FortiGuard Advisory: Microsoft Internet Explorer Remote Memory Corruption Vulnerability

2010-01-22 Thread noreply-secresea...@fortinet.com
Microsoft Internet Explorer Remote Memory Corruption Vulnerability
2010.January.21

Summary:

Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in 
Microsoft's Internet Explorer.

Impact:
===
Remote Code Execution.

Risk:
=
Critical

Affected Software:
==
For a list of Internet Explorer versions affected, please see the Microsoft 
Security Advisory reference below.

Additional Information:
===
In order to compromise a system / remotely execute code, an attacker would lure 
a user to a maliciously crafted website. When a user views the Web page, the 
vulnerability could allow remote code execution. An attacker who successfully 
exploited this vulnerability could gain the same user rights as the logged-on 
user. If a user is logged on with administrative user rights, an attacker who 
successfully exploited this vulnerability could take complete control of an 
affected system.

Solutions:
==
Since an attack scenario would require a user to visit a malicious website, it 
is recommended to have a layered security solution through webfiltering and 
intrusion prevention for mitigation.

* Use the solution provided by Microsoft (MS10-002).
* FortiGuard Labs released the signature 
"MS.IE.MergeAttributes.Remote.Code.Execution".
  o Advanced zero-day protection has been available since September 3, 
2009.

FortiGuard Labs continues to monitor attacks against this vulnerability.

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) 
service should be protected against this vulnerability. Fortinet's IPS service 
is one component of FortiGuard Subscription Services, which also offer 
comprehensive solutions such as antivirus, Web content filtering and antispam 
capabilities. These services enable protection against threats on both 
application and network layers. FortiGuard Services are continuously updated by 
FortiGuard Labs, which enables Fortinet to deliver a combination of 
multi-layered security intelligence and true zero-day protection from new and 
emerging threats. These updates are delivered to all FortiGate, FortiMail and 
FortiClient products. Fortinet strictly follows responsible disclosure 
guidelines to ensure optimum protection during a threat's lifecycle.

References:
===
FortiGuard Advisory: http://www.fortiguard.com/advisory/FGA-2010-05.html
Microsoft Security Bulletin: 
http://www.microsoft.com/technet/security/bulletin/ms10-002.mspx
CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0247

Acknowledgement:

Haifei Li of Fortinet's FortiGuard Labs



FortiGuard Advisory: Microsoft Office Web Components Remote Memory Corruption Vulnerability

2009-07-14 Thread noreply-secresea...@fortinet.com
Microsoft Office Web Components Remote Memory Corruption Vulnerability
2009.July.13

Fortinet's FortiGuard Global Security Research Team Discovers Memory Corruption 
Vulnerability in Microsoft Office Web Components.

Summary:

A memory corruption vulnerability exists in the ActiveX Controls of Microsoft 
Office Web Components which allows a remote attacker to compromise a system 
through a malicious site.

Impact:
===
Remote Code Execution.

Risk:
=
Critical

Affected Software:
==
For a list of operating system and product versions affected, please see the 
Microsoft Security Advisory reference below.

Additional Information:
===
A remote attacker could craft a malicious HTML document which exploits the 
Internet Explorer. The vulnerability lies in the default ActiveX Control 
installed by the Microsoft Office. A crafted object may be created and passed 
to a method of this control that will cause memory corruption in the Internet 
Explorer. After the corruption has occured, a few specific actions will cause 
Internet Explorer to cause remote code execution through a call instruction.

Solutions:
==
Use the workaround solution provided by Microsoft (973472).
The FortiGuard Global Security Research Team released a signature 
"MS.Office.Web.Components.Memory.Corruption", which covers this specific 
vulnerability.

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) 
service should be protected against this remote code execution vulnerability. 
Fortinet's IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.

References:
===
FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-27.html
Microsoft Security Advisory: 
http://www.microsoft.com/technet/security/advisory/973472.mspx
CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1136

Acknowledgement:

Haifei Li of Fortinet's FortiGuard Global Security Research Team


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***



FortiGuard Advisory: Adobe Reader/Acrobat TrueType Font Processing Memory Corruption Vulnerability

2009-06-11 Thread noreply-secresea...@fortinet.com
Adobe Reader/Acrobat TrueType Font Processing Memory Corruption Vulnerability
2009.June.10

Fortinet's FortiGuard Global Security Research Team Discovers Memory Corruption 
Vulnerability in Adobe Reader / Acrobat.

