Good news: We're getting our arms around the "Coolest jobs in Information Security" both to educate students who are considering jobs in security and to help people who want o see where they might take their careers. We've even identified the "Top Guns." If you want to see them (and even if you have already seen an earlier version) please go to http://www.surveymethods.com/EndUser.aspx?98BCD0CF99DECFC2 and help us rate them: Alan PS Novell and Opera are the tools with the most critical vulnerabilities this week.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************************************************************* TRAINING UPDATE - - SANS CDI in Washington 30 courses; big security tools expo; lots of evening sessions: http://www.sans.org/ cdi08/ - - Monterey (10/31-11/6) http://www.sans.org/ info/30738 - - Sydney Australia (10/27-11/1) http://www.sans.org/ sydney08/ - - Vancouver (11/17-11/22) http://www.sans.org/ vancouver08/ and in 100 other cites and on line any time: www.sans.org *************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Novell eDirectory is Novell's implementation of the Lightweight Directory Access Protocol (LDAP). It contains multiple buffer and integer overflows in a variety of subsystems. A specially crafted request to the server could exploit one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (usually SYSTEM). The vulnerabilities exist in the server's SOAP interface and Core Protocol interface. Technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Opera is a popular cross-platform web browser and suite of internet applications. It contains multiple vulnerabilities in its handling of addresses and Java applets. A specially crafted address used in a redirection can result in a buffer overflow vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details for this vulnerability are publicly available. Additionally, a flaw in the handling of Java applets can result in an information-disclosure vulnerability.
Status: Vendor confirmed, updates available.
Description: TCP is the Transmission Control Protocol, one of the fundamental protocols of the Internet. Reports have surfaced indicating that several common implementations of the protocol suffer from a denial-of-service condition. No concrete details have been released for this vulnerability, but speculation has lead to various guesses and attempts. Current reports indicate that at least Microsoft WIndows, Apple Mac OS X, and Linux are vulnerable. It is unknown if firewalls can mitigate this vulnerability. Details of the vulnerability are expected to be revealed at the T2 security conference in mid-October.
Status: No confirmation.
Description: mIRC is a popular Internet Relay Chat (IRC) client for Microsoft Windows. It contains a buffer overflow in its handling of the IRC "private message" (PRIVMSG) command. A specially crafted PRIVMSG command sent to a vulnerable client could trigger this buffer overflow, allowing an attacker to execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability. Private messages can be sent unsolicited in some networks.
Status: Vendor has not confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.