Mozilla's products - Firefox and Thunderbird in particular, have multiple critical vulnerabilities, and SMTP (Simple mail Transfer Protocol) in Novell Netware Groupwise has a major new buffer overflow reported this week. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** Sponsored By PureWire ***************************
ALERT: Hackers Announce Open Season on Web 2.0 Users and Browsers
Learn how hackers are exploiting your employees Web surfing to gain entry into your network. New technologies such as AJAX and Silverlight are fueling attack methods such as; Clickjacking, XSS and Request Forgery. Recent research shows that 70% of Web sites serving malware are actually legitimate sites. Download this white paper now! https://www.sans.org/info/38418
*************************************************************************
TRAINING UPDATE - - SANS 2009 in Orlando in early March - the largest security training conference and expo in the world. lots of evening sessions: http://www.sans.org/ - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King and Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Novell Netware Groupwise is a popular collaboration and messaging platform. Its Simple Mail Transfer Protocol (SMTP) component contains a vulnerability in its handling of the SMTP 'RCPT' command. A specially crafted RCPT command could trigger a buffer overflow vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually root or SYSTEM). Technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: Multiple Mozilla products, including the popular Firefox web browser, Thunderbird email client, and SeaMonkey application suite, contain multiple vulnerabilities in their handling of a variety of inputs. A specially crafted web page or JavaScript script could trigger one of these vulnerabilities, leading to a variety of exploitable conditions. Full technical details for these vulnerabilities are publicly available via source code analysis. Additionally, cross-site-scripting and information disclosure vulnerabilities were addressed in this update.
Status: Vendor confirmed, updates available.
Description: VNC, or Virtual Network Computing, is a popular protocol for screen and desktop sharing. Multiple VNC clients contain vulnerabilities in their handling of the VNC screen sharing protocol. A malicious server could exploit these vulnerabilities upon access by a user. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Note that users must first connect to the malicious server to be vulnerable; however, depending upon configuration, a VNC client may be opened by clicking on a link in a web page or from an email message. Full technical details are publicly available for some of these vulnerabilities via source code analysis. A proof-of-concept for some of these vulnerabilities is also publicly available.
Status: Vendors confirmed, updates available.
Description: Free Download Manager (FDM) is a popular download and file transfer management application. It contains a flaw in its handling of certain HTTP headers during transfer. A specially crafted HTTP response from a malicious server could trigger a buffer overflow condition. Successfully exploiting this overflow would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details are publicly available via source code analysis. Note that a user would need to connect to a malicious server in order to be compromised.
Status: Vendor confirmed, updates available.
Description: NewsGator FeedDemon is a popular Really Simple Syndication (RSS) reader for Microsoft Windows. RSS is used to syndicate periodically updated web content, and is popularly used with blogs and news websites. A specially crafted RSS feed could trigger a buffer overflow condition in FeedDemon, allowing an attacker to execute arbitrary code with the privileges of the current user. Full technical details are publicly available for this vulnerability. Note that a user must subscribe to a malicious RSS feed to be compromised.
Status: Vendor has not confirmed, no updates available.
Description: Nokia PC Suite is a suite of applications used to manage Nokia mobile devices. It contains a buffer overflow in its multimedia player component's handling of playlist files. A specially crafted playlist file could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the current user. Note that, depending upon configuration, a malicious playlist file may be opened upon receipt, without first prompting the user. Some technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available.
Description: The Sun Fire server series is a popular server platform from Sun. The X2100 and X2200 series servers provide a Lights Out Management (LOM) feature, which can be used to perform limited administration of the system while the system is in a powered-down or otherwise low power state. This feature can be configured to allow administration via the network. A flaw in the validation of login credentials on the X2100 and X2200 series of servers could allow an unauthorized user to log in to the LOM system and execute arbitrary commands with administrative privileges.
Status: Vendor confirmed, updates available. Users are advised to disable network access to the LOM subsystem.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.