@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** Sponsored By Cenzic *********************
REGISTER NOW for the upcoming 4/15/11 webcast: Ask The Expert Webcast: Roadmap to Achieving Cloud Security and Leveraging Web Application Security in the Cloud Start Time: 1:00 PM EDT (1700 UTC/GMT) Featuring: Dave Shackleford & Mandeep Khera http://www.sans.org/info/75999 ***************************************************************** TRAINING UPDATE -- The National Cybersecurity Innovation Conference, April 18-19, 2011 - CISOs and other users (no vendors or consultants) sharing remarkable solutions they found to (1) defense against APT, (2) continuous monitoring, (3) proving the value of security investment and making security strategic, (4) reliable, risk-based decisions on which new tools to buy, (5) finding all their hardware and software across large networks, (6) the most promising automation initiative in security. Plus expert briefings on the most dangerous new attack techniques and the 20 Critical Controls. http://www.sans.org/cyber-security-innovations-2011/ -- SANS Northern Virginia 2011, Reston, VA, April 15-23, 2011 11 courses. Bonus evening presentations include Cyberwar or Business as Usual? The State of US Federal CyberSecurity Efforts http://www.sans.org/northern-virginia-2011/ -- SANS Security West 2011, San Diego, CA, May 3-12, 2011 23 courses. Bonus evening presentations include The Emerging Security Threat Panel Discussion; and Emerging Trends in Data Law and Investigation http://www.sans.org/security-west-2011/ -- SANS Cyber Guardian 2011, Baltimore, MD, May 15-22, 2011 8 courses. http://www.sans.org/cyber-guardian-2011/ -- SANS Rocky Mountain 2011, Denver, CO, June 25-30, 2011 7 courses. Bonus evening presentations include SANS Hacklab and Why End Users are Your Weakest Link http://www.sans.org/rocky-mountain-2011/ -- SANSFIRE 2011, Washington, DC, July 15-24, 2011 40 courses. Bonus evening presentations include Ninja developers: Penetration testing and Your SDLC; and Are Your Tools Ready for IPv6? http://www.sans.org/sansfire-2011/ -- Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Barcelona, Amsterdam, Brisbane, London and Austin all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
*****************************************************************
Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
Description: Adobe Flash Player is susceptible to a memory corruption vulnerability that is being exploited actively in the wild. By enticing a target to view a malicious site or open a malicious PDF file with embedded flash content, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates not available
Description: As part of its patch Tuesday program, Microsoft has released patches addressing vulnerabilities in multiple Microsoft products. Some of the patched vulnerabilities can be used to take complete control of a target's machine with SYSTEM-level privileges. Target interaction is required for some, but not all, of the vulnerabilities. Many of the vulnerabilities have remote attack vectors. Vulnerabilities in the implementation of the SMB (server message block) protocol, which implements printer and file sharing on Windows systems, could potentially allow for privilege escalation. Two vulnerabilities have been addressed in the client code implementing SMB on Windows systems. One in particular, involving a malformed BROWSER message, occurs in code with SYSTEM-level permissions, but the Microsoft Security Response Center (MSRC) has released a statement explaining that MSRC believes reliable code execution using this vulnerability is difficult due to the likelihood of the vulnerable code triggering a bugcheck in the event of an exploit. An unspecified vulnerability in the server code implementing the same protocol could lead to code execution with SYSTEM-level privileges without interaction on the part of the target. Microsoft recommends blocking SMB traffic at the perimeter of a secure network. A problem with the code used for DNS resolution could be exploited by broadcasting malicious messages to targets running the vulnerable software. Without interaction, an attacker could exploit this vulnerability in order to execute arbitrary code on the target's machine with the privileges of the NetworkService account. Interaction on the part of the target is not required for exploitation of this vulnerability. By enticing a target to view a malicious site, an attacker can exploit multiple vulnerabilities listed this month. Internet Explorer has been patched to address multiple problems, including incorrect handling of page layouts. ActiveX, Microsoft's framework for using reusable software modules, creates an attack vector closed by Microsoft's patches: Internet Explorer allows web sites to embed ActiveX controls, and Microsoft has specified some controls as unsafe. Vulnerabilities in the engines implementing JScript and VBScript, Microsoft's web scripting languages, could allow for code exploitation. Microsoft's GDI (graphics device interface) library has been patched to address a vulnerability in its handling of EMF (enhanced metafile) images; this vulnerability could provide potentially many attack vectors, including a web-based attack. And errors in the handling of OpenType Compact Font Format (CFF) fonts by Microsoft's driver could provide the opportunity for code execution. All of these vulnerabilities can be exploited by enticing a target to view a malicious site. Multiple vulnerabilities have been reported in Microsoft Office products, including Excel, PowerPoint, and Fax Cover Page Editor. Two vulnerabilities affect multiple Office products because they involve the way Office handles graphics objects and loading DLLs. WordPad's text converter has been patched to address a problem handling malformed and potentially malicious Word documents. Most Office vulnerabilities, including the ones patched this month, require an attacker to entice a target to open a malicious file. These vulnerabilities lead to execution in the context of the currently logged-in user.
Status: vendor confirmed, updates available
Description: RealNetworks has released a patch for its RealPlayer, a multimedia player capable of playing audio and video in multiple formats. By enticing a target to view a malicious file with RealPlayer, an attacker can exploit a vulnerability in order to execute arbitrary code on the target's machine. The vulnerability is due to improperly sanitized input being sent to a method that opens a file specified by its first parameter with the operating system's default handler. Executables, for example, will be executed by the operating system. Code will execute in the context of the currently logged-in user.
Status: vendor confirmed, updates available
Description: Nullsoft Winamp, a popular multimedia player, is susceptible to a buffer overflow vulnerability. By enticing a target to open a malicious .m3u8 file, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine in the context of the currently logged-in user. The .m3u8 file format is the unicode form of .m3u, which is used to store multimedia file formats. A public exploit achieving code execution is available for this vulnerability.
Status: vendor confirmed, updates not available
Description: VideoLAN has released a patch addressing a heap buffer overflow in VLC, its multimedia player capable of playing multiple formats. By enticing a target to play a malicious .mp4 (MPEG-4 Part 14) file, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine. Successful exploitation may lead to code execution in the context of the currently logged-in user.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 11133 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. For a free subscription or to update a current subscription, visit http://portal.sans.org/