A very quiet week, but if you are using RealNetworks Helix Server, update it today. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored By ArcSight, Inc. ************************
Webcast Update: ArcSight Logger 7100 v.3.0 Review, featuring SANS Analyst Jerry Shenk and ArcSight's Ansh Patnaik This Webcast will cover drivers and basic requirements when adding to, developing or acquiring log management systems, followed by an overview of the ArcSight Log Management system. http://www.sans.org/info/36754
*************************************************************************
TRAINING UPDATE - - SANS 2009 in Orlando in early march - the largest security training conference and expo in the world. lots of evening sessions: http://www.sans.org/index.php - - SANS Security West Las Vegas (1/24-2/01) http://sans.org/securitywest09/ - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
******************* SCADA Security Summit *****************************
Rediscover New Orleans and hear about Process Control Security issues. - Process Control & SCADA Summit January 16-17. http://www.sans.org/info/36759
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Helix Server is a popular streaming media server from RealNetworks. It contains multiple vulnerabilities in its processing of a variety of Real Time Streaming Protocol (RTSP) and other requests. A specially crafted request could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. Technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: xterm is the terminal emulator of the X Window System, the standard network-enabled windowing system for Unix and Unix-like platforms. It contains a flaw in its handling of certain escape sequences (sequences of characters that, when read by the terminal, cause it to take action). A specially crafted "DECRQSS Device Control Request Status" escape sequence could trigger this vulnerability, allowing an attacker to execute arbitrary commands with the privileges of the current user. An attacker could exploit this vulnerability by tricking a user into displaying a malicious text file in an xterm window, or sending such characters in a network terminal session (for example, during an SSH or telnet session). Note that this affects the reference implementation of xterm from X.org, and presumably also affects versions of xterm that share that codebase (such as XFree86).
Status: Vendor confirmed, updates available.
Description: Most web browsers support HTTPS, the Secure Hypertext Transfer Protocol. This protocol provides for various levels of security, including verification that a website is who it claims to be. This is made possible via public key cryptography. In such a cryptographic system, certificates are used to verify identity. Such certificates are "signed" using a cryptographic hash function, such as MD5 or SHA. Web browsers keep track of a certain set of trusted Certification Authority certificates; these certificates are used by trusted third parties (certification authorities) to prove the identity of a website or other user of a certificate. A flaw has been known in the MD5 hash function (often used for digital signatures) for several years, but until now no practical attack had been demonstrated. A group of researchers has now exploited this flaw to create a forged Certification Authority certificate that is accepted by most major web browsers. Using such a certificate, an attacker could trick a user into believing that a given web site has been verified as the site it claims to be (for example, a web browser could be tricked into believing that a malicious site is a banking site). Note that, while much research on this flaw is publicly available, the exact method of exploitation has not been published.
Status: As long as common certification authorities use the MD5 algorithm, this problem will persist. Users who create their own digital certificates are recommended to use a more secure algorithm, such as SHA.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.