@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By SANS *****************************
Take the SANS 8th Annual Log and Event Management Survey and be entered to WIN a $250 American Express Card. http://www.sans.org/info/99976
************************************************************************** TRAINING UPDATE --SANS Secure Singapore 2012, Singapore, Singapore March 5-17, 2012 5 courses. Bonus evening presentations include Introduction to Windows Memory Analysis; and Why Our Defenses are Failing Us: One Click is All It Takes ... http://www.sans.org/singapore-2012/ -- SANS Mobile Device Security Summit: The Growing and Constantly Changing Challenge, Nashville, TN Summit: March 12-13, 2012; Post-Summit Courses: March 14-15, 2012 Mobile device security experts and practitioners from organizations that have implemented successful programs will discuss the most promising approaches to this new and evolving challenge. http://www.sans.org/mobile-device-security-summit-2012/ --SANS 2012, Orlando, FL March 23-29, 2012 40 courses. Bonus evening presentations include Exploiting Vulnerabilities: 60 Minutes from Discovery to Exploit; Evolving Threats; and Harbinger of Evil: The Forensic Art of Finding Malware. http://www.sans.org/sans-2012/ --SANS Northern Virginia 2012, Reston, VA April 15-20, 2012 7 courses. Bonus evening presentations include Linux Forensics for Non-Linux Folks; and Who Do You Trust? SSL and TLS Under Attack http://www.sans.org/northern-virginia-2012/ --SANS Cyber Guardian 2012, Baltimore, MD April 30-May 7, 2012 11 courses. Bonus evening presentations include Ninja Assessments: Stealth Security testing for Organizations; and Adjusting Our Defenses for 2012. http://www.sans.org/cyber-guardian-2012/ --SANS AppSec 2012, Las Vegas, NV April 24-May 1, 2012 5 courses. http://www.sans.org/appsec-2012/ --SANS Secure Europe 2012, Amsterdam, Netherlands May 7-19, 2012 11 courses. http://www.sans.org/secure-amsterdam-2012/ --SANS Security West 2012, San Diego, CA May 10-18, 2012 25 courses. Bonus evening presentations include Metametrics - A New Approach to Information Security Management Metrics; and Malware Analysis Essentials Using REMnux. http://www.sans.org/security-west-2012/ --Looking for training in your own community? http://www.sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/discounts.php#current Plus San Francisco, Stuttgart, Boston, Abu Dhabi, and Toronto all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
************************************************************************
*************************** Sponsored Link: *****************************
1) Privileged Password Sharing: Root of All Evil Featuring Senior SANS Analyst, J. Michael Butler, and Jason Fehrenbach from Quest Software. http://www.sans.org/info/99981 ************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/risk/#process
*************************************************************
Description: Oracle has released patches for multiple security vulnerabilities affecting its Java Runtime Environment. Oracle Java, which is mostly implemented in C, is sometimes susceptible to buffer overflows and other kinds of memory corruption, despite being designed to be safe against these kind of attacks. The flaws exist in the C implementation of the language. In addition, flaws in Java's security model sometimes come to light, which affect the way Java sandboxes code. The patched problems include three vulnerabilities reported by ZDI, including two problems with Java Web Start's handling of double quotes in JNLP files. Another problem in the JavaFX extension, which is signed by Oracle, is due to a problem that allows an attacker to execute the main method of any trusted class with arbitrary arguments. All of these flaws allow an attacker to break out of a sandbox that is designed to restrict Java applets' access to the user's system, including their access to the network and filesystem. Java vulnerabilities like these, which allow the execution of arbitrary Java code, can be popular choices for attackers due to Java's wide deployment and the possibility of using them to write platform-independent exploits. Other unspecified vulnerabilities are listed on Oracle's site. By enticing a target to view a malicious site, an attacker can exploit these vulnerabilities in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Mozilla has released a patch for an unspecified integer overflow affecting its libpng library. The overflow occurs when decompressing some PNG files. Mozilla reports that the issue may be exploitable, meaning that an attacker may be able to use it to control the instruction pointer. If so, by enticing a target to view a malicious site, an attacker can potentially exploit the vulnerability in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Adobe has released patches addressing multiple security vulnerabilities in its Flash Player. The vulnerabilities include a cross-site scripting vulnerability that could take actions on the part of the user on any web site, and there are reports of that vulnerability being actively exploited in the wild. Multiple unspecified memory corruption vulnerabilities have also been resolved. By enticing the target to view a malicious page, an attacker can exploit these vulnerabilities in order to execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Description: Google has released patches for multiple security vulnerabilities affecting its Chrome web browser. The issues include seven vulnerabilities rated "High," including integer overflows in Chrome's PDF handling and libpng, a possible use-after-free in database handling, a heap overflow in path and MKVrendering, a use-after-free in subframe handling, and a bad cast in column handling. Although the details of these issues are not disclosed, it is likely that at least some of them are exploitable. By enticing a target to view a malicious site, an attacker can potentially execute arbitrary code on the target's machine.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 13306 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2012. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account