A quiet week. Hope you are enjoying summer.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** SPONSORED LINKS: ******************************
1) ***NEW*** SANS Free Vendor Audio Casts! Visit the SANS Reading Room and click on the Free Vendor Audio Casts link. http://www.sans.org/info/47449
2) Be sure to register for the upcoming Tool Talk Webcast: AV Migration - - Should You Stay or Should You Go? Sponsored By Big Fix. http://www.sans.org/info/47454
3) In case you missed it! Check out the Ask The Expert Webcast: Managing Change and Event Monitoring for Sustainable NERC CIP Compliance http://www.sans.org/info/47459
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Libpurple is a library used for implementing the Instant Messaging protocol and has support for different types of messaging protocols. Because of the multi-protocol support, a user can use one application to log into different services. Libpurple's implementation of this capability is used by numerous clients, including Pidgin and Adium. A memory corruption vulnerability has been reported in Libpurple; the specific flaw is in the "msn_slplink_process_msg()" function while processing MSN SLP packets. A specially crafted MSN SLP packet with invalid data sent to a client through MSN server can be used to exploit this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code with privileges of the logged on user. Some technical details about the vulnerability are publicly available.
Status: Vendor confirmed, no updates available.
Description: Acer desktops, laptops and other computer products are distributed with a flaw in an AcerCtrls.APlunch ActiveX control. A malicious web page that instantiates this control could trigger the vulnerability and allow an attacker to execute arbitrary commands with the privileges of the current user. The AcerCtrls.APlunch ActiveX control, included in "acerctrl.ocx," contains an insecure "Run()" method which fails to perform adequate checks, thus allowing an attacker to execute commands. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's "kill bit" mechanism using CLSID "3895DD35-7573-11D2-8FED-00606730D3AA". Note that this may impact normal application functionality.
Description: IBM WebSphere Application Server (WAS) is a software application server that has the capacity to create various different enterprise web applications. The Feature Pack for Service Component Architecture (SCA) has been identified with a vulnerability that might allow an attacker to bypass security restrictions. With the help of this error an attacker that is not assigned to the "scaAllAuthorizedUsers" role can bypass authentication and gain access to the system.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7394 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.