No huge new vulnerabilities announced this week, but with the details of many of Oracle's mega-collection of vulnerabilities being released, Oracle users might do well to step up their patching schedule.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored By Core Security Technologies ****************
Halloween Treats! No Tricks! WIN a $250 BestBuy gift card from Core Security Technologies! Listen to the joint Gartner and SANS webcast as they discuss the future of information security. Register here http://www.sans.org/info/1647
View the webcast and automatically be entered into a drawing for a $250 gift card from Core Security Technologies!
*************************************************************************
Three Great SANS Training Conferences Coming Up: San Jose, New Orleans and Washington DC. How good are these courses? 8,000 people who attend SANS conferences wrote answers and said we can share them. Here's an example: ++ "I have attended courses by several of SANS rivals, and SANS blew them away." - Alton Thompson, US Marines If you need specific student quotes about any individual SANS course, for justifying attendance, email us at quotes@sans.org listing the course you would like to attend and how soon you need the quotes. In the mean time register early so you get a pot in the course you want.
+++ New Orleans: Nov. 14-21, http://www.sans.org/neworleans06/event.php
+++ San Jose: Dec. 4-9 http://www.sans.org/siliconvalley06/index.php
+++ Washington DC: Dec. 9-16 http://www.sans.org/cdieast06/event.php
*************************************************************************
************************ Sponsored Links: *****************************
1) Security professionals will focus on fighting the most common threats to data at the SANS Secure Storage & Encryption Summit, December 6-7. http://www.sans.org/info/1648
2) Continuous Compliance. Effective Security. Efficient Operations. All in One Solution. Intrigued? Don't miss this seminar. http://www.sans.org/info/1649
3) ALERT: Hacking With Ajax- SPI Dynamics White Paper http://www.sans.org/info/1650
*************************************************************************
Part I for this issue has been compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Winamp, a popular media player, contains multiple heap-based buffer overflows. Winamp supports AOL's Ultravox media streaming protocol. One of the heap-based overflows can be triggered by supplying a specially crafted "ultravox-max-msg" header. The second overflow can be triggered by specially crafted Lyrics3 tags, which are used to embed lyrics in an MP3 file. A malformed playlist file (.m3u or .pls extension) or a crafted "shout:" URI or a crafted "uvox:" URI can trigger these overflows to execute arbitrary code on a Winamp user's system. Note that Internet Explorer opens playlist file, "shout:" URIs and "uvox:" URIs automatically. Hence, browsing a malicious site or clicking a malicious link is sufficient to exploit these overflows.
Status: Winamp has released version 5.31 to address these vulnerabilities.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: AOL's 9.0 Security Edition is designed to protect AOL users from threats such as malware, spam etc. The software ships with an ActiveX control, YGPPicDownload.dll, that is marked as "safe for scripting". This ActiveX control contains buffer overflow vulnerabilities that can be triggered by specially crafted input to its "downloadFileDirectory" property or "AddPictureNoAlbum" method. A web page can exploit this flaw to execute arbitrary code on an AOL Security Edition user's system. Because the control is marked "safe for scripting", the control may be invoked without any user interaction by script contained in the malicious web page. Note that the software may ship by default with certain PCs.
Status: AOL confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected ActiveX control via Microsoft's "kill bit" mechanism. The GUID of the affected controls is "D670D0B3-05AB-4115-9F87-D983EF1AC747".
Council Site Actions: Only one site has a few hundred Dell computers that were shipped to end users with AOL software pre-installed (and, in almost all cases, never used). They are still investigating whether to expect that these ActiveX Controls may be present on these computers.
Council Site Actions: The council sites are still proceeding with their actions as stated last week: Most of the reporting council sites are taking action on this item and plan to role out the patches at some point in the future. A few sites will use the next regularly scheduled system maintenance window. Other sites are processing through their normal, but rigorous Oracle patch regression testing process, and will deploy the patches once testing is complete and successful.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5233 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.