You already know about the Microsoft problems - the out of cycle patch - - but don't miss that Cisco wireless problem. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE - - SANS Network Security, San Diego Sept. 14-22; the Fall's biggest security training conference-- 20 full length courses and 16 short courses plus a big exhibition http://www.sans.org/ns2009 - - SANS Boston, Aug 2-9 (6 full-length hands-on courses) https://www.sans.org/boston09/index.php - - The Virtualization and Cloud Security Summit on August 17-18 in Washington; courses in the following days http://www.sans.org/info/43118 Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Tokyo, London, Ottawa, Canberra, and Kuala Lumpur, all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Internet Explorer contains multiple vulnerabilities in its handling of HTML objects and cached contents while processing a specially crafted web page. The first issue is a memory corruption vulnerability caused due the way Internet Explorer accesses an object that has been deleted. The second issue is caused due to an error in the way Internet Explorer handles table operations in specific situations and might corrupt memory eventually leading to arbitrary code execution. The third issue is an uninitialized memory corruption vulnerability caused due to an error when Internet Explorer handles deleted objects. Successful exploitation in each of these cases might lead to arbitrary code execution. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Active Template Library (ATL) is a set of C++ classes developed by Microsoft to make programming of Component Object Model (COM) objects easier. Multiple vulnerabilities have been reported in the Microsoft Visual Studio ATL which might cause arbitrary code execution or information disclosure. The first issue is an uninitialized vulnerability caused due to an error in ATL headers and this allows VariantClear to be called on a VARIANT that has not been initialized correctly. Thus a specially crafted malicious stream could allow an attacker to control what happens when VariantClear is called during error handling. The second issue is a remote code execution vulnerability caused to errors in the way ATL headers handle instantiation of objects from data streams. This could allow an attacker to bypass certain security policies by using legitimate ActiveX control to load an un-trusted ActiveX control that has been previously blocked to run on Internet Explorer. The third issue is an information disclosure vulnerability caused due to some ATL headers reading string data with no ending NULL bytes. Some technical details on these vulnerabilities are publicly available. Note that components and controls from other vendors that were compiled and built using Microsoft Visual Studio ATL might also be affected by these vulnerabilities. For example the Adobe Flash Player, Adobe Shockwave Player and Cisco Unity Player.
Status: Vendor confirmed, updates available.
Description: Cisco Wireless LAN Controllers (WLC) is one of the major building blocks of an enterprise-scale wireless network that supports critical business applications and is responsible for system-wide wireless LAN functions. Multiple vulnerabilities have been identified in the WLC family of devices. The first issue is caused by an error in handling a specially crafted response to an authentication request. This issue might allow an attacker with access to the administrative web-interface to reload the device. The second issue is caused due to an error in handling SSH management connections which might lead to a memory leak and eventually to a denial-of-service condition. Note that a three way handshake is not required to carry out this attack. The third issue is a denial-of-service vulnerability caused due to an error in handling specially crafted HTTP requests to a vulnerable WLC and can be exploited only via administrative web interface. The fourth issue is an error while processing certain HTTP and HTTPS requests from an unauthenticated attacker to the WLC that is bound to an administrative interface or VLAN. This exploit if successful might give an attacker unauthorized access to modify configuration of an affected device. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: VLC Media Player and Movie player are popular cross-platform media players. Integer underflow vulnerability has been identified in them which could be triggered by a specially crafted Real Data Transport (RDT) header chunks. The specific flaw lies in the function "real_get_rdt_chunk_header" in "modules/access/rtsp/real.c" for VLC media player and in the function "real_get_rdt_chunk" in "stream/realrtsp/real.c" for Mplayer. Successful exploitation might allow an attacker to execute arbitrary code in the context of the vulnerable application via a specially crafted stream. Full technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7310 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.