RSS

Resumen de Vulnerabilidades - Semana 31

jueves, 28 de julio de 2011

______________________________________________________________________

                                @RISK: The Consensus Security Vulnerability Alert

                                                               Week 31 2011

______________________________________________________________________

Summary of Updates and Vulnerabilities in this Consensus

Platform                                                             Number of Updates and Vulnerabilities

- ------------------------                                    -------------------------------------

Other Microsoft Products                                   1
Third Party Windows Apps                                5 (#2)
Linux                                                                      2
Cross Platform                                                    7 (#1)
Web Application - Cross Site Scripting          2
Web Application - SQL Injection                      2
Web Application                                                  6
Hardware                                                             2

****************************************************************************

Part I -- Critical Vulnerabilities from TippingPoint (www.tippingpoint.com) Widely Deployed Software

(1) HIGH: Apple Safari Multiple Vulnerabilities
(2) MEDIUM: Foxit Reader ActiveX Control Buffer Overflow

*************************** Sponsored Link: ********************************

1) IN CASE YOU MISSED IT...Analyst Webcast: Protecting Access and Data:
A Review of DigitalPersona Pro Version 5.1 To view now, go to:
****************************************************************************

Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys

-- Other Microsoft Products
11.31.1  - Internet Explorer EUC-JP Encoded Characters Cross-Site Scripting

-- Third Party Windows Apps
11.31.2  - Foxit Reader "FoxitReaderOCX" ActiveX Control "OpenFile()" Buffer Overflow
11.31.3  - Kingsoft Antivirus "KisKrnl.sys" Driver Local Privilege Escalation
11.31.4  - CiscoKits CCNA TFTP Server Long Filename Remote Denial of Service
11.31.5  - Download Accelerator Plus ".m3u" File Buffer Overflow
11.31.6  - Computer Associates ARCserve D2D "homepageServlet" Servlet Information Disclosure

-- Linux
11.31.7  - SystemTap Multiple Local Privilege Escalation Vulnerabilities
11.31.8  - IcedTea6 and IcedTea-Web Information Disclosure and Security Bypass Vulnerabilities

-- Cross Platform
11.31.9  - Apple Safari Multiple Security Vulnerabilities
11.31.10 - Likewise Open lsassd Service SQL Injection
11.31.11 - BusyBox "udhcpc" Shell Characters in Response Remote Code Execution
11.31.12 - FreeRADIUS Revoked Certificate Authentication Bypass Vulnerability
11.31.13 - OpenSAML XML Signature Wrapping Security Vulnerability
11.31.14 - ClamAV Hash Manager Off-By-One Denial of Service
11.31.15 - ICQ Profile HTML Injection Vulnerability

-- Web Application - Cross Site Scripting
11.31.16 - Tiki Wiki CMS Groupware "snarf_ajax.php" Cross-Site Scripting
11.31.17 - Koha OPAC Multiple Cross-Site Scripting Vulnerabilities

-- Web Application - SQL Injection
11.31.18 - vBulletin "messagegroupid" Parameter SQL Injection Vulnerability
11.31.19 - ExtCalendar "username" and "password" SQL Injection Vulnerabilities

-- Web Application
11.31.20 - PRADO "TActiveFileUpload.php" Directory Traversal Vulnerability
11.31.21 - Free Help Desk Multiple Unspecified Vulnerabilities
11.31.22 - cgit HTML Injection Vulnerability
11.31.23 - phpMyAdmin Multiple Remote Vulnerabilities
11.31.24 - Musicbox Cross-Site Scripting and SQL Injection Vulnerabilities
11.31.25 - ManageEngine ServiceDesk Plus Local Privilege Escalation

-- Hardware
11.31.26 - Cisco SA 500 Series Appliances Web Management Interface SQL Injection
11.31.27 - Dlink DPH 150SE/E/F1 IP Phones Multiple Remote Vulnerabilities
______________________________________________________________________

PART I Critical Vulnerabilities
Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

*************************************************************

(1) HIGH: Apple Safari Multiple Vulnerabilities
Affected:
Safari 5.0.6
Safari 5.1

Description: Apple has released patches addressing multiple vulnerabilities in its Safari web browser. The vulnerabilities include use-after-free flaws in WebKit's implementation of the FrameOwner element, Scalar Vector Graphics (SVG) markers, DOM attribute copying, and implicitly defined styles for HTML. Other vulnerabilities listed by Apple include problems in underlying libraries like CoreGraphics that could be exploited via multiple vectors. By enticing a target to view a malicious site, an attacker could exploit these vulnerabilities in order to execute arbitrary code on the target's machine.

Status: vendor confirmed, updates available

References:
Vendor Site
Apple Security Advisory
Zero Day Initiative Advisories
SecurityFocus BugTraq ID

*************************************************************

(2) MEDIUM: Foxit Reader ActiveX Control Buffer Overflow
Affected:
Foxit Reader ActiveX Control version 2.0.1.524.
Foxit Reader version 5.0.1.0523.

Description: Foxit has released a patch addressing a buffer overflow vulnerability in its FoxitReaderOCX ActiveX control, which is included in its plugin for FireFox. By enticing a target to view a web site that instantiates this control and sends an overly long string to the strFilePath parameter of its OpenFile() method, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.

