Tuesday, December 23, 2008

Mozilla Firefox Multiple Vulnerabilities

1.0 Introduction

The vulnerabilities consist of flaws found and known with the following CVE :

  • CVE-2008-5500
  • CVE-2008-5501
  • CVE-2008-5502
  • CVE-2008-5503
  • CVE-2008-5504
  • CVE-2008-5505
  • CVE-2008-5506
  • CVE-2008-5507
  • CVE-2008-5508
  • CVE-2008-5510
  • CVE-2008-5511
  • CVE-2008-5512
  • CVE-2008-5513

2.0 Impact

A successful exploitation could allow intruder to pass certain security restrictions, obtain sensitive and secret information, conduct cross-site scripting attacks, or potentially compromise a user's system.

Some vulnerabilities lead to memory corruption and could be exploited to run arbitrary code and allow an attacker to cause a denial of service (DoS) condition.

3.0 Affected Products and Platforms

Mozilla Firefox 3.x & Mozilla Firefox 2.0.x

4.0 Mitigation

Users are advised to promptly upgraded the web browser to the latest version (version 3.0.5) at the mentioned URL [1].

5.0 References

[1]Mozilla Firefox and Thunderbird download page

http://www.mozilla.com/en-US/products/download.html?product=firefox-3.0.5

[2]Secunia Advisories

http://secunia.com/advisories/33203/

[3]F-Secure Vulnerability Information

http://www.f-secure.com/vulnerabilities/SA33203

[4]Mozilla Foundation Security Advisory 2008-60

http://www.mozilla.org/security/announce/2008/mfsa2008-60.html

[5]Mozilla Foundation Security Advisory 2008-64

http://www.mozilla.org/security/announce/2008/mfsa2008-64.html

[6]Mozilla Foundation Security Advisory 2008-65

http://www.mozilla.org/security/announce/2008/mfsa2008-65.html

[7]F-Secure Vulnerability Information : Mozilla Firefox 2 Multiple Vulnerabilities

http://www.f-secure.com/vulnerabilities/SA33184

About the security content of Security Update 2008-008 / Mac OS X v10.5.6

Summary

This document describes the security content of Security Update 2008-008 / Mac OS X v10.5.6, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

Products Affected

Security, Mac OS X 10.5

Security Update 2008-008 / Mac OS X v10.5.6

  • ATS

    CVE-ID: CVE-2008-4236

    Available for: Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Viewing or downloading a PDF file containing a maliciously crafted embedded font may lead to a denial of service

    Description: An infinite loop may occur in the Apple Type Services server's handling of embedded fonts in PDF files. Viewing or downloading a PDF file containing a maliciously crafted embedded font may lead to a denial of service. This update addresses the issue by performing additional validation of embedded fonts. This issue does not affect systems prior to Mac OS X v10.5. Credit to Michael Samarin and Mikko Vihonen of Futurice Ltd. for reporting this issue.

  • BOM

    CVE-ID: CVE-2008-4217

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Downloading or viewing a maliciously crafted CPIO archive may lead to arbitrary code execution or unexpected application termination

    Description: A signedness issue exists in BOM's handling of CPIO headers which may result in a stack buffer overflow. Downloading or viewing a maliciously crafted CPIO archive may lead to arbitrary code execution or unexpected application termination. This update addresses the issue by performing additional validation of CPIO headers. Credit: Apple.

  • CoreGraphics

    CVE-ID: CVE-2008-3623

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Viewing a maliciously crafted image may lead to an unexpected application termination or arbitrary code execution

    Description: A heap buffer overflow exists in the handling of color spaces within CoreGraphics. Viewing a maliciously crafted image may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue through improved bounds checking. Credit: Apple.

  • CoreServices

    CVE-ID: CVE-2008-3170

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Visiting a maliciously crafted website may lead to the disclosure of user credentials

    Description: Safari allows web sites to set cookies for country-specific top-level domains, which may allow a remote attacker to perform a session fixation attack and hijack a user's credentials. This update addresses the issue by performing additional validation of domain names. Credit to Alexander Clauss of iCab.de for reporting this issue.

