Google Chrome the browser for Windows and Apple Mac default printing systems (CUPS) both have newly announced vulnerabilities that allow remote control of vulnerable systems. Both have vendor patches available.
Get $200 Travel Voucher if you regester for the Penetration Testing Summit by May 15. Details: http://www.sans.org/pentesting09_summit/travelbucks.php
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - SANSFIRE in Baltimore 6/13-6/20 (24 long courses, 12 short courses) http://www.sans.org/sansfire09/event.php - - New Orleans 5/5-5/10 (6 courses) http://www.sans.org/securityeast09/event.php - -- Plus San Diego, Amsterdam and more, too. See www.sans.org - - Looking for training in your own community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
********************* SPONSORED LINK **********************************
1) Complete Firewall Security Audits in 25% of the time with Tufin. Learn how and get your free shirt. http://www.sans.org/info/43263
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Google Chrome is Google's web browser for Microsoft Windows. It contains a flaw in its graphics rendering engine (known as "Skia"). A specially crafted web page could trigger this flaw, leading to an integer overflow. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the current user. Full technical details are publicly available for this vulnerability via source code analysis. Other software utilizing the Skia rendering library may also be vulnerable.
Status: Vendor confirmed, updates available.
Description: Apple CUPS is the Common Unix Printing System. It is the default printing subsystem on Apple Mac OS X and many other Unix and Linux based operating systems. It contains a flaw in its handling of PDF documents containing JBIG2 symbol dictionaries. JBIG2 is a common encoding for images. A specially crafted PDF file submitted for printing to a CUPS server could trigger this flaw, leading to arbitrary code execution with the privileges of the vulnerable process. Full technical details are publicly available for this vulnerability via source code analysis.
Status: Vendor confirmed, updates available. It is believed that this vulnerability is related to a flaw in the Xpdf PDF viewing and processing program, the subject of a previous @RISK entry.
Description: HP OpenView Network Node Manager (NNM) is a popular enterprise network and system management application. It contains a flaw in one of its subcomponentts. A specially crafted request to this component could trigger this flaw, allowing an attacker to execute arbitrary code with the privileges of the vulnerable process. Few technical details are publicly available for this vulnerability. Note that this vulnerability is believed to be distinct from the vulnerability discussed in last week's @RISK.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.