Status: vendor confirmed, updates available

References:
Vendor Site
Foxit Security Bulletin
SecurityFocus BugTraq ID

*************************************************************

Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys

This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11861 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
______________________________________________________________________


11.31.1 CVE: Not Available
Platform: Other Microsoft Products
Title: Internet Explorer EUC-JP Encoded Characters Cross-Site Scripting
Description: Microsoft Internet Explorer is a Web browser for Windows platforms. The application is exposed to a cross-site scripting issue.
Specifically, the issue occurs because the application fails to properly sanitize input passed via EUC-JP encoded characters. Internet Explorer versions 6 and 7 are vulnerable.
______________________________________________________________________

11.31.2 CVE: Not Available
Platform: Third Party Windows Apps
Title: Foxit Reader "FoxitReaderOCX" ActiveX Control "OpenFile()"
Buffer Overflow
Description: Foxit Reader is a P2P client for the Microsoft Windows operating platform. Foxit Reader is exposed to a buffer overflow issue because the application fails to perform adequate boundary checks on user-supplied data. This issue affects the "OpenFile()" method of the "FoxitReaderOCX" ActiveX control when passing excessively large amounts of data through the "strfilePath" parameter. Foxit Reader
5.0.1.0523 is vulnerable and other versions may also be affected.
______________________________________________________________________

11.31.3 CVE: Not Available
Platform: Third Party Windows Apps
Title: Kingsoft Antivirus "KisKrnl.sys" Driver Local Privilege Escalation
Description: Kingsoft Antivirus is a security application for Microsoft Windows platforms. The application is exposed to a local privilege escalation issue. This issue affects the "NtQueryValueKey"
function of the "KisKrnl.sys" driver, and is due to a failure to properly bounds check the "ResultLength" buffer. Kingsoft Antivirus
2011.7.8.913 is vulnerable and other versions may also be affected.
______________________________________________________________________

11.31.4 CVE: Not Available
Platform: Third Party Windows Apps
Title: CiscoKits CCNA TFTP Server Long Filename Remote Denial of Service
Description: CiscoKits CCNA TFTP Server is a trivial FTP server application. The application is exposed to a remote denial of service issue. This issue occurs when an overly long filename is provided to the "read" command request. CiscoKits CCNA TFTP Server 1.0 is affected and other versions may also be vulnerable.
______________________________________________________________________

11.31.5 CVE: Not Available
Platform: Third Party Windows Apps
Title: Download Accelerator Plus ".m3u" File Buffer Overflow
Description: Download Accelerator Plus is an application used to accelerate file downloads. The application is exposed to a buffer overflow issue because it fails to perform adequate checks on user-supplied input. Specifically, this issue occurs when processing a ".m3u" file. Download Accelerator Plus 9.7 is vulnerable and other versions may also be affected.
______________________________________________________________________

11.31.6 CVE: Not Available
Platform: Third Party Windows Apps
Title: Computer Associates ARCserve D2D "homepageServlet" Servlet Information Disclosure
Description: Computer Associates ARCserve D2D is a disk-based backup solution. The application is exposed to an information-disclosure vulnerability that affects the "homepageServlet" servlet. An unauthenticated attacker can exploit this issue to obtain the "username" and "password" of the administrator by sending a specially crafted RPC (Remote Procedure Call) request to the affected servlet.
The RPC request will contain a message to the "getLocalHost()"
procedure. Computer Associates ARCServe D2D r15 is vulnerable.
______________________________________________________________________

11.31.7 CVE: CVE-2011-2503,CVE-2011-2502
Platform: Linux
Title: SystemTap Multiple Local Privilege Escalation Vulnerabilities
Description: SystemTap is an application for Linux that is used for gathering system information. The SystemTap runtime tool (staprun) is exposed to multiple local privilege escalation issues. When a request is made for ad hoc module instrumentation via user space probing with a user specified module path, the tool fails to properly enforce the module's path sanity check. A race condition issue exists in the tool when loading modules. Specifically, there is a time gap between performing the module sanity checks and actually loading the module. SystemTap 1.4.6 and SystemTap 1.3.9 are affected.
______________________________________________________________________

11.31.8 CVE: CVE-2011-2514,CVE-2011-2513
Platform: Linux
Title: IcedTea6 and IcedTea-Web Information Disclosure and Security Bypass Vulnerabilities
Description: IcedTea6 is a project based on OpenJDK6. IcedTea-Web is a web browser plug-in implementation of Java Web Start. The applications are exposed to multiple issues. An information disclosure issue exists in the Java Network Launching Protocol (JNLP). 
IcedTea-Web is exposed to a security bypass issue that exists in the Java Network Launching Protocol (JNLP). IcedTea6 versions 1.9.x prior to 1.9.9, 1.8.x prior to 1.8.9, IcedTea-Web versions 1.1.x prior to 1.1.1, 1.0.x prior to 1.0.4 are vulnerable.
______________________________________________________________________

11.31.9 CVE:
CVE-2011-1797,CVE-2011-1462,CVE-2011-1457,CVE-2011-1453,CVE-2011-1288,CVE-2011-0255,CVE-2011-0254,
CVE-2011-0253,CVE-2011-0240,CVE-2011-0238,CVE-2011-0237,CVE-2011-0235,CVE-2011-0234,CVE-2011-0233,
CVE-2011-0232,CVE-2011-0225,CVE-2011-0222,CVE-2011-0221,CVE-2011-0218
Platform: Cross Platform
Title: Apple Safari Multiple Security Vulnerabilities
Description: Apple Safari is a web browser available for Mac OS X and Microsoft Windows. Safari is exposed to multiple security issues that have been addressed in Apple security advisory APPLE-SA-2011-07-20-1.
Safari 5.1 and 5.0.6 running on Apple Mac OS X, Windows 7, XP and Vista are affected.
Ref:
______________________________________________________________________

