A light week for most folks. Only Lotus Notes users have much to worry over this week. A lot of the big companies rely on Notes and malicious attachments can punch a big hole in the firewall of those organizations.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By SANS ********************************
The SANS Mobile Encryption and Data Leak Protection Summits December 3-4 are in-depth program featuring user-to-user discussions focused on lessons learned, mistakes to avoid, and technologies and processes that work in protecting sensitive data. Get your burning questions answered by those who have already fought the wars. Mobile Encryption: http://www.sans.org/info/18547 Data Leak Protection: https://www2.sans.org/info/15921
*****************************************************************************
************************ Sponsored Links: *********************************
1) Free, 60 minute webcast, Wednesday, October 31 at 3PM EST celebrating National Security Awareness Month, co-sponsored by NYC Metro InfraGard ( http://www.sans.org/info/18552). Speakers: Eric Cole and Ed Skoudis, SANS Institute Fellows. Please contact Scott Weil, sweil@sans.org to register for this free event webcast.
2) Save with SANS Voucher Credit today. One procurement, transcend fiscal years, online usage reports, status updates. Visit online today http://www.sans.org/info/18557 or Email Vouchers@sans.org.
3) SAVE BIG! Get 30% off any upcoming courses through SANS OnDemands Pre-Paid program http://www.sans.org/info/18477 or email ondemand@sans.org
*****************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: IBM Lotus Notes, IBM's enterprise groupware solution, contains multiple vulnerabilities. Several of its built-in file viewers, used to view other files within the application, contain buffer overflows or other vulnerabilities. A specially crafted attachment to an email or other document could trigger one of these vulnerabilities when a user views the attachment, allowing an attacker to execute arbitrary code with the privileges of the current user. Additionally, a buffer overflow in the handling of HTML email messages could allow an attacker to execute arbitrary code with the privileges of the current user when the message is acted upon (e.g. replied to or copied to the clipboard). Other vulnerabilities could allow attachments to be automatically executed, or allow for information disclosure. Multiple proofs-of-concept and technical details are available for these vulnerabilities.
Status: IBM confirmed, updates available.
Description: Symantec Mail Security is Symantec's enterprise mail analysis engine for viruses, malware, and spam. Symantec Mail Security contains multiple vulnerabilities in its handling of various document formats. Specially crafted documents could exploit these vulnerabilities to execute arbitrary code with the privileges of the vulnerable process or create a denial-of-service condition. These flaws may be related to the IBM Lotus Notes flaws discussed above. Note that no user interaction is necessary to exploit these vulnerabilities; a message transiting the server may exploit them.
Status: Symantec confirmed, updates available.
Description: Real Networks RealPlayer is a popular, multi-platform media player. Helix Player is an open source media player based on code released by Real Networks. These applications contain flaws in their handling of various file formats. A specially crafted file opened by one of these applications could trigger a buffer overflow and allow an attacker to execute arbitrary code with the privileges of the current user. Depending upon configuration, the vulnerable file types may be opened automatically by one of the vulnerable applications. Technical details for these vulnerabilities are available via source code analysis and in various advisories. These vulnerabilities may be related to a vulnerability discussed in a previous edition of @RISK.
Status: Real Networks confirmed, updates available.
Description: The Sun Java Runtime Environment contains multiple vulnerabilities in its sandboxing of Java applets and applications. A specially crafted applet or application could break the built in protection afforded by the runtime environment and read or write arbitrary files, or execute arbitrary commands, with the privileges of the current user. No technical details for these vulnerabilities are currently publicly available. Sun's Java Runtime Environment is installed by default on all Apple Mac OS X systems, many Microsoft Windows systems, and a number of Linux, Unix, and Unix-like systems.
Status: Sun confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.