It isn't Microsoft this time - Apple Macs have a LOT of critical vulnerabilities being patched this week. And Sun's JAVA JRE and JDK have multiple critical vulnerabilities, as well.|||||| Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********** Sponsored By RSA, The Security Division of EMC ***********
"How RSA envision® Delivers an Industry's Best ROI" http://www.sans.org/info/46968 This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.
************************************************************************* TRAINING UPDATE - - SANS Network Security, San Diego Sept. 14-22; the Fall's biggest security training conference-- 20 full length courses and 16 short courses plus a big exhibition http://www.sans.org/ns2009 - - SANS Virginia Beach August 28 - Sept. 4. 11 full-length courses plus short courses: http://www.sans.org/vabeach09/ - - The Virtualization and Cloud Security Summit on August 17-18 in Washington; courses in the following days http://www.sans.org/info/43118 Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Atlanta, Canberra, Cairo, Stockholm, Dubai, Dublin & Rome all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
************************* Sponsored Links: **********************
1) ***NEW*** SANS Free Vendor Audio Casts! Visit the SANS Reading Room and click on the Free Vendor Audio Casts link. http://www.sans.org/info/46973
2) Be sure to register for the upcoming Analyst Webcast: Top Ten Virtualization Security Mistakes and How to Avoid Them Sponsored by: McAfee, Inc. & Catbird http://www.sans.org/info/46978
3) In case you missed it! Check out the Ask The Expert Webcast: Managing Change and Event Monitoring for Sustainable NERC CIP Compliance http://www.sans.org/info/46983
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Apple Mac OS X contains multiple vulnerabilities in a variety of its subsystems. Specially crafted input or data handled by one of these components could trigger vulnerability, leading to a variety of exploitable conditions. There is an out of bounds error in bzip2. An error in CFNetwork layer may allow an attacker control the displayed website URL in a certificate warning. There is a heap overflow error while processing images with an embedded ColorSync profile. There is a stack overflow error while processing Canon RAW images. A heap overflow error, multiple integer overflow errors and an uninitialized memory access error have been identified within ImageIO while handling OpenEXR images. There is a stack overflow error in ImageIO in its handling of EXIF metadata. There is an uninitialized pointer issue while processing certain PNG images. There are some implementation issues in the kernel which might give local users elevated privileges. A denial-of service condition exists in inetd-based launchd service. There is a format string issue because of the way Login Window handles certain application names. There is a buffer overflow issue in the kernel in the way it handles AppleTalk response packets. A buffer overflow exists in the XQuery in its handling of character classes in regular expressions. There are some other vulnerabilities which might be less critical. Many of these vulnerabilities mentioned earlier might be leveraged to execute arbitrary code with the privileges of the current user or vulnerable process.
Status: Vendor confirmed, updates available.
Description: The Sun Java Runtime Environment (JRE) and Java Development Kit (JDK) contain multiple vulnerabilities. A specially crafted Java Web Start application or applet could trigger one of these vulnerabilities, with consequences ranging from arbitrary code execution with the privileges of the current user to denial-of-service condition, bypass security restrictions and information disclosure. There is a remote code execution vulnerability (MS09-035) in the Active Template Library (ATL) in Microsoft Visual Studio that is used by the Java Web Start ActiveX control. There are integer overflow errors in JRE within the unpack200 JAR utility and while parsing of JPEG images. Note that, depending upon configuration, Java applets embedded in web pages may be opened automatically upon the loading of the page. Sun's Java Runtime Environment is installed by default on all Apple Mac OS X systems, all Sun Solaris systems, many other UNIX and Linux based operating systems, and is often installed on Microsoft Windows. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Network Security Service (NSS) is a set of libraries designed to support cross-platform development of client and server applications that support security like that support SSL, S/MIME, etc and is licensed under the Mozilla Public License. Multiple vulnerabilities have been identified in NSS which could be triggered by a specially crafted certificate. The first issue is caused due to an error while handling invalid NULL characters in the host name field of a certificate which might lead to man-in-the-middle attacks. The second issue is a heap based buffer overflow vulnerability in the regular expression parser in the NSS library that is used to check if the hostname of the site visited by a user matched with the Common Name (CN) field of the certificate. Successful exploitation might lead to arbitrary code execution.
Status: Vendor confirmed, updates available.
Description: Apple iPhone, a very popular multimedia GSM smartphone by Apple Inc, contains a vulnerability. A specially crafted Short Message Service (SMS) message could trigger a memory corruption vulnerability in the affected system. The specific flaw is caused due to an error in the decoding of SMS messages. Successful exploitation might lead to service interruption or even arbitrary code execution. Some technical details of the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: SAP Business One is integrated enterprise resource planning (ERP) solution from SAP AG aimed at targeting software requirements of small and medium size enterprises. A buffer overflow vulnerability has been identified in SAP Business One and a specially crafted request to TCP port 30000 can trigger it. The specific flaw is a boundary error in the license manager service "NT_Naming_Service.exe" while processing the requests going to TCP port 30000. Successful exploitation might allow an attacker to crash the system or execute arbitrary code with elevated privileges. Full technical details along with Proof-of-Concept of this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Secure Internet Live Conferencing (SILC) is a protocol designed to provide secure conferencing services over the internet. Multiple format string vulnerabilities have been identified in SILC Client and a specially crafted nickname can be used to trigger one of these vulnerabilities. The specific flaws are format string errors in "lib/silcclient/client_entries.c" while processing nicknames. Successful exploitation might allow an attacker to crash the affected client or execute arbitrary code.
Status: Vendor confirmed, updates available.
Description: Mozilla Firefox web-browser based on the Mozilla suite of applications contains multiple vulnerabilities. The first issue is a Location bar and SSL indicator spoofing which could allow an attacker to display misleading information about the location and SSL information of the invalid web-page. The second issue is unspecified memory corruption errors in the browser engines that Firefox and other Mozilla-based products use. The third issue is a privilege escalation error caused due window's global object receiving an incorrect security wrapper and it affects pages that have 'Link:' Header are installed with an add-on which implemented a Content Policy in JavaScript, such as AdBlock Plus or NoScript. Details for these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7326 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.