@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
***************** Sponsored By Tripwire, Inc. ******************* New SANS Analyst Program Webcast: Debunking Continuous Monitoring Myths, May 17, 1PM EDT Learn what holds organizations back from implementing continuous monitoring and where to get started. Featuring Eugene E. Schultz and Steve Johnston. http://www.sans.org/info/73273 ***************************************************************** TRAINING UPDATE -- The National Cybersecurity Innovation Conference, April 18-19, 2011 User-to-user conference featuring outstanding examples of continuous monitoring and security in the cloud. http://www.sans.org/cyber-security-innovations-2011/ -- SANS Northern Virginia 2011, Reston, VA, April 15-23, 2011 11 courses. Bonus evening presentations include Cyberwar or Business as Usual? The State of US Federal CyberSecurity Efforts http://www.sans.org/northern-virginia-2011/ -- SANS Security West 2011, San Diego, CA, May 3-12, 2011 23 courses. Bonus evening presentations include The Emerging Security Threat Panel Discussion; and Emerging Trends in Data Law and Investigation http://www.sans.org/security-west-2011/ -- 2011 Asia Pacific SCADA and Process Control Summit, Sydney, Australia, March 31-April 7, 2011 http://www.sans.org/sydney-scada-2011/ -- SANS Cyber Guardian 2011, Baltimore, MD, May 15-22, 2011 8 courses. http://www.sans.org/cyber-guardian-2011/ -- SANS Rocky Mountain 2011, Denver, CO, June 25-30, 2011 7 courses. Bonus evening presentations include SANS Hacklab and Why End Users are Your Weakest Link http://www.sans.org/rocky-mountain-2011/ -- Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Barcelona, Amsterdam, Brisbane and London all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php *****************************************************************
Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
Description: IBM Lotus Domino is an enterprise application platform and collaboration and email server. It is administered by the Lotus Domino Console, which can be accessed through the Lotus Domino Server Controller. The Lotus Domino Server Controller is susceptible to an authentication bypass vulnerability. Because it uses a cookie file at a user-controlled location to validate the cookie provided by a client, an attacker can specify a malicious target for the cookie file in order to execute arbitrary commands on the target's machine. No interaction is required on the part of the target. This vulnerability was disclosed by the Zero Day Initiative (ZDI) in accordance with its 180-day deadline. ZDI suggests setting a console password and restricting access to port 2050 to authorized hosts as mitigation strategies.
Status: vendor confirmed, updates not available
Description: Two HP products are susceptible to code execution vulnerabilities. HP Data Protector, HP's automated backup and recovery software, is susceptible to a buffer overflow vulnerability. The vulnerable executable, DBServer.exe, listens on port 19813 and passes data into a buffer of user-controlled length. An attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine. No interaction on the part of the target is required. In addition, HP's StorageWorks P4000 Virtual SAN appliance, used to build virtual iSCSI Storage Area Networks (SANs), is susceptible to a buffer overflow vulnerability. The vulnerable executable, hydra.exe, listens on port 13838 and copies user-supplied data into fixed-length buffers without sanity checks. By sending a malicious request, an attacker can exploit this vulnerability in order to execute arbitrary code with SYSTEM-level privileges on the target's machine. Again, no interaction is required.
Status: vendor confirmed, updates not available
Description: RealNetworks RealPlayer, a widely-installed multimedia player, is susceptible to a heap-based buffer overflow vulnerability. The vulnerability exists because the code responsible for parsing IVR (Internet Video Recording) files copies user-controlled data into a buffer of user-controlled size without verification. By enticing a target to view a malicious IVR file, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates not available
Description: Apple has released a patch addressing multiple security vulnerabilities in Mac OS X and various applications that run under it. The applications include ImageIO, QuickTime, and other client-side applications. Some of these vulnerabilities may allow an attacker to exploit arbitrary code on the target's machine. Exploiting most of these vulnerabilities would require an attacker to entice a target to open a malicious file.
Status: vendor confirmed, updates available
Description: LibTIFF, a library used to manipulate TIFF (Tagged Image File Format) data, has been patched to address a heap-based buffer overflow vulnerability. Because libTIFF is widely used in multiple platforms, this offers potentially many attack vectors. In the past, libTIFF vulnerabilities have been used to attack systems like the PlayStation Portable and iOS, the operating system used in the iPhone and iPod Touch. To exploit these kind of vulnerabilities, an attacker must generally entice a target to parse a malicious TIFF file. By doing so, an attacker may be able to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11029 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. For a free subscription or to update a current subscription, visit http://portal.sans.org/