@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*****************************************************************
TRAINING UPDATE - -- "Combating Malware in the Enterprise" course at SANS (SEC569). How do you fight off malware when you have thousands of hosts? Learn the answers in Orlando in March: http://www.sans.org/security-training/combating-malware-enterprise-1482-mid - -- SANS 2011, Orlando, FL, March 26-April 4, 2011 40 courses. Bonus evening presentations and special events include Hiding in Plain Sight: Forensic Techniques to Counter the Advanced Persistent Threat; and Law and the Public's Perception of Data Security http://www.sans.org/sans-2011/ - -- The National Cybersecurity Innovation Conference, April 18-19, 2011 User-to-user conference featuring outstanding examples of continuous monitoring and security cloud. http://www.sans.org/cyber-security-innovations-2011/ - -- 2011 Asia Pacific SCADA and Process Control Summit, Sydney, Australia, March 31-April 7, 2011 http://www.sans.org/sydney-scada-2011/ - -- SANS Northern Virginia 2011, Reston, VA, April 15-23, 2011 11 courses. Bonus evening presentations include Cyberwar or Business as Usual? The State of US Federal CyberSecurity Efforts http://www.sans.org/northern-virginia-2011/ - -- The National Cybersecurity Innovation Conference, April 18-19, 2011 User-to-user conference featuring outstanding examples of continuous monitoring and security cloud. http://www.sans.org/cyber-security-innovations-2011/ - -- SANS Security West 2011, San Diego, CA, May 3-12, 2011 23 courses. Bonus evening presentations include The Emerging Security Threat Panel Discussion; and Emerging Trends in Data Law and Investigation http://www.sans.org/security-west-2011/ - -- SANS Cyber Guardian 2011, Baltimore, MD, May 15-22, 2011 8 courses. http://www.sans.org/cyber-guardian-2011/ - -- Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Barcelona, Amsterdam, Brisbane and London all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
*****************************************************************
************************ Sponsored Links: ***********************
1) REGISTER NOW FOR Web 2.0 Security: Same Old But Different WHEN: Thursday, March 24, 2011 at 1:00 PM EDT (1700 UTC/GMT) FEATURING: Johannes Ullrich & Eric Crutchlow https://www.sans.org/webcasts/web-20-security-94323 Sponsored By: SONICWALL http://www.sonicwall.com/ *****************************************************************
Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
Description: Adobe Flash Player is susceptible to a memory corruption vulnerability due to erroneous parsing of malformed flash content, including flash content embedded in PDF documents to be read by Reader and Acrobat. An attack circulating in the wild for this vulnerability involves a malicious SWF (Small Web Format, originally Shockwave Flash) file embedded into an Excel document. Microsoft Security Research and Defense has provided information for mitigating the risk of exploitation from this particular attack. By enticing a target to view a malicious file, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates not available
Description: Microsoft Internet Explorer is susceptible to multiple unspecified vulnerabilities. An exploit utilizing these vulnerabilities, demonstrated at this year's Pwn2Own contest, allows an attacker to execute arbitrary code on a target's machine. Two of the vulnerabilities are used together by the exploit to gain reliable code execution. The third is used to bypass a security layer in Internet Explorer 8 on Windows Vista and Windows 7, called Protected Mode, that restricts an application's ability to read and modify files and other system resources.
Status: vendor confirmed, updates not available
Description: Google has released a patch for a vulnerability affecting its Chrome web browser. An unspecified memory corruption exists in Chrome's style handling. Google has rated this vulnerability High, which, along with the nature of the vulnerability, suggests that it may be usable for code execution. An attacker must entice a target to view a malicious site in order to exploit this vulnerability.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11013 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. For a free subscription or to update a current subscription, visit http://portal.sans.org/