ID

VAR-201110-0147


CVE

CVE-2011-1969


TITLE

Microsoft Forefront UAG of MicrosoftClient.jar Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2011-002443

DESCRIPTION

Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 provides the MicrosoftClient.jar file containing a signed Java applet, which allows remote attackers to execute arbitrary code on client machines via unspecified vectors, aka "Poisoned Cup of Code Execution Vulnerability.". Microsoft Forefront Unified Access Gateway is prone to a remote code-execution vulnerability. Successful exploits will allow attackers to execute arbitrary code in the context of the logged-in user. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: Microsoft Forefront Unified Access Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA46402 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46402/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46402 RELEASE DATE: 2011-10-12 DISCUSS ADVISORY: http://secunia.com/advisories/46402/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46402/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46402 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Microsoft Forefront Unified Access Gateway, which can be exploited by malicious people to conduct cross-site scripting and HTTP response splitting attacks, cause a DoS (Denial of Service), and compromise a user's system. 1) Certain unspecified input related to ExcelTables is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers, which will be included in a response sent to the user. 2) Certain unspecified input related to ExcelTables is not properly sanitised before being returned to the user. 3) Certain unspecified input is not properly sanitised before being returned to the user. 4) An unspecified error exists within the MicrosoftClient.jar Java applet, which can be exploited to download and install a malicious JAR file on client systems. 5) An error when handling session cookies with a NULL value can be exploited to stop the IIS worker process and disrupt Web services. SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: 1 - 3) The vendor credits Tenable Network Security. 4, 5) Reported by the vendor. ORIGINAL ADVISORY: MS11-079 (KB2544641, KB2522482, KB2522483, KB2522484, KB2522485): http://technet.microsoft.com/en-us/security/bulletin/ms11-079 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Utilizing a combination of connectivity options, ranging from SSL VPN to Direct Access, as well as built in configurations and policies, Forefront UAG provides centralized and easy management of your organization's complete anywhere access offering. Integrating a deep understanding of the applications published, the state of health of the devices being used to gain access, and the user's identity – Forefront UAG enforces granular access controls and policies to deliver comprehensive remote access, ensure security, and reduce management costs and complexity." http://www.microsoft.com/en-us/server-cloud/forefront/unified-access-gateway.aspx Vulnerability overview/description: ----------------------------------- The client-side endpoint security solution (Microsoft Forefront UAG), e.g. supplied by Microsoft Outlook Web App, uses either a signed Java applet (Remote Access Agent) or an ActiveX Control (Endpoint Components) to connect to a VPN and perform local compliance scans on the client. Due to quality issues within the software, an attacker is able to access insecure methods from the "trustworthy" Java applet and exploit those features to compromise all client systems that trust the correctly signed Java applet (e.g. all users that need to use this software for accessing internal systems over company VPN). The ActiveX control has the same functionality, which is why it is strongly presumed that a similar attack is possible. This class creates an "Agent" object that writes one of the following three files to the client system (depending on the operating system): * agent_win_helper.jar * agent_mac_helper.jar * agent_lin_helper.jar It is only checked if the jar is signed, but not who signed it, so any created self-signed jar that is named like one of these files can be used. The manipulated jar files can only be loaded if the codebase is completely on the attacker system (the MicrosoftClient.jar and all the other needed files need to be on the attacker system). The agent_xxx_helper.jar needs to include any executable with the name "ProxyProcess_Win.exe" and/or "AttachmentWiper.exe" which is executed during the doInit() function which in turn is called during the init() function of AgentAppletDriver.java. ==>> Summing up, an attacker is able to upload arbitrary executable files to remote clients and then immediately execute them without notice as a signed Java applet is being used (if "Always trust content from this publisher" has been checked - otherwise an unsuspicious Java digital signature verification popup will occur). Possible attack vectors are drive-by downloads just by visiting malicious websites but also through emails, any XSS on unsuspicous websites, etc. Proof of concept: ----------------- The exploit will not be published, but a video demonstrating this issue has been created. It can be found at the following URL: https://www.sec-consult.com/files/111012_microsoft_forefront_exploit.mp4 Vulnerable / tested versions: ----------------------------- The Forefront UAG Remote Access Agent 4.0.0.1 has been tested and successfully exploited. Vulnerable signed Java applet certificate SHA1 fingerprint: 