Nothing critical this week. A good week to relax and make sure everyone you know has gotten Conficker off their systems. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored By Tufin Software Technologies ***************
Complete Firewall Security Audits in 25% of the Time!
Tufin SecureTrack automates repetitive firewall administration tasks so you can make configuration changes twice as fast. Eliminate risks right away with real-time change monitoring and in-depth policy risk analysis. Improve security and performance with automated rulebase usage optimization.
Learn more - click for a free Tufin polo shirt and a chance to win an Apple iPod Touch. http://www.sans.org/info/42064
*************************************************************************
TRAINING UPDATE - - Toronto 5/5-5/13 (15 courses) http://www.sans.org/toronto09/event.php - - SANSFire in Baltimore 6/13-6/20 (24 long courses, 12 short courses) http://www.sans.org/sansfire09/event.php - - New Orleans 5/5-5/10 (6 courses) http://www.sans.org/securityeast09/event.php - - Washington DC (Tyson's Corner) 4/14-4/22 (5 long courses and 8 short courses) http://www.sans.org/tysonscorner09/event.php - -- Plus San Diego, Amsterdam and more, too. See www.sans.org - - Log Management Summit in Washington 4/5-4/7 http://www.sans.org/logmgtsummit09/ - - Looking for training in your own community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
********************* SPONSORED LINK **********************************
1) WEBCAST: Keynote by FORRESTER, "Defenses Against Web 2.0 Threats with Cloud Security" brought by Zscaler http://www.sans.org/info/42069
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Mozilla Firefox is a popular web browser from the Mozilla Application Suite. As of March 2009 Firefox had 22.05% of the share of the usage of web browsers. There is a flaw in Mozilla Firefox in the way it processes the XUL tree method "_moveToEdgeShift()". A call to this method could trigger garbage collection routines on objects that are still in use, thereby resulting in a future call to a dangling pointer. This could either crash the browser or successful exploitation could lead to arbitrary code execution under the context of the user running the application. User interaction is not required to exploit this but the victim has to be enticed to visit the website with the malicious webpage. Technical details about the vulnerability are publicly available along with Proof of Concept. The vendor has already has fixed this flaw, upgrade to Firefox 3.0.8.
Status: Vendor confirmed, updates available.
Description: SAP AG is the largest European and the fourth largest in the world software enterprise. And SAPGUI is the graphical user interface (GUI) client in SAP R/3's 3-tier architecture. SAPGUI includes an EAI WebViewer3D ActiveX control and is provided by "webviewer3d.dll" .This activeX control, produced by the Siemens Unigraphics Solutions but reported only to be used by SAP, contains a stack-based buffer overflow vulnerability in the "SaveViewToSessionFile()" method. Exploitation, if successful, can be used by attackers to execute arbitrary code with the privileges of the logged on user. The patch provided by the vendor ,in SAPgui 7.10 Patch Level 9, sets a kill bit for the vulnerable control.
Status: Vendor confirmed, updates available.
Description: W3C's Amaya is a free, lightweight and open source web authoring tool with browsing abilities. Nowadays Amaya is usually used as a test bed for new applications that are not yet supported by other popular browsers. It has a buffer overflow vulnerability while processing web pages with HTML tags containing an overly long "defer" attribute, caused due to inadequate checks on the user supplied inputs. Successful exploitation may lead to arbitrary code execution and failed attempts may cause denial-of-service condition. Attackers have to entice the victim to visit the malicious web page. Technical details are publicly available along with proof of concepts.
Status: Vendor possibly not confirmed, no updates available.
Description: Ghostscript is a suite of software that provides an interpreter for the PostScript language and for the Portable Document Format (PDF) files. It can also be used to convert between PostScript language files and PDF files. There is a buffer overflow vulnerability in Ghostscript in the "pdf_base_font_alloc()" function in gdevpdtb.c. The common ways of carrying this attack out is enticing an unsuspecting user to open a specially crafted PDF file or converting a specially crafted PostScript language file to PDF file. Exploitation, if successful, can lead to arbitrary code execution with the privileges of the user running the application. Technical details are publicly available along with proof of concept.
Status: Vendor confirmed, updates available.
Description: Wireshark is a packet sniffer computer application, similar to tcpdump, used for network troubleshooting and analysis. Wireshark has a format string vulnerability in the PN-DCP dissector when processing specially crafted packets with station names containing format string specifiers. A specially crafted packet captured off the wire or loading of a malicious trace file could trigger this vulnerability. Exploitation, if successful, could lead to arbitrary code execution with the privileges of the user running the vulnerable application. Failed attempts might lead to denial-of-service condition. Technical details are available along with proof of concept.
Status: Vendor not yet confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 6825 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organ