Firefox, Apple OS-X and Microsoft's GP (Great Plains) accounting software all are on the "critical" list this week. Lower down the list you'll also find more than 90 new vulnerabilities in commercial web applications. How many critical vulnerabilities do you think there are in the web applications your programmers are writing? Do you know? Is it time to find out? Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By SANS ****************************
The Virtualization Security Summit August 7-8 is a user-to-user, non-commercial conference on What Works in Virtualization Security. It is the only place where you can learn about the strengths and weaknesses of competing virtualization technologies and where users share the lessons they learned about how to make virtual environments secure. http://www.sans.org/info/30533
*************************************************************************
TRAINING SCHEDULE UPDATE - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program http://www.sans.org/sansfire08/ - - Canberra (6/30-7/5) http://www.sans.org/canberra08/ - - Singapore (6/30-7/5) http://www.sans.org/singapore08/ - - Boston (8/9-8/17) http://www.sans.org/boston08/ - - Virginia Beach (8/21-8/29) http://www.sans.org/vabeach08/ Plus 100 other cites and on line any time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Dynamics GP (previously known as Microsoft Great Plains and Microsoft Dynamics) is a popular accounting software package. It contains multiple vulnerabilities in its handling of a variety of user inputs in its Distributed Process Manager and Distributed Process Server components. A specially crafted user request could trigger one of several buffer overflows or string handling vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Some technical details are publicly available for these vulnerabilities
Status: Vendor confirmed, updates available.
Description: Apple Mac OS X contains multiple vulnerabilities in several of its subsystems. Impact from successfully exploiting these vulnerabilities range from remote code execution with the privileges of the current user to denials-of-service. Flaws are also present in the WebKit framework, used by several applications on Mac OS X to render HTML content. These applications include Safari and Mail. This security update also addresses several vulnerabilities discovered in third party applications bundled with the operating system. The WebKit vulnerability was discussed in a previous edition of @RISK.
Status: Vendor confirmed, updates available.
Description: Several vulnerabilities have been discovered in code shared among the Mozilla Firefox, Thunderbird, and SeaMonkey products. Flaws in the handling of web page layout, JavaScript scripts, Mozilla chrome, and other input can result in crashes. At least some of these crashes are believed to be exploitable for remote code execution with the privileges of the current user. Full technical details for these vulnerabilities are available via source code analysis. Note that Thunderbird is not believed vulnerable in its default configuration.
Status: Vendor confirmed, updates available.
Description: Opera is a popular cross-platform web browser and internet application suite. It contains an undisclosed vulnerability in its handling of input that can result in arbitrary code execution with the privileges of the current user. Additionally, several information disclosure vulnerabilities were discovered. Note that some reports indicate that only the version of Opera for Microsoft Windows is vulnerable.
Status: Vendor confirmed, updates available.
Description: VideoLAN Client (VLC) is a popular cross-platform media player application. It contains a vulnerability in its handling of WAV format sound files. A specially crafted WAV file could trigger this vulnerability, leading to an integer overflow. Successfully exploiting this integer overflow could result in arbitrary code execution with the privileges of the current user. Note that, depending upon configuration, WAV files may be opened by the vulnerable application without first prompting the user. Full technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.