A really light week. Enjoy it; next week will be much busier. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By SANS ****************************
How can I improve my pen testing regimen? What are the best and latest techniques for detailed reconnaissance? How can I leverage free tools with commercial tools for maximum effect? Find out at the Penetration Testing and Ethical Hacking Summit June 2-3 - Las Vegas. http://www.sans.org/info/28659
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, both new Pen Testing courses, CISSP, and SANS' other top-rated courses plus evening sessions with Internet Storm Center handlers. - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program with many bonus sessions and a big exhibition of security products: http://www.sans.org/info/26774 - - London (6/2-6/7) and Amsterdam (6/16-6/21) and Brussels (6/16-6/21) http://www.sans.org/secureeurope08 - - Denver (6/7-6/13) http://www.sans.org/rockymnt2008/ - - Singapore (6/30-7/5) http://www.sans.org/singapore08/ - - Boston (8/9-8/16) http://www.sans.org/boston08/ - - and in 100 other cites and on line any time: www.sans.org
*************************************************************************
************************** SPONSORED LINK *******************************
1) Get on top of security and compliance concerns with log management and integrated change monitoring http://www.sans.org/info/28664
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Yahoo! Assistant is a Browser Helper Object (BHO) for Microsoft Internet Explorer. It provides users of Internet Explorer with a variety of useful features. Part of its functionality is provided by the "yNotifier.dll" library. This library contains multiple exported objects, including some that were not designed to be instantiated within Internet Explorer. A malicious web page that instantiates these objects within Internet Explorer could trigger a memory corruption condition. Successfully exploiting these vulnerabilities could potentially allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a simple proof-of-concept are publicly available for these vulnerabilities.
Status: Yahoo! confirmed, updates available. Users can mitigate the impact of these vulnerabilities by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "2283BB66-A15D-4AC8-BA72-9C8C9F5A1691".
Description: Rdesktop is a popular open source client for the Remote Desktop Protocol (RDP), used most commonly by Microsoft Windows for desktop sharing. Rdesktop contains multiple vulnerabilities in its handling of RDP traffic. A malicious RDP server could send specially crafted traffic to a connected user to exploit one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details for these vulnerabilities are available via source code analysis. Note that, to be vulnerable, a user would have to connect to a malicious RDP server.
Status: Vendor confirmed, updates available.
Description: PHP is an extremely popular language for web development, included by default in a large variety of Unix, Unix-like, and Linux operating system distributions. It contains multiple vulnerabilities in its handling of a variety of PHP code constructs and remote input processing. A specially crafted PHP script could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. An additional flaw in the handling of multibyte characters may lead to command injection from external sources, though this is not confirmed. Full technical details for these vulnerabilities are publicly available via source code analysis. Note that users of hosting providers often have permission to upload PHP scripts to shared servers.
Status: PHP confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.