  • CoreTypes

    CVE-ID: CVE-2008-4234

    Available for: Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Attempting to launch unsafe downloaded content may not lead to a warning

    Description: Mac OS X provides the Download Validation capability to indicate potentially unsafe files. Applications such as Safari and others use Download Validation to help warn users prior to launching files marked as potentially unsafe. This update adds to the list of potentially unsafe types. It adds the content type for files that have executable permissions and no specific application association. These files are potentially unsafe as they will launch in Terminal and their content will be executed as commands. While these files are not automatically launched, if manually opened they could lead to the execution of arbitrary code. This issue does not affect systems prior to Mac OS X v10.5.

  • Flash Player Plug-in

    CVE-ID: CVE-2008-4818, CVE-2008-4819, CVE-2008-4820, CVE-2008-4821, CVE-2008-4822, CVE-2008-4823, CVE-2008-4824

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Multiple vulnerabilities in Adobe Flash Player plug-in

    Description: Multiple issues exist in the Adobe Flash Player plug-in, the most serious of which may lead to arbitrary code execution when viewing a maliciously crafted web site. The issues are addressed by updating the Flash Player plug-in to version 9.0.151.0. Further information is available via the Adobe web site at http://www.adobe.com/support/security/bulletins/apsb08-20.html

  • Kernel

    CVE-ID: CVE-2008-4218

    Available for: Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: A local user may obtain system privileges

    Description: Integer overflow issues exist within the i386_set_ldt and i386_get_ldt system calls, which may allow a local user to execute arbitrary code with system privileges. This update addresses the issues through improved bounds checking. These issues do not affect PowerPC systems. Credit to Richard Vaneeden of IOActive, Inc. for reporting these issues.

  • Kernel

    CVE-ID: CVE-2008-4219

    Available for: Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Running an executable that links dynamic libraries on an NFS share may lead to an unexpected system shutdown

    Description: An infinite loop may occur when a program located on an NFS share receives an exception. This may lead to an unexpected system shutdown. This update addresses the issue through improved handling of exceptions. Credit to Ben Loer of Princeton University for reporting this issue.

  • Libsystem

    CVE-ID: CVE-2008-4220

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Applications that use the inet_net_pton API may be vulnerable to arbitrary code execution or an unexpected application termination

    Description: An integer overflow exists in Libsystem's inet_net_pton API, which may lead to arbitrary code execution or the unexpected termination of the application using the API. This update addresses the issue through improved bounds checking. This API is not normally called with untrusted data, and no exploitable cases of this issue are known. This update is provided to help mitigate potential attacks against any application using this API.

  • Libsystem

    CVE-ID: CVE-2008-4221

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Applications that use the strptime API may be vulnerable to arbitrary code execution or unexpected application termination

    Description: A memory corruption issue exists in Libsystem's strptime API. Parsing a maliciously crafted date string may lead to arbitrary code execution or unexpected application termination. This update addresses the issue through improved memory allocation. Credit: Apple.

  • Libsystem

    CVE-ID: CVE-2008-1391

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Applications that use the strfmon API may be exposed to an unexpected application termination or arbitrary code execution

    Description: Multiple integer overflows exist in Libsystem's strfmon implementation. An application calling strfmon with large values of certain integer fields in the format string argument may unexpectedly terminate or lead to arbitrary code execution. This update addresses the issues through improved bounds checking.

  • Managed Client

    CVE-ID: CVE-2008-4237

    Available for: Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: The managed screen saver settings are not applied

    Description: The method by which the software on a managed client system installs per-host configuration information does not always correctly identify the system. On a misidentified system, per-host settings are not applied, including the screen saver lock. This update addresses the issue by having Managed Client use the correct system identification. This issue does not affect systems with built-in Ethernet. Credit to John Barnes of ESRI, and Trevor Lalish-Menagh of Tamman Technologies, Inc. for reporting this issue.

