@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********** Sponsored By SANS ***********
SANS 8th Annual Log and Event Management Survey is Under Way
Take the SANS 8th Annual Log and Event Management Survey. Be a part of this industry leading survey cited in top technology publications and blogs! Also be entered to WIN a $250 American Express Card giveaway when survey results are released during SANS webcasts held in early May at www.sans.org/webcasts.
Follow this link to the survey: http://www.sans.org/info/93814 ************************************************************************** TRAINING UPDATE - --SANS Security East 2012, New Orleans, LA January 17-26, 2012 11 courses. Bonus evening presentations include Advanced VoIP Pen Testing: Current Threats and Methods; and Helping Small Businesses with Security. http://www.sans.org/security-east-2012/ - --SANS North American SCADA 2012, Lake Buena Vista, FL January 21-29, 2012 gain the most current information regarding SCADA and Control System threats and learn how to best prepare to defend against them. Hear what works and what doesn't from peer organizations. Network with top individuals in the field of SCADA security. Return from the summit with solutions that you can immediately put to use in your organization. Pre-Summit courses: January 21-25, 2012 Summit: January 26-27, 2012 Post-Summit Courses: January 28-29, 2012 http://www.sans.org/north-american-scada-2012/ - --SANS Monterey 2012, Monterey, CA January 30-February 4, 2012 6 courses. Bonus evening presentations include Who Do You Trust? SSL and TLS Under Attack; and IOS Programming Demo. http://www.sans.org/monterey-2012/ - --SANS Phoenix 2012, Phoenix, AZ February 13-18, 2012 7 courses. Bonus evening presentations include Desktop Betrayal: Exploiting Clients Through the Features They Demand; and Windows Exploratory Surgery with Process Hacker. http://www.sans.org/phoenix-2012/ - --SANS Singapore 2012, Singapore, Singapore March 5-17, 2012 5 courses. http://www.sans.org/singapore-2012/ - --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Atlanta, Bangalore, Stuttgart, and Nashville, all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php **************************************************************************
*************************** Sponsored Link: ******************************
1) Take the first annual SANS Mobility Survey and Win $250
Take this groundbreaking survey to help determine policy, controls and standards needed to enable users to use their own small mobile devices for work-related functions. Also be entered to win a $250 American Express Card Giveaway when results are announced in late March at www.sans.org/webcasts.
Follow this link to the survey: http://www.sans.org/info/93819 **************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
*************************************************************
Description: Researchers claim to have identified an unspecified and unpatched vulnerability in Adobe Reader. They have posted a video demonstrating the exploit. By enticing a target to view a malicious file, an attacker can exploit either of these vulnerabilities in order to execute arbitrary code on a target's machine.
Status: vendor not confirmed, updates not available
Description: Microsoft has released patches for security vulnerabilities affecting multiple products. Microsoft Publisher 2003 has been patched to address four vulnerabilities in its code for parsing Publisher files: a function overwrite vulnerability, an out-of-bounds array index vulnerability, an invalid pointer vulnerability, and an unspecified memory corruption vulnerability. A patch for Microsoft Word addresses a use-after-free vulnerability in its code responsible for handling Word files. Microsoft Time has been patched to address an unspecified security vulnerability. The patch for OLE is for an unspecified vulnerability. Microsoft PowerPoint has been patched to address an unspecified vulnerability in its handling of OfficeArt Shapes within specially crafted PowerPoint files. Windows itself has been patched to properly handle TrueType fonts. The patch for Microsoft Excel addresses an unspecified vulnerability in Excel's handling of Records. Windows Media Player DVR-MS has been patched to address an unspecified vulnerability in its handling of .dvr-ms (Microsoft Digital Video Recording) files. Except for the vulnerability in the Microsoft Time component, all of these vulnerabilities can be exploited by enticing a target to open a malicious file. The vulnerability in the Microsoft Time component can be exploited by enticing the target to view a malicious web site. An attacker can exploit any of these vulnerabilities in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Apple has released patches addressing multiple security vulnerabilities in its QuickTime media player. The vulnerabilities include integer overflow vulnerabilities in in Apple Quicktime's handling of PICT files, JPEG2000 encoded movie files, and font names embedded within QuickTime atoms; buffer overflows in QuickTime's handling of FlashPix files, FLC files, FLIC files, RLE-encoded movie files, and movie files encoded with the H.264 codec; an uninitialized memory access issue in QuickTime's code responsible for handling URL data handlers in movie files; an unspecified implementation issue handling atom hierarchies within a movie file; and unspecified memory corruption issues in QuickTime's handling of movie files, including the TKHD atoms in QuickTime movie files. By enticing a target to view a malicious file, an attacker can exploit these vulnerabilities in order to execute arbitrary code on a target's machine.
Status: vendor confirmed, updates available
Description: HP has released a patch for Network Node Manager, its configuration management software. By sending a malicious request to the nnmRptConfig.exe CGI program, an attacker can send a crafted nameParams parameter in order to trigger a heap buffer overflow. The attacker will then have the ability to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 12814 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2011. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account