Summary:

A memory corruption vulnerability exists when processing PDF documents and 
handling TrueType fonts, which could allow an attacker to execute arbitrary 
code with the privileges of the current user.

Impact:
===
Remote Code Execution.

Risk:
=
Critical

Affected Software:
==
For a list of product versions affected, please see the Adobe Security Bulletin 
reference below.

Additional Information:
===
A crash will sometimes occur when processing a TrueType font within the 
document, leading to memory corruption and allowing the execution of remote 
code.

Solutions:
==
Use the solution provided by Adobe (APSB09-07).
The FortiGuard Global Security Research Team released the IPS signature 
"Adobe.Reader.Acrobat.TrueType.Font.Handling.Memory.Corruption", which covers 
this specific vulnerability.

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) 
service should be protected against this memory corruption vulnerability. 
Fortinet's IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.

References:
===
FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-25.html
Adobe Security Bulletin: 
http://www.adobe.com/support/security/bulletins/apsb09-07.html
CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857

Acknowledgement:

Haifei Li of Fortinet's FortiGuard Global Security Research Team


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***



FortiGuard Advisory: Apple Safari Remote Memory Corruption Vulnerability

2009-06-10 Thread noreply-secresea...@fortinet.com
Apple Safari Remote Memory Corruption Vulnerability
2009.June.09

Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in 
Apple Safari.

Summary:

A memory corruption vulnerability exists in Apple Safari which allows a remote 
attacker to execute arbitrary code through a malicious webpage.

Impact:
===
Remote Code Execution.

Risk:
=
Critical

Affected Software:
==
For a list of product versions affected, please see the Apple Security Update 
reference below.

Additional Information:
===
The memory corruption vulnerability occurs when handling HTML table elements. A 
remote attacker may craft a malicious webpage and lure an unsuspecting user. 
When the page is viewed and these elements are processed, arbitrary code 
execution may occur resulting in the victims machine being compromised.

Solutions:
==
Apple security updates are available via their Software Update mechanism.
Apple security updates are available for manual download here.
The FortiGuard Global Security Research Team released a signature 
"DHTML.Malicious.Table.Elements", which covers this specific vulnerability.

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) 
service should be protected against this memory corruption vulnerability. 
Fortinet's IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle. 

References:
===
FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-23.html
Apple Security Updates for Safari 4.0: http://support.apple.com/kb/HT3613
Apple Security Updates for iPhone: http://support.apple.com/kb/HT3318
CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4231

Acknowledgement:

Haifei Li of Fortinet's FortiGuard Global Security Research Team


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***



FortiGuard Advisory: Microsoft Internet Explorer DHTML Handling Remote Memory Corruption Vulnerability

2009-06-10 Thread noreply-secresea...@fortinet.com
Microsoft Internet Explorer DHTML Handling Remote Memory Corruption 
Vulnerability
2009.June.09

Fortinet's FortiGuard Global Security Research Team Discovers Memory Corruption 
Vulnerability in Microsoft's Internet Explorer.

Summary:

A memory corruption vulnerability exists in the DHTML handling of Microsoft's 
Internet Explorer which allows a remote attacker to compromise a system through 
a malicious site.

Impact:
===
Remote Code Execution.

Risk:
=
Critical

Affected Software:
==
For a list of operating system and product versions affected, please see the 
Microsoft Bulletin reference below.

Additional Information:
===
The vulnerability occurs when Internet Explorer processes special DHTML 
functions. A crash may happen when destroying a window after making a sequence 
of calls on the "tr" element. These calls are linked to the insertion, deletion 
and attributes of a table cell. The crash may then allow the arbitrary 
execution of code on the browsers machine.

Solutions:
==
Use the solution provided by Microsoft (MS09-019).
The FortiGuard Global Security Research Team released a signature 
"MS.IE.DHTML.Function.Remote.Code.Execution", which covers this specific 
vulnerability.

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) 
service should be protected against this memory corruption vulnerability. 
Fortinet's IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.

References:
===
FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-22.html
Microsoft Bulletin: 
http://www.microsoft.com/technet/security/bulletin/ms09-019.mspx
CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1141

Acknowledgement:

Haifei Li of Fortinet's FortiGuard Global Security Research Team


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***



Microsoft Office Excel Remote Memory Corruption Vulnerability

2009-04-15 Thread noreply-secresea...@fortinet.com
Microsoft Office Excel Remote Memory Corruption Vulnerability
2009.April.14

Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in 
Microsoft Office Excel.

