@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************************** Sponsored By SANS *************************
Needle in a Haystack? Getting to Attribution in Control Systems, featuring SANS instructor and infrastructure security expert, Matt Luallen http://www.sans.org/info/97061 Wednesday, February 22, 2012 at 1:00 PM EDT
************************************************************************** TRAINING UPDATE --SANS Security East 2012, New Orleans, LA January 17-26, 2012 11 courses. Bonus evening presentations include Advanced VoIP PenTesting: Current Threats and Methods; and Helping Small Businesses with Security. http://www.sans.org/security-east-2012/ --SANS North American SCADA 2012, Lake Buena Vista, FL January 21-29, 2012 Gain the most current information regarding SCADA and Control System threats and learn how to best prepare to defend against them. Hear what works and what doesn't from peer organizations. Network with top individuals in the field of SCADA security. Return from the summit with solutions that you can immediately put to use in your organization. Pre-Summit courses: January 21-25, 2012 Summit: January 26-27, 2012 Post-Summit Courses: January 28-29, 2012 http://www.sans.org/north-american-scada-2012/ --SANS Monterey 2012, Monterey, CA January 30-February 4, 2012 6 courses. Bonus evening presentations include Who Do You Trust? SSL and TLS Under Attack; and IOS Programming Demo. http://www.sans.org/monterey-2012/ --SANS Phoenix 2012, Phoenix, AZ February 13-18, 2012 7 courses. Bonus evening presentations include Desktop Betrayal: Exploiting Clients Through the Features They Demand; and Windows Exploratory Surgery with Process Hacker. http://www.sans.org/phoenix-2012/ --SANS Secure Singapore 2012, Singapore, Singapore March 5-17, 2012 5 courses. Bonus evening presentations include Introduction to Windows Memory Analysis; and Why Our Defenses are Failing Us: One Click is All It Takes ... http://www.sans.org/singapore-2012/ SANS Mobile Device Security Summit: The Growing and Constantly Changing Challenge, Nashville, TN March 12-15, 2012 Summit: March 12-13, 2012 Post-Summit Courses: March 14-15, 2012 Mobile device security experts and practitioners will discuss the best approaches to this new and evolving challenge. Organizations who have developed successful mobile device security programs will share how they developed and gained management support for their plans. http://www.sans.org/mobile-device-security-summit-2012/ --SANS 2012, Orlando, FL March 23-39, 2012 42 courses. Bonus evening presentations include Exploiting Vulnerabilities: 60 Minutes from Discovery to Exploit; Evolving Threats; and Harbinger of Evil: The Forensic Art of Finding Malware. http://www.sans.org/sans-2012/ --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Atlanta, Bangalore, San Francisco, Stuttgart, and Nashville, all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php ************************************************************************
****************************** Sponsored Links: *************************
1) Take the SANS 8th Annual Log and Event Management Survey and be entered to win a $250 American Express gift card. Follow this link to the survey: http://www.sans.org/info/96596
2) Take the SANS First Annual Mobility Survey and be entered to win a $250 American Express gift card. Follow this link to the survey: http://www.sans.org/info/96601
3) Do not miss Ask The Expert Webcast: Fear and Loathing in Information Security: Content Awareness is Key featuring John Strand and Kurt Bertone. Go to: http://www.sans.org/info/97066
************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
*************************************************************
Description: HP Insight Diagnostics server is susceptible to a buffer overflow vulnerability. HP Insight Diagnostics is a web-based server management tool that runs on Microsoft Windows and Linux. The vulnerability is due to the application trusting a client-provided size value to copy data onto the stack. By sending a malicious request to magentservice.exe, which listens on port 23472 by default, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates not available
Description: McAfee Security-as-a-Service Endpoint Protection is susceptible to a command-injection vulnerability. McAfee's Endpoint Protection is designed to protect Windows machines from viruses and malware. An ActiveX control installed on the client, myCIOScn.dll, contains a vulnerable function MyCioScan.Scan.ShowReport() that accepts and executes server-controlled commands. McAfee acknowledges this flaw and plans to release an update for it. However, McAfee reports that the harmful effect of this vulnerability is entirely mitigated by a patch released in August. From publicly available information, it isn't clear how attack vectors are cut of by that patch, which was released to address a file upload vulnerability the same dll. Exploitation would require enticing a target to view a malicious web site. See the references for a link to the August patch.
Status: vendor confirmed, updates not available
Description: HP Easy Printer Care, a web-based system for administering printers, is susceptible to multiple vulnerabilities in its ActiveX controls. The first issue involves a problem with the XMLSimpleAccessor ActiveX vulnerability: by sending an overlong string to the LoadXML method, an attacker can exploit a heap buffer overflow vulnerability in order to execute arbitrary code on a target's machine. Similarly, an arbitrary file write vulnerability in the CacheDocumentXMLWithId() method of the XMLCacheMgr class can be used to exploit arbitrary code in the context of the client's browser. An attacker must entice a target to view a malicious link in order to exploit these vulnerabilities. HP no longer supports HP Easy Printer Care and recommends killbitting or uninstalling this software. See the reference below for information about killbitting ActiveX controls.
Status: vendor confirmed, updates not available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 13050 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2012. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account