No big packages with critical vulnerabilities this week, but notice more than 90 new web application vulnerabilities discovered this week. It's an epidemic. The colleges have discovered a cool way to teach secure coding so there's hope that we can turn the tide. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************* Sponsored By SANS Forensics Summit ******************* Join other professionals at the Forensics & Incident Response Summit October 13-14. Discuss the latest processes and technologies for effective incident response and mitigation, forensic analysis, and recovery as a result of a data breach in any size organization. Hear what your peers are doing in this space and what the best tools are. http://www.sans.org/info/33789 *****************************************************************************
*************************** TRAINING UPDATE ******************************* - - - SANS CDI in Washington (12/10 -12/16) 30 courses; big security tools expo; lots of evening sessions: http://www.sans.org/cdi08/ - - - Monterey (10/31-11/6) http://www.sans.org/info/30738 - - - Sydney Australia (10/27-11/1) http://www.sans.org/sydney08/ - - - Vancouver (11/17-11/22) http://www.sans.org/vancouver08/ - - - Las Vegas (1/24-2/3/2009) http://www.sans.org/securitywest09 and in 100 other cites and on line any time: www.sans.org *****************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: RealFlex/DATAC RealWin is a Supervisory Control And Data Acquisition (SCADA) management application that runs on Microsoft Windows. SCADA protocols are used in industrial control and monitoring situations, including manufacturing plants and power generation facilities. RealWin contains a buffer overflow in its handling of certain SCADA messages. A specially crafted SCADA message sent to the software could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. This could be leveraged to additionally compromise any SCADA client devices controlled by the server. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users are advised to block all SCADA ports at the network perimeter, if possible.
Description: Trend Micro Office Scan is a popular malware scanning tool for businesses. Its web interface contains multiple vulnerabilities in its handling of a variety of user inputs. A specially crafted request could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Nokia PC Suite is a suite of applications designed to provide connectivity between systems running Microsoft Windows and various Nokia mobile devices. It contains a buffer overflow in its handling of user requests. A specially crafted request sent to the service could trigger this vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available.
Description: Autodesk LiveUpdate is an update component provided with several Autodesk applications. Autodesk DWF Viewer is a component used to view Autodesk design files. These components' functionality is provided in ActiveX controls. These controls fail to properly sanitize their input, leading to remote command execution and arbitrary file download vulnerabilities. A specially crafted web page that instantiated this control could leverage these vulnerabilities to execute arbitrary commands with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of these vulnerabilities by disabling the affected controls via Microsoft's "kill bit" mechanism using CLSIDs "89EC7921-729B-4116-A819- DF86A4A5776B" and "A662DA7E-CCB7-4743-B71A-D817F6D575DF". Note that this may affect normal application functionality.
Description: Novell ZENworks is a popular enterprise systems management application. Part of its functionality on Microsoft Windows is provided by an ActiveX control. This control contains a buffer overflow vulnerability in its "CanUninstall" method. A specially crafted web page that instantiated this control could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism using CLSID "0F517994-A6FA-4F39-BD4B- EC2DF00AEEF1". Note that this may affect normal application functionality.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.