11.31.10 CVE: CVE-2011-2467
Platform: Cross Platform
Title: Likewise Open lsassd Service SQL Injection
Description: Likewise Open is an authentication solution for Unix and Linux operating systems. The application is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data to the unspecified parameter of the "lsassd"
service before using it in an SQL query. Likewise Open 5.4, 6.0, 6.1 are affected.
Ref:
______________________________________________________________________

11.31.11 CVE: Not Available
Platform: Cross Platform
Title: BusyBox "udhcpc" Shell Characters in Response Remote Code Execution
Description: "udhcpc" is a DHCP client utility which is distributed in the BusyBox application. The client is exposed to a remote code execution issue because it fails to properly escape certain shell meta-characters from DHCP server responses, such as the "hostname"
parameter passed in the option "0x0c". BusyBox 1.18.5 is affected.
______________________________________________________________________

11.31.12 CVE: CVE-2011-2701
Platform: Cross Platform
Title: FreeRADIUS Revoked Certificate Authentication Bypass Vulnerability
Description: FreeRADIUS is an open source implementation of the RADIUS protocol for authentication. The application is exposed to an authentication bypass issue because it allows attackers to use revoked certificates to gain authenticated access to the FreeRADIUS server. This issue occurs in the "ocsp_check()" function of the "rlm_ear_tls.c" source file. Specifically when the "OCSP_basic_verify()" function validates the certificate, it fails to check if the certificate has been revoked. FreeRADIUS versions 2.1.11 and earlier are vulnerable.
Ref:
______________________________________________________________________

11.31.13 CVE: CVE-2011-1411
Platform: Cross Platform
Title: OpenSAML XML Signature Wrapping Security Vulnerability
Description: OpenSAML is an open source library for the Security Assertion Markup Language (SAML) standard. OpenSAML is exposed to a security issue involving XML signature wrapping. This issue occurs in the XML message signing tool, which is used in place of the TLS mechanism when validating certain queries. OpenSAML prior to V2.5.1 are affected.
______________________________________________________________________

11.31.14 CVE: Not Available
Platform: Cross Platform
Title: ClamAV Hash Manager Off-By-One Denial of Service
Description: ClamAV is a multiplatform toolkit used for scanning email messages for viruses. The application is exposed to a denial of service issue due to an off-by-one error in the "cli_hm_scan()" function of the "libclamav/matcher-hash.c" source file. This issue occurs in the hash manager of the application when scanning certain hashes of malicious messages. Versions prior to ClamAV 0.97.2 are vulnerable.
______________________________________________________________________

11.31.15 CVE: Not Available
Platform: Cross Platform
Title: ICQ Profile HTML Injection Vulnerability
Description: ICQ is an instant messaging client. The application is exposed to an HTML injection issue because it fails to properly sanitize user-supplied input to a user's profile. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. ICQ 7.5 and prior running on Windows are vulnerable.
______________________________________________________________________

11.31.16 CVE: Not Available
Platform: Web Application - Cross Site Scripting
Title: Tiki Wiki CMS Groupware "snarf_ajax.php" Cross-Site Scripting
Description: Tiki Wiki CMS Groupware is a PHP-based database management application. The application is exposed to a cross-site scripting issue because it fails to sufficiently sanitize user-supplied data submitted to the "ajax" parameter of the "snarf_ajax.php" script. Tiki Wiki CMS Groupware 7.0 is vulnerable; other versions may also be affected.
______________________________________________________________________

11.31.17 CVE: Not Available
Platform: Web Application - Cross Site Scripting
Title: Koha OPAC Multiple Cross-Site Scripting Vulnerabilities
Description: Koha is a web-based library management system implemented in perl. The application is exposed to multiple cross-site scripting issues in its OPAC (Online Public Access Catalog) interface because it fails to properly sanitize user-supplied input submitted to the following scripts: "opac-downloadcart.pl","opac-addbybiblionumber.pl",
"opac-downloadshelf.pl", "opac-review.pl", "opac-sendshelf.pl", "opac-serial-issues.pl". Koha version 3.2.9 and earlier, 3.4.1 and earlier are vulnerable.
______________________________________________________________________

11.31.18 CVE: Not Available
Platform: Web Application - SQL Injection Vulnerability
Title: vBulletin "messagegroupid" Parameter SQL Injection
Description: vBulletin is a content manager implemented in PHP.
vBulletin is exposed to an SQL injection issue because it fails to sufficiently sanitize user-supplied data submitted to the "messagegroupid" parameter of the "socialgroupmessage.php" script before using it in an SQL query. vBulletin versions 4.0.1 through
4.1.3 are vulnerable; other versions may also be affected.
______________________________________________________________________

11.31.19 CVE: Not Available
Platform: Web Application - SQL Injection
Title: ExtCalendar "username" and "password" SQL Injection Vulnerabilities
Description: ExtCalendar is a powerful multi user web-based calendar application. The application is exposed to multiple SQL injection issues because the application fails to sufficiently sanitize user-supplied data passed to the "username" and "password" cookie parameters before using it in an SQL query. ExtCalendar 2.0 is vulnerable; other versions may also be affected.
______________________________________________________________________

11.31.20 CVE: Not Available
Platform: Web Application
Title: PRADO "TActiveFileUpload.php" Directory Traversal Vulnerability
Description: PRADO is a Web application implemented in PHP. The application is exposed to a directory traversal issue because it fails to sufficiently sanitize user-supplied input passed to the "TActiveFileUpload.php" script. PRADO 3.1.3 and prior versions are affected.
______________________________________________________________________

11.31.21 CVE: Not Available
Platform: Web Application
Title: Free Help Desk Multiple Unspecified Vulnerabilities
Description: Free Help Desk is a Web-based help desk system. The application is exposed to multiple unspecified issues. Free Help Desk versions prior to 1.1b are vulnerable.
______________________________________________________________________

