Core Graphics, in the way it processes PDF files. (f) There is a heap overflow error in CoreGraphics caused by drawing of long text strings. (g) A null pointer dereference error exists in CUPS. (h) There is a heap overflow error in the CUPS USB backend. (i) Multiple vulnerabilities have been identified in the Adobe Flash Player plug-in. Some of these vulnerabilities might lead to remote code execution. (j) There are multiple memory corruption error in ImageIO, in the way it handles PixarFilm encoded TIFF images. (k) There is a design issue in launch Services, which may cause an unsafe file to be opened automatically. (l) There is a design issue in Launch Services as a result of which there is no warning displayed while attempting to open a downloaded content that's unsafe. (m) There is an implementation issue in MySQL that might lead to escalation of privilege. (n) Multiple vulnerabilities have been identified in PHP 5.2.8, which in some cases might lead to code execution. (o) There is an error in Samba as it fails to perform adequate checks thereby leading to unexpected sharing of folders. (p) There is a cross-site scripting error in the Wiki Server; in the way it handles requests that have non-UTF-8 encoded data.
Status: Vendor confirmed, updates available.
Description: BigAnt is an enterprise instant messaging system with both the instant messaging client and server included. A buffer overflow vulnerability has been identified in the BigAnt messaging server. An overly long HTTP GET request can be used by an attacker to trigger this vulnerability. The specific flaw is an error in "AntServer.exe" module, as it does not perform adequate boundary checks on the HTTP requests. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the logged on user or might lead to a denial-of-service condition. Full technical details for this vulnerability are available along with Proof-of-Concepts.
Status: Vendor confirmed, no updates available.
Description: nginx is an open-source, multi platform HTTP server and mail proxy server. A Buffer underflow vulnerability has been identified in nginx web server. A specially crafted URL can be used by an attacker to trigger this vulnerability. The specific flaw is an error in "ngx_http_parse_complex_uri()" function while processing URL. Successful exploitation might allow an attacker to execute arbitrary code in the context of the vulnerable application or it might lead to a denial-of-service condition. Full technical details for this vulnerability are available via source code analysis.
Status: Vendor confirmed, updates available.
Description: FFmpeg is a cross-platform solution to record, convert and stream audio and video in different formats. An integer overflow vulnerability has been identified in FFmpeg which can be triggered by a specially crafted Video and Music Data (VMD) file. The specific flaw is an error in the "vmd_read_header()" function in the "libavformat/sierravmd.c", as it fails to perform adequate checks while processing VMD files. An attacker will have to entice the user into opening a specially crafted VMD file; either by sending the malicious file as an e-mail attachment or by sending a link, which hosts such a malformed VMD file, in an e-mail message. Successful exploitation might allow an attacker to execute arbitrary code in the context of the application that uses the affected library. Full technical details for the vulnerability are available through source code analysis.
Status: Vendor confirmed, updates available.
Description: httpdx is a Lightweight HTTP and FTP server for Windows. A Format String Vulnerability has been identified in httpdx which can be triggered by a specially crafted HTTP request. The specific flaw is a format string error in the "h_readrequest()" function in the "httpd_src/http.cpp" while processing specially crafted HTTP Host headers. Successful exploitation may result is arbitrary code execution or a denial-of-service condition. Full technical details for this vulnerability are publicly available along with a Proof-of-Concept.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7439 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.