  • network_cmds

    CVE-ID: CVE-2008-4222

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: A remote attacker may be able to cause a denial of service if Internet Sharing is enabled

    Description: An infinite loop may occur in the handling of TCP packets in natd. By sending a maliciously crafted TCP packet, a remote attacker may be able to cause a denial of service if Internet Sharing is enabled. This update addresses the issue by performing additional validation of TCP packets. Credit to Alex Rosenberg of Ohmantics, and Gary Teter of Paizo Publishing for reporting this issue.

  • Podcast Producer

    CVE-ID: CVE-2008-4223

    Available for: Mac OS X Server v10.5 through v10.5.5

    Impact: A remote attacker may be able to access the administrative functions of Podcast Producer

    Description: An authentication bypass issue exists in the Podcast Producer server, which may allow an unauthorized user to access administrative functions in the server. This update addresses the issue through improved handling of access restrictions. Podcast Producer was introduced in Mac OS X Server v10.5.

  • UDF

    CVE-ID: CVE-2008-4224

    Available for: Mac OS X v10.4.11, Mac OS X Server v10.4.11, Mac OS X v10.5 through v10.5.5, Mac OS X Server v10.5 through v10.5.5

    Impact: Opening an ISO file may lead to an unexpected system shutdown

    Description: An input validation issue exists in the handling of malformed UDF volumes. Opening a maliciously crafted ISO file may lead to an unexpected system shutdown. This update addresses the issue through improved input validation. Credit to Mauro Notarianni of PCAX Solutions for reporting this issue.

MyCERT Special Alert - Microsoft Internet Explorer 7 (IE7) 0-day Exploit

Initial Release: 11th December 2008
Revised Version: 12th December 2008

2nd Revised Version : 18th December 2008

1.0 Introduction

MyCERT has received reports from Microsoft and other security teams regarding the availability of a 0-day exploit targeting Microsoft Internet Explorer 6, 7 and 8. Microsoft has already released security update to fix the problem [1].

Users should take note that the recent cumulative fix released by Microsoft (http://www.microsoft.com/technet/security/bulletin/ms08-073.mspx) does not protect them from this exploit, thus users are highly encouraged to apply the security fix immediately.

2.0 Impact

The exploitation requires users to visit a web site that contains the exploit code. Successful exploitation allows remote code execution by the attacker.

3.0 Affected Products and Platforms

Windows Internet Explorer 7 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, Windows Vista, Windows Vista Service Pack 1, and Windows Server 2008. Microsoft Internet Explorer 5.01 Service Pack 4, Microsoft Internet Explorer 6 Service Pack 1, Microsoft Internet Explorer 6, and Windows Internet Explorer 8 Beta 2 on all supported versions of Microsoft Windows.

4.0 Mitigation

Users are advised to promptly apply the security update released by Microsoft at the mentioned URL [1].

If users are not able to apply the security update at the current time, users are encouraged to apply mitigation techniques proposed by in [2] if they wish to use Internet Explorer 6, 7 and 8. Protected Mode in Internet Explorer 7 and Internet Explorer 8 in Windows Vista limits the impact of the vulnerability.

Please refer at: http://www.microsoft.com/windows/windows-vista/features/IE7-protected-mode.

Users may also consider using alternative browsers such as Mozilla Firefox or Opera while waiting for the problem to be resolved. In addition, system administrator may block traffic from the internal network going to known IE7 exploit sites that are published by ShadowServer Foundation in [3] or use Snort IDS signatures made available by Emerging Threats in [7].

5.0 References

[1] Microsoft Security Bulletin MS08-078-Critical

http://www.microsoft.com/technet/security/bulletin/ms08-078.mspx

[2] Microsoft Security Advisory on IE 7 Vulnerability

http://www.microsoft.com/technet/security/advisory/961051.mspx

[3] IE 7 Exploit Sites

http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20081210

[4] SANS Handlers Diary

http://isc.sans.org/diary.html?storyid=5458

[5] Trend Micro Blog

http://blog.trendmicro.com/zero-day-ie-flaw-being-actively-exploited/

[6] Symantec Blog

https://forums.symantec.com/syment/blog/article?blog.id=vulnerabilities_exploits&thread.id=180

[7] Snort Rule for IE 0-day

http://www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_IE_0Day

Users and organizations could contact MyCERT for further assistance or questions.

