RealPlayer is the only major problem this week - assuming you have made sure you and your ISPs have fixed the DNS problem from last week. Here are two ways to test your ISP (Internet Service Provider) to determine whether the DNS server you rely on has been patched. 1. Dan Kaminsky's test is at the upper right corner at http://www.doxpara.com/ 2. The DNS Operations, Analysis and Research Center offers a testing tool at https://www.dns-oarc.net/oarc/services/dnsentropy and here is a great explanation of the problem by Dan Kaminsky. http://www.doxpara.com/ ?p=1185 Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******** A Challenge/Gift for People Who have CEH Certifications *******
The new GPEN (GIAC Penetration Tester) Certification measures mastery of tools that are so up to date and measures pen testing skills so effectively that people who buy penetration testing have begun asking for it in potential pen testers. As a gift to the CEH community, SANS is offering free testing to 50 active CEH holders who want to demonstrate that their skills cover the most up to date set of tools and effective pen testing procedures, as well. The first 50 CEH's who ask will be allowed to take the exam at no cost. If you want to take the exam, email me (apaller@sans.org).
*************************************************************************
TRAINING UPDATE
- - Las Vegas (9/28-10/6) http://www.sans.org/ns2008 NETWORK SECURITY 2008
- - Boston (8/9-8/16) http://www.sans.org/boston08/
- - Virginia Beach (8/21-8/29): http://www.sans.org/vabeach08/
- - Chicago (9/3-9/10) http://www.sans.org/chicago08 AUDIT & COMPLIANCE
- - and in 100 other cites and on line any time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: RealPlayer is a popular media playing application for multiple operating systems. It contains multiple vulnerabilities in its handling of a variety of media formats. Additionally, on Microsoft Windows platforms, multiple RealPlayer ActiveX controls contain vulnerabilities. Successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Generally, malicious content would be opened upon receipt automatically by the vulnerable application, without first prompting the user. Full technical details are publicly available for several of these vulnerabilities.
Status: Vendor confirmed, updates available. The ActiveX vulnerabilities can be mitigated by disabling the affected controls via Microsoft's "kill bit" mechanism. Lists of vulnerable CLSIDs are available in the Zero Day Initiative advisories.
Description: Trend Micro OfficeScan is a popular antivirus solution. Part of its functionality is provided by an ActiveX control. This control contains multiple buffer overflows in its handling of various parameters. A malicious web page that instantiates this control would allow an attacker to exploit one of these buffer overflows. Successfully exploiting one of these buffer overflows would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for these vulnerabilities.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "5EFE8CB1-D095-11D1-88FC-0080C859833B". Note that this may affect normal application functionality.
Description: HP OVIS Probe Builder, also known as HP Internet Services and European Performance Systems Probe Builder, is a popular enterprise network architecture management system. It contains a vulnerability in its handling of remote procedure calls. An unauthenticated user could call an exported procedure that can kill (terminate) a user-specified process on the vulnerable host. A user could cause a complete system shutdown by killing a Microsoft Windows system process, or kill other applications running on the vulnerable system. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by blocking TCP port 32968 at the network perimeter, if possible.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.