Summary:

A memory corruption vulnerability exists in Microsoft Office Excel which allows 
a remote attacker to compromise a system through a malicious document.

Impact:
===
Remote Code Execution.

Risk:
=
Critical

Affected Software:
==
For a list of operating system and product versions affected, please see the 
Microsoft Bulletin reference below.

Additional Information:
===
The vulnerability lies in "excel.exe", which is used when processing an Excel 
file. A maliciously crafted document will cause Excel to crash when processing. 
The crash occurs while calculating memory using an offset and a two-byte value 
contained in the document. If the two-byte value is set to a high value, an 
overflow condition will occur during memory calculation. A remote attacker can 
potentially control the memory referenced as a result of the overflow to alter 
program flow, and execute arbitrary code on a victims machine.

Solutions:
==
Use the solution provided by Microsoft (MS09-009). 
The FortiGuard Global Security Research Team released a signature 
"MS.Excel.OBJ.Subrecord.Code.Execution", which covers this specific 
vulnerability.

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) 
service should be protected against this memory corruption vulnerability. 
Fortinet's IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.

References:
===
FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-16.html
Microsoft Bulletin: 
http://www.microsoft.com/technet/security/Bulletin/ms09-009.mspx
CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0100

Acknowledgement:

Haifei Li of Fortinet's FortiGuard Global Security Research Team


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***



FGA-2009-003:EMC RepliStor Buffer Overflow Vulnerability

2009-04-09 Thread noreply-secresea...@fortinet.com
FGA-2009-003:EMC RepliStor Buffer Overflow Vulnerability  
2009.April.08  

Summary:  
 
Fortinet's FortiGuard Global Security Research Team has discovered a buffer 
overflow vulnerability in EMC RepliStor. 

Impact: 
===
Remote code execution. 

Risk:  
=
Critical

Affected Software:  
==
EMC RepliStor 6.2 SP4 and earlier 
EMC RepliStor 6.3 SP1 and earlier 

Additional Information:
==
A remote, unauthenticated user may connect over TCP to the 
"ctrlservice.exe" or "rep_srv.exe" process and send a specially-crafted 
message to cause a heap based buffer overflow, which can result in 
arbitrary code execution. 


Solutions:
===
The FortiGuard Global Security Research Team released the signature 
"EMC.RepliStor.Integer.Overflow" 

Users should use EMC's Powerlink solution to upgrade to the following EMC 
RepliStor products: 
RepliStor 6.2 SP5: Navigate in Powerlink to Home > Support > Software 
Downloads and Licensing > Downloads P-R >RepliStor 6.2 SP5 
RepliStor 6.3 SP2: Navigate in Powerlink to Home > Support > Software 
Downloads and Licensing > Downloads P-R >RepliStor 6.3 SP2 

Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against this buffer overflow 
vulnerability. Fortinet’s IPS service is one component of FortiGuard 
Subscription Services, which also offer comprehensive solutions 
such as antivirus, Web content filtering and antispam capabilities. These 
services enable protection against threats on both application 
and network layers. FortiGuard Services are continuously updated by the 
FortiGuard Global Security Research Team, which enables Fortinet 
to deliver a combination of multi-layered security intelligence and true 
zero-day protection from new and emerging threats. 
These updates are delivered to all FortiGate, FortiMail and FortiClient 
products. Fortinet strictly follows responsible disclosure 
guidelines to ensure optimum protection during a threat's lifecycle. 

References:  
===
FortiGuard Advisory: 
http://www.fortiguardcenter.com/advisory/FGA-2009-13.html
EMC Powerlink: powerlink.emc.com 
CVE ID: CVE-2009-1119 

Acknowledgments:   

 
Zhenhua Liu of Fortinet's FortiGuard Global Security Research Team


Disclaimer:
===

Although Fortinet has attempted to provide accurate information in these 
materials, Fortinet assumes no legal responsibility for 
the accuracy or completeness of the information. More specific information 
is available on request from Fortinet. Please note that 
Fortinet's product information does not constitute or contain any 
guarantee, warranty or legally binding representation, unless 
expressly identified as such in a duly signed writing.

