Apple patched several critical vulnerabilities in its Safari browser and fixed other security problems in Mac OS X. And Oracle is recommending its new patch be applied now.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored by Sourcefire ************************
Sourcefire, the creator of Snort, is offering the Open Source Snort community two comprehensive courses: "Snort: Building and Operating" and "Snort Rules."
Purchase both Snort courses either as an instructor-led or 60-day online training bundle and receive a FREE Snort Certified Professional exam (save $395).
For more information: http://www.sourcefire.com/services/training_schedule.html http://www.snort.org/training
Contact traininglist@sourcefire.com or 800.501.6008.
*************************************************************************
Upcoming Security Training in Monterey, San Diego and Washington DC
As you can see at www.sans.org, more and more SANS classes are sold out (the red triangles) so we have begun a policy of earlier posting of new conferences. If you are thinking about turbo charging your security career or the careers of any of your coworkers this spring, start planning now to go to San Diego in early May. You'll find more than a dozen of SANS most popular courses and a vendor exposition, right on the harbor in San Diego. http://www.sans.org/security06/
Or plan to come to Washington in July right after July 4 for the biggest SANS Fire ever: with all 17 SANS immersion tracks and more than a dozen special courses, a big exposition, and an inside look at how the Internet's Early Warning System (Internet Storm Center) actually works Bring your family for the national fireworks show. http://www.sans.org/sansfire06
*************************************************************************
********************* Sponsored Links: **********************************
1) Free WhatWorks Webcast this week - What Works in Intrusion Prevention: Sheltering Networks with The Red Cross Tuesday, March 07 at 1:00 PM EST (1800 UTC/GMT) http://www.sans.org/info.php?id=1050
2) Prepare for the June 10, 2006 CISA® Certification examination! The SANS® +S Training for the CISA® Certification Exam course has been specifically written to help prepare for and to pass the CISA® exam while ensuring that the information presented is practical and applicable in daily life.
New SANS@Home session led by James Tarala starts March 23.
See http://www.sans.org/info.php?id=1051
*************************************************************************
Part I for this issue has been compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Apple has released a cumulative security update for Mac OS X that fixes 20 vulnerabilities. This update fixes several critical vulnerabilities in Safari browser that can be exploited by a malicious webpage to compromise a user's system. Exploit code for one of the Safari flaws is publicly available and was discussed in the last week's @RISK newsletter. This security update also fixes code execution vulnerabilities in LibSystem, WebKit and rsync components. Apple also made security enhancements to warn iChat users attempting to download unsafe file types to prevent worms like Leap.A.
Status: Apply the Mac OS X security update 2006-001 on a priority basis.
Council Site Actions: Two of the reporting council sites are using the affected software. One site will be distributing the patches during their next regularly scheduled system update process. The other site uses Apples Software Update Facility and hence most of their systems are already patched or will be soon.
Description: Oracle has released a security update for Oracle E-business diagnostics that will be included in the next critical patch update to be released in April 2006. Oracle Diagnostics package allows an Oracle E-business suite administrator to conduct various tests related to the suite's configuration and functioning. Some of the Diagnostic webpages can be accessed without any authentication as well as some contain SQL injection vulnerabilities. The technical details required to exploit these flaws have not been posted. Note that the "HIGH" rating is based on the fact that Oracle is advising customers to apply this patch.
Status: Apply the patch released for the Diagnostics package. A workaround is to block access to URLs that begin with "/OA_HTML/jtfqa" from the Internet using a firewall or an IPS.
Council Site Actions: Only one of the reporting council sites is using the affected software. They are still reviewing the vulnerability alert and will most likely wait until the next Oracle quarterly update to patch their systems.
Description: Microsoft Internet Explorer contains a stack-based buffer overflow in the "IsComponentInstalled" function. The overflow has reportedly been fixed in Windows 2000 SP4 and Windows XP SP1. Exploit code has been included in the Metasploit project.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4922 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.