@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored By SANS ******************************
Take the SANS 8th Annual Log and Event Management Survey and be entered to WIN a $250 American Express Card. http://www.sans.org/info/99204
************************************************************************** TRAINING UPDATE --SANS Secure Singapore 2012, Singapore, Singapore March 5-17, 2012 5 courses. Bonus evening presentations include Introduction to Windows Memory Analysis; and Why Our Defenses are Failing Us: One Click is All It Takes ... http://www.sans.org/singapore-2012/ -- SANS Mobile Device Security Summit: The Growing and Constantly Changing Challenge, Nashville, TN Summit: March 12-13, 2012; Post-Summit Courses: March 14-15, 2012 Mobile device security experts and practitioners from organizations that have implemented successful programs will discuss the most promising approaches to this new and evolving challenge. http://www.sans.org/mobile-device-security-summit-2012/ --SANS 2012, Orlando, FL March 23-29, 2012 40 courses. Bonus evening presentations include Exploiting Vulnerabilities: 60 Minutes from Discovery to Exploit; Evolving Threats; and Harbinger of Evil: The Forensic Art of Finding Malware. http://www.sans.org/sans-2012/ --SANS Northern Virginia 2012, Reston, VA April 15-20, 2012 7 courses. Bonus evening presentations include Linux Forensics for Non-Linux Folks; and Who Do You Trust? SSL and TLS Under Attack http://www.sans.org/northern-virginia-2012/ --SANS Cyber Guardian 2012, Baltimore, MD April 30-May 7, 2012 11 courses. Bonus evening presentations include Ninja Assessments: Stealth Security testing for Organizations; and Adjusting Our Defenses for 2012. http://www.sans.org/cyber-guardian-2012/ --SANS AppSec 2012, Las Vegas, NV April 24-May 1, 2012 5 courses. http://www.sans.org/appsec-2012/ --SANS Secure Europe 2012, Amsterdam, Netherlands May 7-19, 2012 11 courses. http://www.sans.org/secure-amsterdam-2012/ --SANS Security West 2012, San Diego, CA May 10-18, 2012 25 courses. Bonus evening presentations include Metametrics - A New Approach to Information Security Management Metrics; and Malware Analysis Essentials Using REMnux. http://www.sans.org/security-west-2012/ --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus Bangalore, San Francisco, Stuttgart, Boston, and Abu Dhabi all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
*************************************************************
Description: As part of its patch Tuesday program, Microsoft has released patches for vulnerabilities affecting multiple products. An access violation vulnerability in Microsoft's graphics display interface has been patched. Because the vulnerability is in the Windows kernel, an attacker could use potentially many vectors in order to exploit this vulnerability. A successful attack would allow an attacker to execute arbitrary code with kernel privileges. Internet Explorer has been patched to address a use-after-free vulnerability related to HTML layouts and an unspecified vulnerability in VML (Vector Markup Language). By enticing a target to view a malicious page, an attacker can exploit these vulnerabilities in order to execute arbitrary code on the target's machine. The Msvcrt.dll library has been patched to address a buffer overflow vulnerability, and five unspecified memory corruption vulnerabilities in Microsoft Visio have been patched. By enticing a target to open a malicious file, an attacker could exploit these vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Mozilla has patched its Firefox web browser to address a vulnerability in its handling of XBL, the XML binding language. XBL is used to specify the look and feel of XUL (XML User Interface Language) widgets. XBL and XUL are both developed by Mozilla to serve as part of the development platform for the Mozilla Application Suite. A problem in the nsXBLDocumentInfo::ReadPrototypeBindings procedure in the implementation of XBL can lead to memory corruption when the procedure fails. By enticing a target to view a malicious page, an attacker can exploit this vulnerability. In the case of a successful exploit, the attacker could then execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Adobe has released patches addressing multiple security vulnerabilities in its Shockwave media player. The vulnerabilities include unspecified memory corruption vulnerabilities in Shockwave 3D Asset and two other unspecified vulnerabilities. The unspecified vulnerabilities are a buffer overflow and a memory corruption vulnerability. By enticing a target to view a malicious flash file, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Horde Groupware has notified its users that its FTP server was compromised and its files manipulated. Attackers replaced Horde and Horde Groupware with malicious software that included a backdoor allowing unauthenticated PHP execution. The Horde Groupware collaboration suite is web-based, and an attacker could exploit this vulnerability by sending a malicious request to a server. A successful attack would result in arbitrary code execution.
Status: vendor confirmed, updates available
Description: Google has released patches addressing multiple security vulnerabilities in its Chrome web browser. Nine of the vulnerabilities are rated HIGH or CRITICAL, and they include an unspecified crash; a use-after-free in garbage collection when handling PDFs; bad casts; a buffer overflow in locale handling; an unspecified race condition; and use-after-free vulnerabilities in the handling of stylesheets, CSS, SVG (scalar vector graphics) and mousemove events. By enticing a target to view a malicious page, an attacker can exploit these vulnerabilities in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 13245 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2012. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account