11.31.22 CVE: Not Available
Platform: Web Application
Title: cgit HTML Injection Vulnerability
Description: cgit is a file repository application. The application is exposed to an HTML injection issue because it fails to properly sanitize user-supplied requests. Specifically, the file name is displayed in the rename hint. Versions prior to cgit 0.9.0.2-2 are vulnerable.
______________________________________________________________________

11.31.23 CVE: CVE-2011-2643,CVE-2011-2642
Platform: Web Application
Title: phpMyAdmin Multiple Remote Vulnerabilities
Description: phpMyAdmin is a PHP-based Web application. phpMyAdmin is exposed to multiple issues. An HTML injection issue affects the "table name" field of the "table print view" script. A local file include issue affects the "MIME-type" transformation parameter.
A local file include issue exists because the application fails to sanitize user-supplied input passed to the "PMA_createTargetTable"
function of the "libraries/server_synchronize_lib.php" script. A security issue exists in the "Swekey" authentication may allow attackers overwrite session variables. phpMyAdmin versions prior to
3.3.10.3 and 3.4.3.2 are affected.
______________________________________________________________________

11.31.24 CVE: Not Available
Platform: Web Application
Title: Musicbox Cross-Site Scripting and SQL Injection Vulnerabilities
Description: Musicbox is a web-based application for hosting a music site. It is implemented in PHP. The application is exposed to multiple issues. A SQL injection issue affects the "show"
parameter of the "index.php" script. A cross-site scripting issue affects the "term" parameter of the "index.php" script. Musicbox 3.7 is affected; other versions may also be vulnerable.
______________________________________________________________________

11.31.25 CVE: Not Available
Platform: Web Application
Title: ManageEngine ServiceDesk Plus Local Privilege Escalation
Description: The ManageEngine Applications Manager is a web-based availability and performance monitoring application. ManageEngine is exposed to a local privilege escalation issue. Specifically, the application fails to sanitize data supplied to the "module" parameter of the "BackupSchedule.do" script. ManageEngine ServiceDesk Plus 8 is vulnerable; other versions may also be affected.
______________________________________________________________________

11.31.26 CVE: CVE-2011-2546
Platform: Hardware
Title: Cisco SA 500 Series Appliances Web Management Interface SQL Injection
Description: Cisco SA 500 series appliances provide security solutions. The devices are exposed to an unspecified SQL injection issue because they fail to sufficiently sanitize user-supplied data before using it in an SQL query. Cisco SA520, Cisco SA520W and Cisco
SA540 are affected.
Ref:
______________________________________________________________________

11.31.27 CVE: Not Available
Platform: Hardware
Title: Dlink DPH 150SE/E/F1 IP Phones Multiple Remote Vulnerabilities
Description: Dlink DPH IP phones are wireless IP phones. Dlink DPH IP phones are exposed to multiple remote issues. An authentication bypass issue may allow attackers to obtain device configuration files including the administrators password. An arbitrary file upload issue exists in the web management interface and may allow an attacker to upload configuration files to the affected device. An unauthorized access issue may allow attackers to modify the messages shown on the devices' LCD displays. A denial of service issue may allow attackers to reboot the affected device. Dlink DPH 150SE, Dlink DPH 150E, Dlink DPH 150F1 are affected.
______________________________________________________________________

Informe de Ataques a Web App - IMPERVA

miércoles, 27 de julio de 2011

Robert Freeman de IMPERVA, me ha hecho llegar el primer reporte de ataques sobre aplicaciones web confeccionado por este fabricante…

El análisis muestra que:
Debido a los robot o zombies que automatizan los ataques, las aplicaciones web en promedio, son probadas o atacadas alrededor de 27 veces por hora, En la cúspide de un ataque, las aplicaciones web experimentan cerca de 25.000 ataques por hora. Un dato muy importante al momento de dimensionar infraestructura.

Otro de los datos relevantes de este informe, es la tendencia de que existen cuatro tipos de ataques dominantes contra aplicaciones Web
: Directory Traversal, Cross-Site Scripting, SQL injection y Remote File Inclusion


Además, este informe muestra cuales son los orígenes de los ataques, los cuales se muestran en el siguiente gráfico, y podemos utilizarlos como datos de reputación para el acceso a nuestros sitios web:

También se puede observar varias herramientas de explotación que están siendo utilizadas para automatizar los ataques… que si lo miramos desde un punto de vista ético, podemos utilizarlas como herramientas de Pentesting.

El informe lo pueden descargar desde:


Resumen de Vulnerabilidades - Semana 30

jueves, 21 de julio de 2011

______________________________________________________________________

                               @RISK: The Consensus Security Vulnerability Alert

                                                               Week 30 2011

______________________________________________________________________

Summary of Updates and Vulnerabilities in this Consensus

Platform                                                      Number of Updates and Vulnerabilities
- ------------------------                                             -------------------------------------

Third Party Windows Apps                   3
Linux                                                           1
Solaris                                                         1
Cross Platform                                           14 (#1,#2,#3)
Web Application - SQL Injection           2
Web Application                                       4
Network Device                                         1
Hardware                                                    1 

****************************************************************************
Part I -- Critical Vulnerabilities from TippingPoint (www.tippingpoint.com) Widely Deployed Software

(1) HIGH: Oracle Multiple Products Multiple Vulnerabilities
(2) HIGH: Apple iOS Multiple Vulnerabilities
(3) MEDIUM: Citrix Access Gateway ActiveX Component Stack Buffer Overflow

Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys

-- Third Party Windows Apps
11.30.1  - Citrix Access Gateway Plug-in ActiveX Control Multiple Unspecified Vulnerabilities
11.30.2  - Dell OpenManage IT Assistant Information Disclosure
11.30.3  - Google Picasa JPEG Image Processing Remote Code Execution Vulnerability

-- Linux
11.30.4  - JBoss Seam Expression Language Remote Code Execution Vulnerability

-- Solaris
11.30.5  - Oracle Sun Solaris Multiple Vulnerabilities

-- Cross Platform
11.30.6  - BlackBerry Enterprise Server Administration API Information Disclosure Vulnerability
11.30.7  - VLC Media Player ".RM" and ".AVI" Files Multiple Remote Heap Buffer Overflow Vulnerabilities
11.30.8  - Check Point Provider-1 Unspecified Local Security Vulnerability
11.30.9  - Apache Tomcat "sendfile" Request Attributes Information Disclosure
11.30.10 - Foomatic "foomatic-rip" Command Injection Vulnerability
11.30.11 - Mozilla Firefox and Thunderbird CRLF Injection Vulnerability
11.30.12 - IBM WebSphere Application Server Administration Console Local Information Disclosure Vulnerability
11.30.13 - Fglrx "xauth secret" Cookie Information Disclosure
11.30.14 - Oracle Enterprise Manager Grid Control Multiple Vulnerabilities
11.30.15 - Oracle Application Server XML Developer Kit  Remote Security Vulnerability
11.30.16 - Oracle Fusion Middleware Multiple Vulnerabilities
11.30.17 - Oracle VM VirtualBox Multiple Local Vulnerabilities
11.30.18 - Oracle Database Server Multiple Vulnerabilities
11.30.19 - Oracle PeopleSoft  Multiple Vulnerabilities

-- Web Application - SQL Injection
11.30.20 - LiteRadius "locator.php" Multiple SQL Injection Vulnerabilities
11.30.21 - MapServer Multiple SQL Injection Vulnerabilities

-- Web Application
11.30.22 - Trend Micro Control Manager "module" Parameter Directory Traversal Vulnerability
11.30.23 - Chyrp Multiple Input Validation Vulnerabilities
11.30.24 - EMC Documentum eRoom Indexing Server HummingBird Connector Remote Buffer Overflow Vulnerability
11.30.25 - Support Incident Tracker Multiple Unspecified Vulnerabilities

-- Network Device
11.30.26 - Iskratel SI2000 Callisto 821+ Multiple Security Vulnerabilities

-- Hardware
11.30.27 - HP Arcsight Connector Appliance Cross-Site Scripting Vulnerability
______________________________________________________________________

PART I Critical Vulnerabilities
Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process

______________________________________________________________________

(1) HIGH: Oracle Multiple Products Multiple Vulnerabilities
Affected:
Oracle Secure Backup
Oracle Fusion Middleware

Description: Oracle has released patches for multiple vulnerabilities affecting its products. Oracle Secure Backup, which provides centralized tape backup management for heterogeneous servers, has been patched to address an unspecified remote vulnerability in Oracle Secure Backup that can be exploited over the HTTP protocol. An unauthenticated attacker can exploit this vulnerability in order to completely violate the integrity of a target Windows system. This vulnerability is less severe on Linux, Unix, and other platforms. Oracle has also released a patch for Fusion Middleware, a platform for applications that runs on multiple operating systems. Oracle JRockit, which is Oracle's JVM (Java Virtual Machine) embedded into Fusion Middleware, was susceptible to an unspecified vulnerability. An unauthenticated remote attacker can exploit this vulnerability in order to completely violate the integrity of a target system.

Status: vendor confirmed, updates available

References:
Vendor Site
Oracle Critical Patch Advisory
SecurityFocus BugTraq ID

*************************************************************

(2) HIGH: Apple iOS Multiple Vulnerabilities
Affected:
Apple iOS prior to 4.2.9
Apple iOS prior to 4.3.4

Description: Apple has released patches for multiple vulnerabilities affecting components of its iOS operating system for mobile devices. The issues include two CoreGraphics vulnerabilities that could be triggered when opening a malicious PDF. The first exists because of a buffer overflow in the component of FreeType responsible for handling TrueType fonts. The second involves an unspecified signedness issue. By enticing a target to open a malicious PDF, an attacker can exploit these vulnerabilities in order to execute arbitrary code on the target's machine.

Status: vendor confirmed, updates available

References:
Vendor Site
Apple Security Advisories
SecurityFocus BugTraq ID

************************************************************

(3) MEDIUM: Citrix Access Gateway ActiveX Component Stack Buffer Overflow
Affected:
Citrix Access Gateway 8.1 prior to 8.1-67.7 Citrix Access Gateway 9.0 prior to 9.0-70.5 Citrix Access Gateway 9.1 prior to 9.1-96.4

Description: Citrix has released patches for Access Gateway, a system that provides remote access to applications via VPN over SSL, addressing a stack buffer overflow vulnerability in the ActiveX component installed on endpoint systems. The vulnerable ActiveX control does not properly handle HTTP header data sent from a Citrix server. By enticing a target to view a malicious site, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine in the context of the currently logged-in user.

