EMC's Autostart's critical vulnerability this week is a keen reminder that the attackers are focusing on back up and security and system management tools because, like the proverbial shoemaker's children, many system management and network security developers have very lax secure coding programs and standards. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - SANS 2009 in Orlando in early March - the largest security training conference and expo in the world. lots of evening sessions: http://www.sans.org/ - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: EMC AutoStart is a popular application failover and restart system for enterprises. It fails to validate certain data in input, and implicitly trusts certain user-suppilied values in requests. These values are treated as pointers to code; a specially chosen value could lead to arbitrary code execution with the privileges of the vulnerable process (SYSTEM). Technical details are available for this vulnerability.
Status: Vendor confirmed, updates available. Users are advised to block access to TCP port 8042 at the network perimeter, if possible.
Description: The MW6 Barcode ActiveX control is a popular control used to create barcodes in a variety of formats. It contains a buffer overflow in its handling of its "supplement" property. A specially crafted web page that instantiated this control and set this property could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "14D09688-CFA7-11D5-995A-005004CE563B".
Description: FFmpeg is a popular media handling library used by a variety of projects and products. It contains an integer conversion vulnerability in its parsing of the 4X media format. A specially crafted 4X media file could trigger this vulnerability, leading to a variety of memory corruption vulnerabilities. These vulnerabilities could be exploited to execute arbitrary code with the privileges of the vulnerable process. Full technical details for this vulnerability are available via source code and patch analysis. The FFmpeg library is used by popular products such as the VLC Media Player, Mplayer, Xine, and others. All products using the library are potentially vulnerable. Note that, depending upon configuration, a malicious media file may be opened by the vulnerable application upon receipt, without first prompting the user.
Status: Vendor confirmed, updates available.
Description: Solaris, Sun's UNIX-based operating system, contains a flaw in its handling of malformed IPv6 traffic. IPv6 is the next generation of the Internet Protocol, the protocol used to transmit essentially all internet traffic. A specially crafted IPv6 packet sent to a vulnerable host could cause that host to crash, leading to a denial-of-service condition. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor confirmed, updates available. A workaround is provided in the vendor's advisory.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.