The Adobe FLASH and PDF problem is real and won't be solved for another week. Makes sense to figure out a way to get universal updates to your user base, quickly, after the announcement. Sad that Microsoft's Windows updates don't cover 3rd party software. They considered doing it and dropped the idea - probably worried about support and liability concerns.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE
- - SANS Network Security, San Diego Sept. 14-22; the Fall's biggest security training conference-- 20 full length courses and 16 short courses plus a big exhibition http://www.sans.org/ns2009 - - SANS Boston, Aug 2-9 (6 full-length hands-on courses) https://www.sans.org/boston09/index.php - - The Virtualization and Cloud Security Summit on August 17-18 in Washington; courses in the following days http://www.sans.org/info/43118 Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at:
http://www.sans.org/ondemand/spring09.php Plus Tokyo, London, Ottawa, Canberra, and Kuala Lumpur, all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
************************* Sponsored Links: ****************************
1) WEBCAST: How Browser Exploits Lead to Web 2.0 Hacking with keynote from IDC http://www.sans.org/info/46259
2) SANS Vendor Demo Spotlight: Websense Hosted Email & Web Security - Secure your Web 2.0 world. Easily control who/what/how/where users can access internet and email data. http://www.sans.org/info/46264
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Adobe Acrobat and Adobe Reader is the most popular software for creating and viewing Portable Document Format (PDF) files. Adobe Flash Player is a multimedia application used for viewing animations on web browsers. There is a vulnerability in Adobe Flash Player and Adobe Acrobat/Reader which could be triggered by opening a specially crafted a specially crafted Flash (SWF) file or a PDF file containing a malicious Flash (SWF) animation. The specific flaw lies in the "flash9f.dll" and "authplay.dll" modules. Successful exploitation might lead to a denial-of-service condition or compromise of the affected system. Note that, depending upon configuration, PDF documents may be opened by the vulnerable applications upon receipt without first prompting the user. Reports indicate that this vulnerability is being actively exploited in the wild.
Status: Vendor confirmed, no updates available yet. The vendor will provide an update for Flash Player v9 and v10 by 30th July 2009 and for Adobe Reader and Acrobat v9.1.2 by 31st July 2009.
Description: Mozilla Firefox web browser and Mozilla Thunderbird email client which are based on the Mozilla suite of applications contain multiple vulnerabilities. These vulnerabilities could be triggered by a malicious web page or email message and might lead to arbitrary code execution with the privileges of the current user. There are memory corruption errors in the JavaScript and browser engines, in handling of multiple RDF files in XUL tree, in handling certain data in Base64 function, in construction of documents, in handling of Flash plug-in, in handling SVG element. There are some vulnerabilities caused due to boundary errors in some font glyph rendering libraries. There is an error in the way "setTimeout()" is invoked with certain object parameters. One of issue might also lead to cross site scripting attacks. The technical details required to craft exploit code are included in the Mozilla bug repository.
Status: Vendor confirmed, updates available.
Description: Google Chrome, a web browser from Google, is the fourth most popular browser with 1.8% usage share among all the web browsers. It has got a memory corruption vulnerability which can be triggered while parsing a specially crafted web page. The specific flaw is caused due to inadequate checks while processing regular expressions in JavaScript in a web page. The users will have to be tricked into visiting the website that hosts such a web page, typically by persuading them to click on the links in e-mail messages or in P2P messages. Successful exploitation might lead to memory corruption and possibly heap based buffer overflow followed by arbitrary code execution. Full technical details are publicly available.
Status: Vendor confirmed, updates available.
Description: Novell Privileged User Manager is used to deliver SuperUSer Privilege Management for all UNIX/Linux Environments. A vulnerability has been reported in it, whereby an attacker can load arbitrary libraries or modules over the network and possibly compromise the vulnerable system. The specific flaw is caused due to improper implementation of "spf" RPC call within the "unifid.exe" service, a service that binds on port 29010. Successful exploitation might eventually allow an attacker to execute arbitrary code under the context of the service. Authentication is not required to exploit this vulnerability.
Status: Vendor confirmed, updates available.
Description: Common Data Format (CDF) is a conceptual data abstraction developed by NASA and is used for storing and manipulating multi dimensional data sets. Multiple memory corruption vulnerabilities have been identified which can be triggered by parsing a specially crafted CDF file. One of the flaw is an array indexing error in the "ReadAEDRList64()" function caused due to inadequate checks on the part of CDF reading program while parsing a CDF file. There are other yet unspecified memory corruption errors in functions such as "SearchForRecord_r_64()", "LastRecord64()", "CDFsel64()" and etc. Successful exploitation might allow an attacker to execute arbitrary code execution. Technical details for one of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: The Akamai Download Manager is a popular download management application from Akamai. It has got a buffer overflow vulnerability which could be triggered by a specially crafted HTTP response. The specific flaw is caused due to a boundary error in manager.exe while handling Redswoosh, a peer-to-peer content delivery technology, downloads. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. The users will have to be tricked into visiting the website that hosts such a web page, typically by persuading them to click on the links in e-mail messages or in P2P messages. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected controls via Microsoft's "killbit" mechanism for CLSIDs "4871A87A-BFDD-4106-8153-FFDE2BAC2967", "2AF5BD25-90C5-4EEC-88C5-B44DC2905D8B", "FFBB3F3B-0A5A-4106-BE53-DFE1E2340CB1 "
Description: Armed Assault is a tactical military shooter war game developed by Bohemia Interactive. Multiple vulnerabilities have been identified in Armed Assault which might lead to a denial-of-service condition or even arbitrary code execution. The first issue is caused due to an error in the handling of the last field of the join packet. The second issue is a format string error while processing the nickname or the datafile field of a specially crafted join packet. The third issue is an error caused due to inadequate checks on the voice data packets sent to port 2305. Technical details for these vulnerabilities are publicly available along with proof-of-concepts.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7288 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.