Status: vendor confirmed, updates available

References:
Vendor Site
Citrix Security Advisory
iDefense Public Advisories

*************************************************************

Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com)

This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11784 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
______________________________________________________________________

11.30.1 CVE: Not Available
Platform: Third Party Windows Apps
Title: Citrix Access Gateway Plug-in ActiveX Control Multiple Unspecified Vulnerabilities
Description: The Citrix Access Gateway Plug-in is client software for Windows. The application is exposed to multiple unspecified remote code execution issues. Citrix Access Gateway Plug-in versions prior to 8.1-67.7, 9.0-70.5 and 9.1-96.4 are vulnerable and other versions may also be affected.
______________________________________________________________________

11.30.2 CVE: Not Available
Platform: Third Party Windows Apps
Title: Dell OpenManage IT Assistant Information Disclosure
Description: Dell OpenManage IT Assistant provides solutions for centralized management of computer systems. Dell OpenManage IT Assistant "detectIESettingsForITA.OCX" ActiveX control is exposed to a remote information disclosure issue. Specifically, this issue occurs because of an insecure "readRegVal()" method which allows attackers to disclose registry values by querying it. The affected control is identified by CLSID: 6286EF1A-B56E-48EF-90C3-743410657F3C. Dell OpenManage IT Assistant 8.9.0 is affected.
______________________________________________________________________

11.30.3 CVE: CVE-2011-2747
Platform: Third Party Windows Apps
Title: Google Picasa JPEG Image Processing Remote Code Execution Vulnerability
Description: Google Picasa is a graphics application available for Microsoft Windows. Google Picasa is exposed to a remote code execution issue while processing JPEG image files. Google Picasa 3.6 Build
105.61 is affected.
______________________________________________________________________

11.30.4 CVE: CVE-2011-2196
Platform: Linux
Title: JBoss Seam Expression Language Remote Code Execution Vulnerability
Description: JBoss Seam is a framework for developing Web 2.0 applications. JBoss Seam is exposed to a remote code execution issue because it fails to properly restrict access to JBoss Expression Language constructs during page exception handling. JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0 are affected.
Ref:
______________________________________________________________________

11.30.5 CVE:
CVE-2011-2295,CVE-2011-2293,CVE-2011-2258,CVE-2011-2289,CVE-2011-2296,
CVE-2011-2294,CVE-2011-2249,CVE-2011-2290,CVE-2011-2259,CVE-2011-2298,
CVE-2011-2291,CVE-2011-2285,CVE-2011-2287,CVE-2011-2245
Platform: Solaris
Title: Oracle Sun Solaris Multiple Vulnerabilities
Description: Oracle Sun Solaris is exposed to multiple issues.
Multiple local issues affect "Driver/USB", "Zones", "rksh", "LiveUpgrade", "Kernel/SCTP", "Kernel/sockfs", "UFS", "Trusted Extensions" and "Installer" sub component. Multiple remote issues affect "SSH", "TCP/IP", "KSSL" and "fingerd" sub component.
Solaris 8, 9, 10 and 11 Express are affected.
Ref:
______________________________________________________________________

11.30.6 CVE: CVE-2011-0287
Platform: Cross Platform
Title: BlackBerry Enterprise Server Administration API Information Disclosure Vulnerability
Description: Blackberry Enterprise Server is communications middleware for Research In Motion Blackberry devices. BlackBerry Enterprise Server is exposed to an information disclosure issue. This issue affects the Administration API. BlackBerry Enterprise Server software 5.0.1 through 5.0.3 and BlackBerry Enterprise Server Express software 5.0.1 through 5.0.3 are affected.
Ref:
______________________________________________________________________

11.30.7 CVE: CVE-2011-2588,CVE-2011-2587
Platform: Cross Platform
Title: VLC Media Player ".RM" and ".AVI" Files Multiple Remote Heap Buffer Overflow Vulnerabilities
Description: VLC is a cross-platform media player. The application is exposed to multiple heap-based buffer overflow issues.
A heap-based buffer overflow occurs because of an integer overflow error when parsing a RealAudio data block in RealMedia files.
A heap-based buffer overflow occurs because of an integer underflow error when parsing a "strf" chunk in AVI files. VLC media player versions 0.5.0 through 1.1.10 are vulnerable and other versions may also be affected.
______________________________________________________________________

11.30.8 CVE: CVE-2011-2664
Platform: Cross Platform
Title: Check Point Provider-1 Unspecified Local Security Vulnerability
Description: Check Point Provider-1 provides a multi-domain management solution. The application is exposed to an unspecified security issue which occurs during installation on non-Windows systems. Check Point NGX R65, R70, R71, R75 are affected.
Ref:
______________________________________________________________________

11.30.9 CVE: CVE-2011-2526
Platform: Cross Platform
Title: Apache Tomcat "sendfile" Request Attributes Information Disclosure
Description: Apache Tomcat is a Java-based web server application for multiple operating systems. The application is exposed to a remote information disclosure issue. Specifically, "sendfile" is used automatically to serve content through the "DefaultServlet", and web applications may use it by setting request attributes. The request attributes are not properly validated, which allows a specially crafted web application to return files that would normally be protected by a Security Manager. Tomcat versions 5.5.0 through 5.5.33, 6.0.0 through
6.0.32 and  7.0.0 through 7.0.18 are affected.
______________________________________________________________________

11.30.10 CVE: Not Available
Platform: Cross Platform
Title: Foomatic "foomatic-rip" Command Injection Vulnerability
Description: Foomatic is a database driven system for integrating various print spoolers with available printer drivers. Foomatic is exposed to a command injection issue because it fails to adequately sanitize user-supplied input. Specifically, the issue affects the "foomatic-rip" utility because it allows users to provide crafted PPD files using the "-p" parameter. Foomatic 4.0.6 is vulnerable and other versions may also be affected.
______________________________________________________________________

