Looks like an easier week for most of you. The eight critical vulnerabilities are all in products that are not widely used.
Happy New Year to you.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** Sponsored By SANS 2004 This Week ************************
Announcing: SANS2004, The First Security Mega Conference April 1 - 9, at Walt Disney World Dolphin Resort in Orlando, Florida
In greatest advance in security training in the past six years, SANS has expanded its security education programs to more than 600 hours of unique training and education programs for:
--Security Technologists (five new programs)
--Auditors (four extraordinary tracks)
--Security Managers and Security Officers (three great tracks)
Plus new programs on the legal aspects of security, on ISO 17799, on E-Warfare and many more. Even the world's only training program on the newest developments in hacker exploits. Plus evening sessions and a great vendor exposition. Get the full program and register before your favorite courses fill up (SANS annual conference sessions always fill faster than any of our other programs.)
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description on the process may be found at http://www.sans.org/newsletters/cva/#process Archives at http://www.sans.org/newsletters/Table of Contents
Status: The vendor has reportedly confirmed the problem and plans to release a patch. The suggested workaround is to disable "form2raw" functionality on the web server. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Unclear. The vulnerability is reported in version 2.0 and prior, but the version currently available from the vendor website is 2.9. It is unknown whether the problem exists in current versions. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Unclear. No vendor-supplied solution is available at this time. Council Site Actions: Only one of the reporting council sites took action on this item. They were unsure if the affected software was in use or not so they notified their web development group and a cautionary measure. The remaining council sites are not using the affected software, thus no action was necessary.
Status: The vendor has reportedly been informed but has not yet taken action to address the issue. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: Unclear. No patches are currently available. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary. One site did comment that the ftp protocol has been banned on their critical servers.
Status: Vendor confirmed, version 1.45 contains the fix. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Status: The vendor has reportedly been contacted but has not yet responded. Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary. One site did comment that the telnet protocol has been banned on their critical servers.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3140 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that can not be scanned remotely.
(c) 2003. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==END OF PART II==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2003. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.