One ActiveX vulnerability plus the big DDoS attack on government and industry and international sites. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored By HP (SPI Dynamics) *********************
Tool Talk Webcast: HP Tackles Cloud Application Security
In this webcast, participants will learn about: * The three most common delivery platforms for Cloud computing, IaaS, PaaS and SaaS. * How to manage application keys and handle sensitive information for each platform. * How the delivery platforms impact the software development lifecycle * How we expect hackers to approach cloud applications * How HP can help you secure cloud applications
http://www.sans.org/info/45518
*************************************************************************
*********************** Sponsored Links: *****************************
1) Be sure to register now for the Ask The Expert Webcast: Managing Change and Event Monitoring for Sustainable NERC CIP Compliance http://www.sans.org/info/45523
2) SANS Vendor Demo Spotlight: IBM Rational Appscan - Engage more testers earlier in the SDL with Rational Appscan's static & dynamic analysis capabilities. http://www.sans.org/info/45528
3) SANS Recommended Webcast Replay Featuring: Novell ZENworks Endpoint Security Management- A Technical Demonstration http://www.sans.org/info/45533
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Video ActiveX Control "MSVidCtl.dll" is used to connect Microsoft DirectShow filters for their intended use of capturing, recording and playing video and is the main component of Microsoft Windows Media Center. This control has a stack-based buffer overflow vulnerability which can be exploited while reading a specially crafted data file. A malicious web page that instantiates the vulnerable component could trigger this vulnerability and execute arbitrary code with the privileges of the current user. Some technical details are publicly available for this vulnerability, as is a proof-of-concept.
Status: Vendor confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the affected controls, mentioned in Microsoft Security Advisory (972890), using Microsoft's "killbit" mechanism.
Description: Symbian S60 is one of the leading Smartphone software platforms that runs on Symbian OS, owned by Nokia. It has got multiple memory corruption vulnerabilities which can be triggered by processing an MMS with an embedded malformed media file. The specific flaws are in the following libraries "rarender.dll", "STH264HWDecHwDevice.dll", "clntcore.dll", "HxMmfCtrl.dll", "mdfh264payloadformat.dll", "MMFDevSound.dll", "ArmRV89Codec.dll". Successful exploitation might allow an attacker to execute arbitrary code on the vulnerable Smartphone. Full technical details are publicly available.
Status: Vendor not confirmed, no updates available.
Description: Photo DVD Maker is a tool used to create photo slide show with music CD or DVD menu and can be watched on TV or online. It has a buffer overflow vulnerability which can be triggered by a specially crafted Photo DVD Maker Professional project (.pdm) files. The specific error is a boundary error while processing a malicious ".pdm" file that has very long "File_Name" string. The unsuspecting user will have to be tricked into opening these malicious files. Successful exploitation might allow an attacker to execute arbitrary code with the context of the logged on user. Some technical details for this vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Description: Dillo is an open source, multi-platform web browser, known for its speed and size. It has an integer overflow vulnerability which can be triggered by a specially crafted PNG image. The specific flaw is an integer overflow error in "Png_datainfo_callback()" function, as it does inadequate checks on the height and width of an image. The unsuspecting user will have to be tricked into visiting a website embedded with these malicious PNG images. Successful exploitation might allow an attacker to execute arbitrary code with the context of the logged on user. Full technical details are publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: wxWidgets is an open source, cross-platform toolkit for creating graphical user interfaces (GUIs). It has an integer overflow vulnerability which can be triggered by a specially crafted JPEG file. The specific flaw is an integer overflow error in "wxImage::Create()"function in src/common/image.cpp while processing a malicious JPEG image file. The unsuspecting user will have to be tricked into opening these malicious files. Successful exploitation might allow an attacker to execute arbitrary code with the context of the logged on user. Full technical details are publicly available via source code analysis.
Status: Vendor not confirmed, no updates available.
Description: Hitachi, a Japanese company, has been identified with two vulnerabilities in its various products. Specifically these vulnerabilities are in the Cosminexus Processing Kit for XML and the Hitachi Developer's Kit for Java. There is an unspecified error while processing zip files which might give an attacker unauthorized access. The second issue is an unspecified error while processing UTF-8 data which might also allow an attacker unauthorized access. Successful exploitation might allow an attacker to execute arbitrary code. No technical details are provided for these vulnerabilities.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7228 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.