Quiet week, though HP OpenView might become a fertile target as more data about the buffer overflow leaks out. Alan
PS The most frequent answer to last week's question on how to check automatically for patches for non-Windows products is the free (personal use) version of Secunia at http://secunia.com/vulnerability_scanning/personal/ Thanks to all who sent that in, especially Robert Rathbun of Northrup Grumman. Sadly, I still have not found large scale use of the commercial version --- it may be priced too high. Sad.
The other suggestion came from Bruce Burrell of the University of Michigan. He uses and recommends a set of configurations and multiple browsers. But he also said, "most users won't do that, but when you find one who will, polish, for that user is a true gem. "
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Sponsored By HP (SPI Dynamics) ***********************
Tool Talk Webcast: HP Tackles Cloud Application Security
In this webcast, participants will learn about: * The three most common delivery platforms for Cloud computing, IaaS, PaaS and SaaS. * How to manage application keys and handle sensitive information for each platform. * How the delivery platforms impact the software development lifecycle * How we expect hackers to approach cloud applications * How HP can help you secure cloud applications
http://www.sans.org/info/45369
*************************************************************************
TRAINING UPDATE - - Rocky Mountain SANS, July 7-13 (6 full-length hands-on courses) http://www.sans.org/rockymnt2009/event.php - - SANS Boston, Aug 2-9 (6 full-length hands-on courses) https://www.sans.org/boston09/index.php - - National Forensics Summit, July 6-14 http://www.sans.org/forensics09_summit/ Looking for training in your own community? http://sans.org/community/ Save 25% on all On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Amsterdam, London, Dubai, Riyahd, Cairo, Melbourne, Canberra, and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
*************************** Sponsored Links: ****************************
1) SANS Vendor Demo Spotlight: Damballa - Failsafe: Find & stop bot malware threats with Failsafe security appliances. http://www.sans.org/info/45374
2) SANS Recommended Webcast Replay featuring: Q1 Labs - Un-Locked Next-Generation Log Management: Optimized for the Broad Market Five Distinct Advantages of the QRadar Log Management Solution http://www.sans.org/info/45379
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Timbuktu Pro is a remote desktop access application developed by Motorola and designed to work with multiple operating systems. It has a stack based buffer overflow vulnerability caused due to improper handling of user-supplied data passed through a named pipe session. An attacker could exploit this vulnerability by sending a long malformed character string over the "PlughNTCommand" named pipe. Successful exploitation might allow an attacker to execute arbitrary code with SYSTEM privileges or cause a denial-of-service condition. Authentication is not required to establish a session on the named pipe, once the system with vulnerable Timbuktu installation and "PlughNTCommand" named pipe is located by the attacker.
Status: Vendor confirmed, updates available.
Description: HP OpenView Network Node Manager (OV NNM) is a suite of applications that manages enterprise networks and large-scale systems. It has stack based buffer overflow vulnerability within an application that is distributed in the Linux version. The specific flaw is caused by a boundary error in "rping" application while handling certain user-supplied inputs. A specially crafted request to this application might trigger this vulnerability and successful exploitation might lead to remote code execution. Few technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
Description: Unisys Business Information Server (BIS) has a stack-based buffer overflow vulnerability caused due to improper handling of user-supplied data. The specific flaw is a boundary error in the "mnet.exe" service while processing packets that are sent to the Business Information Server over a TCP port. Successful exploitation might allow an attacker to either cause a denial-of-service condition or execute arbitrary code with the privileges of the affected service. No technical details are provided for this vulnerability.
Status: Vendor confirmed, updates available.
Description: VLC media player is an open source, cross-platform media player developed by the VideoLAN project. It has got a buffer overflow vulnerability which can be triggered while processing a specially crafted playlist file. The specific flaw lies within the "Win32AddConnection()" function in modules/access/smb.c, as it has a boundary error while processing a specially crafted playlist file with an over long "smb://" URI. Note that, depending upon configuration, these files may be opened automatically by the application without first prompting the user. Successful exploitation might lead to arbitrary code execution with the privileges of the logged on user. Full technical details and proof-of-concept for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Baofeng Storm is a popular Chinese media player with almost 120 million user base in China. It has a buffer overflow vulnerability which can be triggered by a specially crafted "smpl" playlist file. The specific flaw is a boundary error in "medialib.dll" while processing "smpl" playlist with overly long entry. The unsuspecting user will have to be tricked into opening these malicious files. Successful exploitation might allow an attacker to execute arbitrary code with the context of the logged on user. Full technical details along with proof-of-concepts are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7205 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.