11.30.11 CVE: CVE-2011-2605
Platform: Cross Platform
Title: Mozilla Firefox and Thunderbird CRLF Injection Vulnerability
Description: Firefox is a browser. Thunderbird is an email client.
Both applications are available for multiple platforms. Mozilla Firefox and Thunderbird are exposed to a CRLF injection issue in the "netwerk/cookie/nsCookieService.cpp" source file. Multiple cookies may be set with the "document.cookie" API. Mozilla Thunderbird versions prior to 3.1.11, Mozilla Firefox versions prior to 3.6.18 are affected.
______________________________________________________________________

11.30.12 CVE: CVE-2011-1356
Platform: Cross Platform
Title: IBM WebSphere Application Server Administration Console Local Information Disclosure Vulnerability
Description: IBM WebSphere Application Server for z/OS is an application server used for service oriented architecture. The application is exposed to a local information disclosure issue affecting the administrative console. IBM WebSphere Application Server
6.1 and 7.0 are vulnerable and other versions may also be affected.
______________________________________________________________________

11.30.13 CVE: Not Available
Platform: Cross Platform
Title: Fglrx "xauth secret" Cookie Information Disclosure
Description: Fglrx is a driver for AMD/ATI based chipsets for Linux and Windows. The application is exposed to an information disclosure issue. Specifically, the issue occurs due to improper handling of "xauth secret" cookie. Fglrx 1:11-3-1 is vulnerable and other versions may also be affected.
______________________________________________________________________

11.30.14 CVE: CVE-2011-0848,CVE-2011-0875,CVE-2011-0816,CVE-2011-0845
Platform: Cross Platform
Title: Oracle Enterprise Manager Grid Control Multiple Vulnerabilities
Description: Oracle Enterprise Manager Grid Control is exposed to multiple issues. A remote issue in Security Framework can be exploited over the "HTTP" protocol. The "User Model" sub component is affected. A remote issue in EMCTL can be exploited over the "HTTP" protocol. A remote issue in CMDB Metadata & Instance APIs can be exploited over the "Oracle NET" protocol. A remote vulnerability in Database Control can be exploited over the "HTTP" protocol. Oracle Enterprise Manager Grid Control version 10.1.0.5, 10.2.0.3, 10.1.0.6, 10.2.0.5, 10.2.0.4, 11.1.0.7, 11.2.0.1, 11.2.0.2 are affected.
Ref:
______________________________________________________________________

11.30.15 CVE: CVE-2011-2232
Platform: Cross Platform
Title: Oracle Application Server XML Developer Kit Remote Security Vulnerability
Description: Oracle Application Server is exposed to a remote issue in XML Developer Kit. The issue can be exploited over different protocols. For an exploit to succeed, the attacker must have "Authenticated session" privileges. Oracle Application Server 10g Release 3, version 10.1.3.5.0, Oracle Application Server 10g Release 2, version 10.1.2.3.0 are affected.
Ref:
______________________________________________________________________

11.30.16 CVE: CVE-2011-0883,CVE-2011-0884,CVE-2011-2241,CVE-2011-2264
Platform: Cross Platform
Title: Oracle Fusion Middleware Multiple Vulnerabilities
Description: Oracle Fusion Middleware is exposed to multiple issues:
A remote issue in Oracle Containers for J2EE can be exploited over the "HTTP" protocol. The "Servlet Runtime in OC4J" sub component is affected. A remote issue in Oracle BPEL Process Manager can be exploited over the "HTTP" protocol. The "BPEL Console" sub component is affected. A remote issue in Oracle Business Intelligence Enterprise Edition can be exploited over the "TCP/IP" protocol. The "Analytics Server" sub component is affected. A local issue in Oracle Outside In Technology can be exploited over the "Local" protocol. The "Outside In Filters"
sub component is affected. Oracle Fusion Middleware versions 8.3.2.0, 8.3.5.0, 10.1.2.3, 10.1.3.5, 10.1.4.0.1, 10.1.4.3, 10.1.3.4.1,
11.1.1.3 are affected.
______________________________________________________________________

11.30.17 CVE: CVE-2011-2300, CVE-2011-2305
Platform: Cross Platform
Title: Oracle VM VirtualBox Multiple Local Vulnerabilities
Description: Oracle VM VirtualBox is an x86 virtualization software package. The application is exposed to multiple local issues that affect the "Guest Additions for Windows" sub component and the "All packages"
sub component. Oracle VM VirtualBox 3.0, 3.1, 3.2 and 4.0 are affected.
Ref:
______________________________________________________________________

11.30.18 CVE:
CVE-2011-2239,CVE-2011-2231,CVE-2011-2242,CVE-2011-0877,CVE-2011-0811,
CVE-2011-2238,CVE-2011-0879,CVE-2011-0831,CVE-2011-0830,CVE-2011-0876,
CVE-2011-2243,CVE-2011-0881,CVE-2011-2257,CVE-2011-2230,CVE-2011-0880,
CVE-2011-0832,CVE-2011-2244,CVE-2011-0835,CVE-2011-0882,CVE-2011-0852,
CVE-2011-2253,CVE-2011-0838,CVE-2011-2240
Platform: Cross Platform
Title: Oracle Database Server Multiple Vulnerabilities
Description: Oracle Database Server is exposed to multiple issues that affect multiple sub components. Please refer to Reference for details. Oracle Database 11g Release 2, versions 11.2.0.1, 11.2.0.2, Oracle Database 11g Release 1, version 11.1.0.7, Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4, 10.2.0.5, Oracle Database 10g Release 1, version 10.1.0.5 are affected.
Ref:
______________________________________________________________________