MyCERT can be reached at:

E-mail : mycert@mycert.org.my
Phone : +603 89926969 (monitored during business hours)
Fax : +603 89453442
Handphone : +60 19 2665850 (24x7 call incident reporting)
SMS : +60 19 2813801 (24x7 SMS reporting)
Business Hours : Mon - Fri 08:30 -17:30 MYT
Web:
http://www.mycert.org.my

Revision History:
Initial Release: 11th December 2008
1st Revision: 12th December 2008

2nd Revised Version : 18th December 2008

Thursday, November 6, 2008

Global warming


Global warming

Global warming is a phenomena the increasing of world temperature. Usually when talking about global warming, people automatically think about green house effect. Green house is one of the famous reasons why this phenomenon was happened. Other caused are by human activity as deforestation, manufacturing and industry activity, motor, and development of 'concrete jungle'.

Scientific impact of this global heating is dilution level snow in increasingly higher North Pole, water level sea increase and size area land getting smaller. Material impact is natural disaster incident as drought, flood and fire while impact humanity includes loss of life and injury. Scientists and geography with a same opinion said main cause global warming is thin it ozone layer caused by release gas especially chlorofluorocarbon (CFC).

We if mindful and aware, year 2005 is hurricane season that are happened very active. Understood as many as 26 storm incidents and 14 incident cyclone had happened. First time makes, fierce storm called Katrina, Rita and Wilma become in one season. This storm incident not only prevails over America continental, even attack also China's country, Korean, and environment beach China North Sea.

In fact, increasing temperatures issue or heating happen caused variety of factors. Apart from thinning ozone, drought occurrence and haze, heat island incident and greenhouse effect also give encouragement to heating issue global. Greenhouse effect happened because of increasing release of gas such as carbon dioxide, nitrogen monoxide and methane to atmosphere such as CFC's release. Heat islands then happen when heat release in the area progress especially in too much towns and stuck by tall buildings skyscraper. Heat could not be freed to the atmosphere will separate to vicinity.

Impact and heat global warming also have upset weather and climate system in our country indirectly. Khatulistiwa's climate with humid during the year has not be to level those of normal. Great flood incident in Johor by early last two years is incident that was open our eye about this phenomenon.

As idiom says “prevent are better than cure”, early presentations measure or minimize his impact is necessary so event as that did not aggravate environmental management image and national development. We can’t compromise with social responsibility look after and protect the environment. Environment education to the young generation should start since at home or in school bench more.

Education to senior generation also matters make because some group such as who is rich, luxurious and educated group do not care for environment question. Higher learning centre or certain departments certainly do the study incident so caused by natural phenomena including world heating can be minimized its impact.

Other measures can also be done as again forest planting, recycling, awareness campaign and use environmentally friendly source of energy. Success implement assignment this will give comfort and security to the people. Other country measures system like Green Dot in Europe, waste tax in Denmark and ban plastic bag distribution and disposable tablecloth in fit Taiwan become the model and drive towards environment-friendly in the country.

Global warming issue is global issue and not only involved our country. Our national contribution to on heating global may be paltry. However as a global contribution, our country should also implement effort that not contributes to warm environment.


"let reduce global warming"




Wednesday, November 5, 2008

bloob blaab bleeb

it is long time before i writing again...
i just lost my former blog (can't remember which e-mail and password)...hahaha
but it's ok...
i can create a new one....so here
Announcing the appearance of "Grandsionce"...(sound effect please...hehehe)
what's the word mean????
actually it means nothing...
just a name and only a name....yosh

"I'm like a bird flying without compass...
Don't know where to stop and when to stop.."