More than 100 new vulnerabilities were uncovered last week. The most important are associated with Apple Mac OS/X, Oracle, and Symantec. This week brings more evidence of the intensity with which security researchers and attackers are going after vulnerabilities file parsing code.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******* Sponsored By Blue Coat Systems, Inc. (formerly Permeo Technologies) ********
New security ebook on Information Theft Prevention
In The Definitive Guide to Information Theft Prevention, security author Dan Sullivan provides advice on information protection and privacy regulations; how to tackle threats from unmanaged devices; how to secure managed devices; and how to leverage new security technologies. This guide also discusses risk management, incident responses and emerging best practices around information security. Download it now! http://www.sans.org/info.php?id=1120
********************************************************************************
"SANS has the highest quality instructors and the most relevant, current information of any training I have attended." (Melodee McHone, Hallmark)
SANS offers the industry's best courses and extraordinary faculty, offering authoritative up-to-the-minute material that shows you how to do the job and gives you the confidence to go back and do it immediately.
SANS Security Essentials, Hacker Exploits, System Forensics, Intrusion Detection, Auditing, plus training for CISSP exam and all Technical certification required for DoD 8570.
Join 600 security professionals in San Diego in May for SANS best instructors, a great security product expo, and evening networking and new technology sessions. Bonus: Smaller classes than the national conferences: Register today: http://www.sans.org/security06/
*************************************************************************
**************************** Sponsored Links: **********************************
1) Free SANS WhatWorks in Intrusion Prevention Systems Webcast "Low- Maintenance Security" Tuesday, April 25 at 1:00 PM EDT (1700 UTC/GMT)
http://www.sans.org/info.php?id=1121
2) "From Logs to Logic: Turning Log Piles into Log Intelligence" a Free SANS Tool Talk Webcast this week! Wednesday, April 26 at 1:00 PM EDT (1700 UTC/GMT)
http://www.sans.org/info.php?id=1122
********************************************************************************
Part I is compiled by Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Oracle has released a security update that fixes over 30 vulnerabilities in various Oracle software packages. This update fixes: (a) A security bypass flaw in the Oracle PL/SQL gateway that can be leveraged to compromise certain Oracle applications via HTTP. (b) A buffer overflow in the "VERIFY_LOG" procedure included in the "DBMS_SNAPSHOT_UTL" package. However, according to the discoverer, fixed packages for all the affected platforms are not available now and will be released on May 1, 2006. (c) SQL Injection flaw in the "SYS.DBMS_LOGMNR_SESSION" package. The technical details about other vulnerabilities have not been posted yet.
Status: Apply the patches or upgrades as specified in the Oracle Critical Patch Update - April 2006. Note that Oracle E-Business Suite patches are not cumulative.
Council Site Actions: Most of the reporting council sites are responding to this item and are in the process of quality assurance and regression testing of the patches. They all plan to distribute the patches during their next regularly scheduled system update process. One site is implementing additional mitigation provided by removing global permissions and restricting access to specific application ids.
Description: Symantec Scan Engine is a TCP/IP server and helps third-party software to include support for Symantec content scanning. The engine runs an administrative web interface on port 8004/tcp by default. The authentication mechanism used to log in to this web server contains flaws that can be exploited by a remote unauthenticated attacker to change the administrator password. Hence, the attacker can obtain complete control over the scan engine. A proof-of-concept perl script has been included in the posted advisory. A remote attacker can also download arbitrary files such as virus definition and log files from the scan engine.
Status: Symantec has released version 5.1.0.7 that fixes these vulnerabilities. A workaround is to block access to the port 8004/tcp from the Internet.
Description: Mac OS X reportedly contains the following vulnerabilities: (a) A heap-based overflow that can be triggered by a specially crafted zip archive. (b) Memory corruption vulnerabilities in multiple functions invoked by the Safari browser. (c) A heap-based overflow that can be triggered by a specially crafted bitmap (.bmp) file. (d) A heap-based overflow that can be triggered by a specially crafted GIF image file. (e) Memory corruption vulnerabilities that can be triggered by specially crafted TIFF files. Malicious zip, HTML or image files may exploit these flaws to possibly execute arbitrary code on Mac OS/X systems. The discoverer has posted gdb output and proof-of-concept files for these flaws.
Status: Apple has been contacted, no patches yet available.
Description: A discover has reported that Internet Explorer contains a memory corruption when loading HTML file containing nested "OBJECT" tags. The flaw can be exploited to crash IE and/or possibly execute arbitrary code (not confirmed yet). Proof-of-concept exploit is included in the discoverer's posting.
Status: Microsoft has not confirmed, no patches available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4986 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.