Unpatched, critical vulnerability reported in the core of nearly all versions of Windows. Plus patched critical vulnerabilities in Adobe Reader and Acrobat and HP OpenView. Alan
PS. If you are working in application security (perhaps taking on the cool new job of application security manager) and are trying to learn which tools work best for finding flaws or blocking attacks, try to get a seat at the Washington DC workshop where feds and financial users will share their experiences in using nearly all the popular application security tools (white box, black box, firewalls). Register at http://www.sans.org/appsec09_summit/ And a similar workshop on log management at http://www.sans.org/logmgtsummit09
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********** Sponsored By Qualys ***********
Qualys presents these popular PCI resources to help your organization show proven ROI and help automate compliance initiatives. "PCI Compliance Current & Future Trends" webcast: http://www.sans.org/info/41143 COSEC Compliance Through Security Poster: http://www.sans.org/info/41148 "4 Steps to Automate IT Security Compliance" whitepaper: http://www.sans.org/info/41153
*************************************************************************
TRAINING UPDATE - - Phoenix 3/23-3/30 (5 courses) http://www.sans.org/phoenix09/ - - Washington DC (Tyson's Corner) 4/14-4/22 (5 long courses and 8 short courses) http://www.sans.org/tysonscorner09/event.php - - Log Management Summit in Washington 4/5-4/7 http://www.sans.org/logmgtsummit09/ - - Plus Calgary, New Orleans, San Diego and more... - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
******************** SPONSORED LINKS **********************************
1) CA Identity Lifecycle Management - View this 4 minute demo at: http://www.sans.org/info/41158
2) Cisco Systems Cisco Enterprise Policy Manager - View this 15 minute demo at: http://www.sans.org/info/41188
3) Damballa, Inc. Failsafe - View this 24 minute demo at: http://www.sans.org/info/41193
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Graphics Device Interface (GDI) is an application programming interface by Microsoft Windows. It's a core operating system component responsible for representing graphical objects. Microsoft Windows GDI has integer overflow vulnerability in gdiplus.dll while processing Enhanced Metafile (EMF) files. Possible vectors to exploit the flaw are: (a) Create a webpage containing a malicious WMF or EMF image file, and entice an attacker to visit his webpage. (b) Send an email with a specially crafted EMF image file attachment and convincing the user to view it or (c) embedding the malicious image file in an Office document and convincing the user to open it. Successful exploitation might lead to code execution or denial-of-service. Technical details about the vulnerability are publicly available.
Status: Vendor not yet confirmed, no updates available.
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe Acrobat and Reader have buffer overflow vulnerabilities while handling JBIG2 streams inside a PDF file. JBIG2 is an image encoding standard for encoding bi-level images. One of the flaws is due to a four byte value which represents the number of values in a table and is used to allocate a buffer. This value is taken from the file without adequate checking and a specially crafted PDF file can be used to overflow the buffer. The other flaw is due to a malformed JBIG2 symbol dictionary segment contained in a malicious PDF file. There are still some other unspecified errors in the processing of this JBIG2 streams. Potential vectors of attack are sending the malicious PDF document as an email attachment, or enticing the victim to visit the website that has malicious document - which can be achieved via iframes, or placing the document on a file share. In either case the attacker has to convince the victim to open the files. Successful exploitation can lead to code execution. Some technical details are publicly available.
Status: Vendor confirmed, updates available.
Description: HP OpenView Network Node Manager (NNM) is a network and system monitoring and managing component of HP OpenView's suite of applications. NNM provides several CGI scripts for web-based management of the NNM server. There are three bugs in this issue with one of them an offshoot of the bug in NNM as discussed in http://www.sans.org/newsletters/risk/display.php?v=8&i=2#widely1. The first issue is caused a stack-based buffer overflow error in a CGI application "Toolbar.exe". By sending an HTTP request with an overly long "OvOSLocale" cookie parameter the error can exploited. The second issue is a buffer overflow in "ov.dll" and can be exploited by sending an HTTP request to "Toolbar.exe" application with overly long "OvAcceptLang" cookie parameter. The third issue is a heap-based buffer overflow in "libovwww.so.4" and "ovwww.dll" and can be exploited by sending a large "Accept-Language" HTTP header. Successful exploitation in each case can lead to arbitrary code execution. Technical details are publicly available for these vulnerabilities along with proof of concepts.
Status: Vendor confirmed, updates available.
Description: Products from the Mozilla Foundation, like its popular Firefox web browser and internet suite SeaMonkey are vulnerable to memory corruption. While processing specially crafted Extensible Stylesheet Language Transformations (XSLT) there is an error within the "txMozillaXSLTProcessor::TransformToDoc()" function, which could either cause a denial of service or potentially execute arbitrary code. User interaction is needed where the victim has to visit the malicious webpage. Technical details are available for this vulnerability along with a public proof of concept.
Status: Vendor not confirmed, no updates available.
Description: Multiple vulnerabilities have been reported in Sun Java which could be used by attackers to compromise a system, disclose sensitive information, bypass security restrictions or cause a denial of service. The first issue is an error in Java Runtime Environment (JRE) while initializing LDAP connections which may allow denial of service or code execution. The second issue is Buffer Overflow Vulnerabilities in the Java Runtime Environment (JRE) using "unpack200" JAR Unpacking Utility while unpacking applets and Java Web Start applications, which may allow arbitrary code execution. The third issue is buffer overflow vulnerabilities in JRE while processing malformed image files, or specially crafted fonts. The fourth issue is caused by errors while storing and processing temporary font files. Successful exploitation may lead to consumption of large amount of disk space and denial of service. The fifth issue is an error in the HTTP server implementation of the Java Runtime Environment which could allow attackers to cause denial of service of JAX-WS service endpoint that runs on the JRE. The sixth issue is an error in the Java Runtime Environment Virtual Machine with Code Generation and may allow an untrusted applet to elevate privileges. The seventh issue is multiple security vulnerabilities in Java Plug-in which could be exploited to escalate privileges, or disclose sensitive information.
Status: Vendor confirmed, updates available.
Description: IBM's eGatherer Access Support ActiveX controls are designed to automate support for the IBM PCs. There is a buffer overflow vulnerability in this ActiveX control, which is provided by "IbmEgath.dll", while parsing input supplied in the "GetXMLValue()" method. A malicious webpage or an HTML email may exploit these controls to silently execute arbitrary code on a client system. There is no patch provided by the vendor as of now, so a workaround until then is to set a kill bit for the following CLSID: {74FFE28D-2378-11D5-990C-006094235084}. Successful exploitation can lead to arbitrary code execution.
Status: Vendor not yet confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 6792 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.