9E:97:2B:4B:22:51:E2:BE:87:AA:C5:2C:2F:1D:88:7B:94:BD:51:EA According to Microsoft, the following systems are vulnerable: - Microsoft Forefront Unified Access Gateway 2010 - Microsoft Forefront Unified Access Gateway 2010 Update 1 - Microsoft Forefront Unified Access Gateway 2010 Update 2 - Microsoft Forefront Unified Access Gateway 2010 Service Pack 1 Vendor contact timeline: ------------------------ 2011-04-22: Contacted vendor through secure@microsoft.com 2011-04-22: Vendor: Very fast response, issue is being investigated: MSRC case 11257 2011-04-28: Contacted vendor asking for updates 2011-05-17: Contacted vendor again asking for updates 2011-05-19: Contacted personal contact at MSRC asking for updates 2011-05-19: Answer from personal contact and from case manager: they could reproduce the issue and are currently working on a fix timeline, fix expected in the next few months 2011-05-30: Contacted vendor informing about our publishing schedule: minimal information will be published on June 13th, mutual customers will be informed in more detail, advisory and video will be published when issue is fixed 2011-05-31: Answer from vendor to postpone the publishing date 2011-06-06: Proposal to the vendor to postpone the publishing date to July 12th 2011-06-06: Answer from vendor ok-ing it 2011-06-22: Update from vendor to postpone the publishing date again 2011-06-23: Update from vendor with more information about the fixing schedule 2011-06-28: Contacted vendor accepting a possible postponing of the July 12th publishing date, also offering dates for a phone-conference call 2011-06-28: Answer from vendor about dates for phone-conference call 2011-06-29: New offering of dates for phone-conference call 2011-07-13: Conference call 2011-08-21: Contacted vendor about updates 2011-08-22: Update from third party will be in october, so patch from vendor will also be in october 2011-09-26: Contacted vendor about specific publishing dates 2011-09-26: Publishing dates confirmed by vendor for October 11th We thank the people from Microsoft for their cooperation! Solution: --------- Update your Microsoft Forefront UAG. Workaround: ----------- Deactivate Java in your browser. Login to Microsoft Outlook Web App should still be possible. Add the entry for the following file: Java\jre6\lib\security\blacklist # UAG Client MicrosoftClient.jar SHA1-Digest-Manifest: dBKbNW1PZSjJ0lGcCeewcCrYx5g= Remove the affected trusted certificate (see fingerprint above) of Microsoft Corporation from the Java control panel (jcontrol) from all clients. Don't fully trust signed Java applets (in general). This workaround can be applied to MAC, Linux, and Windows systems by modifying the appropriate blacklist file on each system. If the VPN functionality (or any other) is absolutely needed, only "trust" it on the company site (don't store the certificate forever and verify each connect) and don't click on it when the Java certificate popup occurs on other web pages. Advisory URL: ------------- https://www.sec-consult.com/en/advisories.html http://technet.microsoft.com/en-us/security/bulletin/ms11-079 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH Office Vienna Mooslackengasse 17 A-1190 Vienna Austria Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com https://www.sec-consult.com EOF E. Demeter / 2011 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA11-284A Microsoft Updates for Multiple Vulnerabilities Original release date: October 11, 2011 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft .NET Framework * Microsoft Silverlight * Internet Explorer * Microsoft Forefront Unified Access Gateway * Microsoft Host Integration Server Overview There are multiple vulnerabilities in Microsoft Windows, .NET Framework, Silverlight, Internet Explorer, Forefront Unified Access Gateway, and Host Integration Server. Microsoft has released updates to address these vulnerabilities. I. Description The Microsoft Security Bulletin Summary for October 2011 describes multiple vulnerabilities in Microsoft Windows, .NET Framework, Silverlight, Internet Explorer, Forefront Unified Access Gateway, and Host Integration Server. Microsoft has released updates to address the vulnerabilities. II. Impact A remote, unauthenticated attacker could execute arbitrary code, cause a denial of service, or gain unauthorized access to your files or system. III. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for October 2011. That bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. In addition, administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for October 2011 - <http://technet.microsoft.com/en-us/security/bulletin/ms11-oct> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA11-284A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA11-284A Feedback VU#127203" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2011 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History October 11, 2011: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTpSMLT/GkGVXE7GMAQLHGAf/axezFyU84ZPyWjypVhJdXRVJTCk3EpOT eOXXa6834tI08wzEjTfTwPSyVfomWi7/D15o6mnW470TyoKQ+cX4isB4O6NKHoM+ jjW57SmYkp3I9qPZi0guzF6q7kYwmBqUWxuwZn0eJ77yi8U9NzRxywjjg1ZXgbvq DmuNj/aMqDbd/xcOgypRM4bS6cWJ+aW2D4HNj8v2ffKabHtw/Nq/brBxv/K7gPaE LRzrz43a+hxlupTO+QFwwyOsqWRuE0k+wBHT8EV4cJkeH4o22X3hBJ2GxRXeJmMF bsAmiu+cDuR1OKPPoQ4jaBmCo4ot/drT6k3BCN0mgBCDMz23AMhLPw== =j6Pv -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2011-1969 // JVNDB: JVNDB-2011-002443 // BID: 49983 // VULHUB: VHN-49914 // PACKETSTORM: 105687 // PACKETSTORM: 105786 // PACKETSTORM: 105710