About Fortinet ( www.fortinet.com ):


Fortinet is the pioneer and leading provider of ASIC-accelerated unified 
threat management, or UTM, security systems, which are used 
by enterprises and service providers to increase their security while 
reducing total operating costs. Fortinet solutions were built 
from the ground up to integrate multiple levels of security 
protection--including firewall, antivirus, intrusion prevention, VPN, 
spyware prevention and anti-spam -- designed to help customers protect 
against network and content level threats. Leveraging a custom 
ASIC and unified interface, Fortinet solutions offer advanced security 
functionality that scales from remote office to chassis-based 
solutions with integrated management and reporting. Fortinet solutions have 
won multiple awards around the world and are the only 
security products that are certified in six programs by ICSA Labs: 
(Firewall, Antivirus, IPSec, SSL, Network IPS, and Anti-Spyware). 
Fortinet is privately held and based in Sunnyvale, California.

*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***


RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities

2009-02-06 Thread noreply-secresea...@fortinet.com
RealNetworks RealPlayer IVR File Processing Multiple Code Execute 
Vulnerabilities
2009.February.05 

Fortinet's FortiGuard Global Security Research Team Discovers Two 
Vulnerabilities in RealNetworks RealPlayer.

Summary:


Two code execute vulnerabilities exist in RealNetworks RealPlayer 11 through 
malformed IVR files. 

Impact:
===

Remote Code Execution.

Risk:
=

Critical

Affected Software:
==

RealNetworks RealPlayer 11

Additional Information:
===

Internet Video Recording (IVR) files contain media content that is played and 
recorded by RealPlayer. A remote attacker could craft a malicious IVR file, 
that when sent to an unsuspecting user, may allow the execution of arbitrary 
code when viewed, using one of two vulnerabilities during RealPlayer's IVR 
processing routine:

* A heap corruption vulnerability that occurs when altering a field that 
determines the length of a structure
* A vulnerability that allows an attacker to write one null byte to an 
arbitrary memory address by using an overly long file name length value

It should be noted that the victim does not necessarily have to open the 
malicious file for exploitation to occur: the vulnerabilities lie in a DLL that 
is also used as a plugin for the Windows Explorer shell. A successful attack 
could take place by merely previewing the IVR file through Windows Explorer.

Solutions:
==

The FortiGuard Global Security Research Team released the signature 
"RealNetworks.RealPlayer.IVR.File.Processing.Code.Execution"

Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against these code execute vulnerabilities. 
Fortinet’s IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.

Acknowledgement:


Haifei Li of Fortinet's FortiGuard Global Security Research Team

References:
===

FortiGuard Advisory
http://www.fortiguardcenter.com/advisory/FGA-2009-04.html

CVE ID: CVE-2009-0375 (one byte rewrite)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0375

CVE ID: CVE-2009-0376 (heap corruption)
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0376

*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***


Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Command Buffer Overflow Vulnerability

2009-01-15 Thread noreply-secresea...@fortinet.com
Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Command Buffer Overflow 
Vulnerability
2009.January.13

Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in 
Oracle Secure Backup

Summary:


A Buffer Overflow vulnerability exists Oracle Secure Backup 10.2.0.2 through a 
malformed NDMP packet.

Impact:
===

Remote Code Execution

Risk:
=

Critical (Base Score:10.0)

Affected Software:
==

Oracle Secure Backup 10.2.0.2

Additional Information:
===

Sending a malformed NDMP client authentication(NDMP_CONECT_CLIENT_AUTH Command) 
packet will cause a overflow a buffer overflow due to 
invalid bounds checking.

Solutions:
==

Use the solution provided by Oracle 
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

The FortiGuard Global Security Research Team released a signature 
"Oracle.NDMP.CONNECT.CLIENT.AUTH.User.ID.Buffer.Overflow" on Jan 13 2009, which 
covers 
this specific vulnerability.

Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against this Remote Code Execution Vulnerability. 
Fortinet’s IPS service is one component of FortiGuard Subscription Services, 
which also offer comprehensive solutions such as antivirus, Web content 
filtering and antispam capabilities. These services enable protection against 
threats on both application and network layers. FortiGuard Services are 
continuously updated by the FortiGuard Global Security Research Team, which 
enables Fortinet to deliver a combination of multi-layered security 
intelligence and true zero-day protection from new and emerging threats. These 
updates are delivered to all FortiGate, FortiMail and FortiClient products. 
Fortinet strictly follows responsible disclosure guidelines to ensure optimum 
protection during a threat's lifecycle.