11.30.19 CVE:
CVE-2011-2277,CVE-2011-2284,CVE-2011-2275,CVE-2011-2281,CVE-2011-2279,
CVE-2011-2272,CVE-2011-2280,CVE-2011-2282,CVE-2011-2274,CVE-2011-2250,
CVE-2011-2283,CVE-2011-2278
Platform: Cross Platform
Title: Oracle PeopleSoft  Multiple Vulnerabilities
Description: Oracle PeopleSoft is exposed Multiple issues that affect "Purchasing", "ePerformance", "Global Payroll Core", "Talent Acquisition Manager", "eProcurement", "Receivables", "Payables" sub component and "HTTP(s)", "Proprietary" protocol. PeopleSoft Enterprise FIN, version 9.0, 9.1, Enterprise FMS, versions 9.0, 9.1, Enterprise FSCM, versions 9.0, 9.1, Enterprise HRMS, versions 8.9, 9.0, 9.1, Enterprise SCM, versions 9.0, 9.1, Enterprise PeopleTools, versions 8.49, 8.50, 8.51 are affected.
Ref:
______________________________________________________________________

11.30.20 CVE: Not Available
Platform: Web Application - SQL Injection
Title: LiteRadius "locator.php" Multiple SQL Injection Vulnerabilities
Description: LiteRadius is a web-based application implemented in PHP.
The application is exposed to multiple SQL injection issues because it fails to properly sanitize user-supplied input submitted to the "lat"
and "long" parameters of the "locator.php" script before using it an SQL query. LiteRadius versions 3.2 and prior are affected.
______________________________________________________________________

11.30.21 CVE: Not Available
Platform: Web Application - SQL Injection
Title: MapServer Multiple SQL Injection Vulnerabilities
Description: MapServer is a development environment for building spatially enabled Internet applications. The application is available for various platforms. The application is exposed to multiple SQL injection issues because it fails to sufficiently sanitize user-supplied data in Open Geospatial Consortium filter encoding within Web Map Server (WMS), Web Feature Service Sensor Observation Service and WMS time support. MapServer versions 6.x prior to 6.0.1, 5.x prior to 5.6.7 and 4.x prior to 4.10.7 are affected.
Ref:
______________________________________________________________________

11.30.22 CVE: Not Available
Platform: Web Application
Title: Trend Micro Control Manager "module" Parameter Directory Traversal Vulnerability
Description: Trend Micro Control Manager is a web-based management console. The application is exposed to a directory traversal issue because it fails to properly sanitize user-supplied input submitted to the "module" parameter of the "WebApp/widget/proxy_request.php" script when the "sid" parameter is set to "undefined", and the "serverid", "SORTFIELD", "SELECTION", and "WID" parameters are set. Trend Micro Control Manager 5.5 Build 1250 is vulnerable; other versions may also be affected.
______________________________________________________________________

11.30.23 CVE: CVE-2011-2743,CVE-2011-2744
Platform: Web Application
Title: Chyrp Multiple Input Validation Vulnerabilities
Description: Chyrp is a PHP-based blogging engine. The application is exposed to multiple input validation issues. Multiple cross-site scripting issues occur. A local file include issue affects the "action" parameter of the "index.php" script. A directory traversal issue affects the "file" parameter of the "includes/lib/gz.php"
script. An issue occurs because the application fails to sufficiently sanitize file extensions before uploading files to the web server through the "modules/swfupload/upload_handler.php" script.
Chyrp 2.1 and prior are affected.
______________________________________________________________________

11.30.24 CVE: CVE-2011-1741
Platform: Web Application
Title: EMC Documentum eRoom Indexing Server HummingBird Connector Remote Buffer Overflow Vulnerability
Description: EMC Documentum eRoom is a web-based collaboration application. EMC Documentum eRoom is exposed to a remote buffer overflow issue because it fails to perform adequate boundary checks on user-supplied data. Specifically, this issue affects the HummingBird client connector ("ftserver.exe") of the application's indexing server. EMC Documentum eRoom versions 7.4.x are affected.
______________________________________________________________________

11.30.25 CVE: Not Available
Platform: Web Application
Title: Support Incident Tracker Multiple Unspecified Vulnerabilities
Description: Support Incident Tracker is a web-based application implemented in PHP. Support Incident Tracker is exposed to multiple unspecified vulnerabilities. Support Incident Tracker versions prior to 3.64 are affected.
______________________________________________________________________

11.30.26 CVE: Not Available
Platform: Network Device
Title: Iskratel SI2000 Callisto 821+ Multiple Security Vulnerabilities
Description: The Iskratel SI2000 Callisto 821+ is a router. The device is exposed to multiple issues. A cross-site request-forgery issue exists because the device allows users to clear event logs through the "event_log_selection.html" script. A cross-site scripting issue affects the "events.html" script. Multiple HTML-injection issues exist because the device fails to sanitize user-supplied input passed to the following parameters of the "events.html" script:
"EmWeb_ns:vim:2.", "EmWeb_ns:vim:7.", "EmWeb_ns:vim:11.", "EmWeb_ns:vim:12.", "EmWeb_ns:vim:13.", "EmWeb_ns:vim:14.", "EmWeb_ns:vim:15.". Iskratel SI2000 Callisto 821+ is affected.
______________________________________________________________________

11.30.27 CVE: CVE-2011-0770
Platform: Hardware
Title: HP Arcsight Connector Appliance Cross-Site Scripting Vulnerability
Description: HP Arcsight Connector Appliance is an event logging device. The application is exposed to a cross-site scripting issue because it fails to sanitize user-supplied input to the "Windows Event Log Connector" component. HP Arcsight Connector Appliance versions prior to 6.1 are affected.
______________________________________________________________________

Welcome

Con la tecnología de Blogger.