No widespread critical new vulnerabilities this week. But we have included an update for you on what the Security Council sites have done to protect themselves from last week's critical new vulnerabilities in Internet Explorer.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** Sponsored Links For This Week ************************* Privacy notice: These links redirect to non-SANS web pages.
Simplify secure file transfer! Download a white paper and free evaluation software from VanDyke Software. http://www.sans.org/cgi-bin/sanspromo/CVA110
(2) SurfControl, the World's #1 Web and E-mail Filtering Company helps companies stop unwanted content. http://www.sans.org/cgi-bin/sanspromo/CVA111
(3) Are you ready for the next NIMDA/CODE RED/BLASTER? Go beyond defensive security. Hands-on, online demo. http://www.sans.org/cgi-bin/sanspromo/CVA112
The following links direct you to SANS web pages:
(4) If you live anywhere near Washington DC, try to get to the Cyber Defense Initiative Conference starting next Monday (December 8). SANS highest rated teachers, small class sizes, all hands on, and no need to beg for travel money. (If you cannot get it scheduled - the same program will run in San Diego the end of January) Washington: http://www.sans.org/cdieast03 San Diego: http://www.sans.org/cdiwest04 *************************************************************************
[Compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description on the process may be found at http://www.sans.org/newsletters/cva/#process Archives at http://www.sans.org/newsletters/Table of Contents]
Status: Vendor has been contacted. No fixes are available yet. Vendor has released possible workarounds. Council Site Actions: The affected software is only in use at one council site. They plan to deploy the patches once they are available.
Status: Vendor confirmed, a patch is available. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Vendor confirmed, patches are available. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Vendor confirmed. Version 3.1.1.g has been released to address the flaw. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Vendor confirmed. Vendor has released version 1.4.5 to address the issues. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Vendor has not confirmed, no patch is available. Council Site Actions: All council sites plan to deploy the patches (during their next regularly schedule system update process) when they become available. Most sites commented that patching IE is a never-ending process. One site also said they are checking to ensure that they have locked down the "My Computer security zone" on all workstations as per the Microsoft TechNet support article.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3101 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that can not be scanned remotely.
(c) 2003. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==END OF PART II==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2003. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.