Acknowledgement:


Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research 
Team

References:
===

http://www.fortiguardcenter.com/advisory/FGA-2009-02.html
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

CVE ID: CVE-2008-5444
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5444



*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***


Oracle Secure Backup's observiced.exe Denial Of Service vulnerability

2009-01-15 Thread noreply-secresea...@fortinet.com
Oracle Secure Backup's observiced.exe Denial Of Service vulnerability
2009.January.13

Fortinet's FortiGuard Global Security Research Team Discovers a vulnerability 
in observiced.exe of Oracle Secure Backup 

Summary:


A Denial Of Service vulnerability exists Oracle Secure Backup 10.2.0.2 
observiced.exe through malformed packet.

Impact:
===

Remote Denial Of Service

Risk:
=

Medium (Base Score:5.0)

Affected Software:
==

Oracle Secure Backup 10.2.0.2

Additional Information:
===

Oracle Secure Backup listens, and receives Oracle's private Protocol data in a 
default configuration, on TCP port 400
By sending some malformed data to this port will lead Denial Of Service.

Solutions:
==

Use the solution provided by Oracle 
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against this Remote Denial Of Service 
vulnerability. Fortinet’s IPS service is one component of FortiGuard 
Subscription Services, which also offer comprehensive solutions such as 
antivirus, Web content filtering and antispam capabilities. These services 
enable protection against threats on both application and network layers. 
FortiGuard Services are continuously updated by the FortiGuard Global Security 
Research Team, which enables Fortinet to deliver a combination of multi-layered 
security intelligence and true zero-day protection from new and emerging 
threats. These updates are delivered to all FortiGate, FortiMail and 
FortiClient products. Fortinet strictly follows responsible disclosure 
guidelines to ensure optimum protection during a threat's lifecycle.

Acknowledgement:


Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research 
Team

References:
===

http://www.fortiguardcenter.com/advisory/FGA-2009-02.html
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

CVE ID: CVE-2008-5445
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5445


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***


Oracle Secure Backup Multiple Denial Of Service vulnerabilities

2009-01-15 Thread noreply-secresea...@fortinet.com
Oracle Secure Backup Multiple Denial Of Service vulnerabilities
2009.January.13

Fortinet's FortiGuard Global Security Research Team Discovers multiple 
vulnerabilities in Oracle Secure Backup

Summary:


Multiple Denial Of Service vulnerabilities exist Oracle Secure Backup 10.2.0.2 
through malformed NDMP packets.

Impact:
===

Remote Denial Of Service

Risk:
=

Medium (Base Score:5.0)

Affected Software:
==

Oracle Secure Backup 10.2.0.2

Additional Information:
===

1>[CVE-2008-5441]Sending a malformed NDMP connect open(NDMP_CONNECT_OPEN 
command) packet will cause a crash. 
2>[CVE-2008-5442]Sending a malformed NDMP connect close(NDMP_CONNECT_CLOSE 
command) packet will cause a crash. 
3>[CVE-2008-5443]Sending a malformed NDMP mover get state(NDMP_MOVER_GET_STATE 
command) packet will cause a crash. 

Solutions:
==

Use the solution provided by Oracle 
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) 
service should be protected against these Remote Denial Of
 Service vulnerabilities. Fortinet’s IPS service is one component of FortiGuard 
Subscription Services, which also offer comprehensive solutions such as 
antivirus, Web content filtering and antispam capabilities. These services 
enable protection against threats on both application and network layers. 
FortiGuard Services are continuously updated by the FortiGuard Global Security 
Research Team, which enables Fortinet to deliver a combination of multi-layered 
security intelligence and true zero-day protection from new and emerging 
threats. These updates are delivered to all FortiGate, FortiMail and 
FortiClient products. Fortinet strictly follows responsible disclosure 
guidelines to ensure optimum protection during a threat's lifecycle.

Acknowledgement:


Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research 
Team

References:
===

http://www.fortiguardcenter.com/advisory/FGA-2009-02.html
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

CVE ID: CVE-2008-5441
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5441
CVE ID: CVE-2008-5442
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5442
CVE ID: CVE-2008-5443
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5443


*** This email and any attachments thereto may contain private, confidential, 
and privileged material for the sole use of the intended recipient.  Any 
review, copying, or distribution of this email (or any attachments thereto) by 
others is strictly prohibited.  If you are not the intended recipient, please 
contact the sender immediately and permanently delete the original and any 
copies of this email and any attachments thereto. ***