AFFECTED PRODUCTS

vendor:microsoftmodel:forefront unified access gatewayscope:eqversion:2010

Trust: 1.8

sources: JVNDB: JVNDB-2011-002443 // NVD: CVE-2011-1969

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1969
value: HIGH

Trust: 1.0

NVD: CVE-2011-1969
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201110-188
value: MEDIUM

Trust: 0.6

VULHUB: VHN-49914
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-1969
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-49914
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-49914 // JVNDB: JVNDB-2011-002443 // CNNVD: CNNVD-201110-188 // NVD: CVE-2011-1969

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-49914 // JVNDB: JVNDB-2011-002443 // NVD: CVE-2011-1969

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 105786 // CNNVD: CNNVD-201110-188

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201110-188

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002443

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-49914

PATCH

title:MS11-079url:http://www.microsoft.com/technet/security/Bulletin/MS11-079.mspx

Trust: 0.8

title:MS11-079url:http://technet.microsoft.com/ja-jp/security/bulletin/ms11-079

Trust: 0.8

title:TA11-284Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta11-284a.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-002443

EXTERNAL IDS

db:NVDid:CVE-2011-1969

Trust: 2.9

db:BIDid:49983

Trust: 1.4

db:USCERTid:TA11-284A

Trust: 0.9

db:USCERTid:SA11-284A

Trust: 0.8

db:JVNDBid:JVNDB-2011-002443

Trust: 0.8

db:SECUNIAid:46402

Trust: 0.7

db:MSid:MS11-079

Trust: 0.6

db:CNNVDid:CNNVD-201110-188

Trust: 0.6

db:PACKETSTORMid:105786

Trust: 0.2

db:VULHUBid:VHN-49914

Trust: 0.1

db:PACKETSTORMid:105687

Trust: 0.1

db:PACKETSTORMid:105710

Trust: 0.1

sources: VULHUB: VHN-49914 // BID: 49983 // JVNDB: JVNDB-2011-002443 // PACKETSTORM: 105687 // PACKETSTORM: 105786 // PACKETSTORM: 105710 // CNNVD: CNNVD-201110-188 // NVD: CVE-2011-1969

REFERENCES

url:http://www.securityfocus.com/bid/49983

Trust: 1.1

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a13032

Trust: 1.1

url:http://technet.microsoft.com/en-us/security/bulletin/ms11-079

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1969

Trust: 0.8

url:http://www.jpcert.or.jp/at/2011/at110027.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta11-284a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1969

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa11-284a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta11-284a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://secunia.com/advisories/46402

Trust: 0.6

url:http://www.microsoft.com

Trust: 0.3

url:http://seclists.org/fulldisclosure/2011/oct/578

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/46402/#comments

Trust: 0.1

url:http://secunia.com/advisories/46402/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46402

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1969

Trust: 0.1

url:https://www.sec-consult.com

Trust: 0.1

url:https://www.sec-consult.com/en/advisories.html

Trust: 0.1

url:https://www.sec-consult.com/files/111012_microsoft_forefront_exploit.mp4

Trust: 0.1

url:http://www.microsoft.com/en-us/server-cloud/forefront/unified-access-gateway.aspx

Trust: 0.1

url:http://technet.microsoft.com/en-us/security/bulletin/ms11-oct>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta11-284a.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

sources: VULHUB: VHN-49914 // BID: 49983 // JVNDB: JVNDB-2011-002443 // PACKETSTORM: 105687 // PACKETSTORM: 105786 // PACKETSTORM: 105710 // CNNVD: CNNVD-201110-188 // NVD: CVE-2011-1969

CREDITS

Microsoft

Trust: 0.3

sources: BID: 49983

SOURCES

db:VULHUBid:VHN-49914
db:BIDid:49983
db:JVNDBid:JVNDB-2011-002443
db:PACKETSTORMid:105687
db:PACKETSTORMid:105786
db:PACKETSTORMid:105710
db:CNNVDid:CNNVD-201110-188
db:NVDid:CVE-2011-1969

LAST UPDATE DATE

2025-04-11T22:19:17.781000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-49914date:2018-10-12T00:00:00
db:BIDid:49983date:2013-04-19T02:40:00
db:JVNDBid:JVNDB-2011-002443date:2011-10-21T00:00:00
db:CNNVDid:CNNVD-201110-188date:2021-12-01T00:00:00
db:NVDid:CVE-2011-1969date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-49914date:2011-10-12T00:00:00
db:BIDid:49983date:2011-10-11T00:00:00
db:JVNDBid:JVNDB-2011-002443date:2011-10-21T00:00:00
db:PACKETSTORMid:105687date:2011-10-11T04:01:24
db:PACKETSTORMid:105786date:2011-10-14T05:43:49
db:PACKETSTORMid:105710date:2011-10-12T02:10:14
db:CNNVDid:CNNVD-201110-188date:2011-10-14T00:00:00
db:NVDid:CVE-2011-1969date:2011-10-12T02:52:43.427