@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By Novell **************************
Register today for an upcoming Novell sponsored SANS web cast on 10/6 titled, Ask The Expert: Offense and Defense: Better Correlation.
http://www.sans.org /info/49174"> http://www.sans.org /info/49174
************************************************************************* TRAINING UPDATE
- - - SCADA Security Summit, Stockholm, Oct. 27-30, http://www.sans.org /euscada09_summit/"> http://www.sans.org /euscada09_summit/ - - - SANS Chicago North Shore, Oct. 26-Nov. 2, http://www.sans.org /chicago09/"> http://www.sans.org /chicago09/ - - - SANS San Francisco, November 9-14, http://www.sans.org /sanfrancisco09"> http://www.sans.org /sanfrancisco09 - - - SANS CDI, Washington DC, Dec. 11-18, http://www.sans.org /cyber-defense-initiative-2009"> http://www.sans.org /cyber-defense-initiative-2009 Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org /ondemand"> http://www.sans.org /ondemand - - - For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
************************** Sponsored Links: ***************************
1) Register Today and receive 10% off for SANS vLive course SEC542, Web App Penetration Testing and Ethical Hacking, November 2nd - November 9th. Please use the code @Risk542 when registering.
http://www.sans.org/info/49179
2) IN CASE YOU MISSED IT -check out the Tool Talk Webcast: Identity-Aware Networking Done Right
Sponsored by: Avenda Systems
http://www.sans.org/info/49184
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Chrome is a popular web browser from Google and is the fourth most widely used web browser. A vulnerability has been reported in Google chrome which can be triggered by visiting a malicious website. The specific flaw is a memory corruption error in the v8 engine in the way it parses strings to floating point numbers. The v8 engine uses the common "dtoa ()" implementation. Successful exploitation might allow an attacker to execute arbitrary code in the Chrome sandbox and failed attempts might lead to a denial-of-service condition. Full technical details are publicly available for this vulnerability via source code analysis.
Status: Vendor confirmed, updates available.
Description: Netware, a network operating system from Novell Inc, has been reported with a stack-based buffer overflow vulnerability in its Network File System (NFS) Portmapper daemon. A specially crafted remote procedure calls (RPC) can be used to trigger this vulnerability. The specific flaw is inadequate checks done by the vulnerable daemon while processing CALLIT RPC calls, which can result in a boundary error. Successful exploitation might allow an attacker to execute arbitrary code under the context of the vulnerable daemon. Authentication is not required for the attacker to exploit this vulnerability. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: KeyWorks, a software for online documentations, has a product called KeyHelp which is a free ActiveX control primarily used to enhance the capabilities of Microsoft HTML Help systems. A buffer vulnerability has been identified in KeyHelp ActiveX control which could be triggered by a malicious web page that instantiates this control. The specific flaw is a boundary error in the "JumpMaddedID()" or "JumpURL()" method in "KeyHelp.ocx". This is caused by the inadequate checks on the data that is passed to these methods. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for this vulnerability are publicly available along with a Proof-of-Concept.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the control via Microsoft's "kill bit" mechanism for CLSID B7ECFD41-BE62-11D2-B9A8-00104B138C8C.
Description: IBM Installation Manager is an application primarily used for easier and simpler, download and installation the trial codes of many of the IBM products. A vulnerability has been identified in IMB Installation Manager that might allow an attacker to load a malicious library from a remote network. A specially crafted web page can be used to trigger this vulnerability by enticing an unsuspecting user to visit the web page. The specific flaw is an error in the way "IBMIM.exe" handles certain arguments e.g. "-vm" argument, passed through "iim://" URI. Successful exploitation might allow an attacker to execute arbitrary code in the context of the vulnerable application. Full technical details for this vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Description: FireFTP is a free cross-platform FTP client for Mozilla Firefox. A vulnerability has been reported in FireFTP extension for Firefox that might allow an attacker, who can create files on a SFTP server, to manipulate SFTP commands sent from an unsuspecting FireFTP user to the SFTP server. The specific flaw is in the "psftp.exe" since it does not properly escape filenames that contain double-quote characters. A specially crafted filename can be used to trigger this vulnerability and modify the SFTP commands in ways whereby an attacker can manipulate certain data. Full technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Week 40, 2009 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7480 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.