@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored By Q1 Labs **************************
GET THE WHITE PAPER NOW: http://www.sans.org/info/49348
Respected industry analyst firm Enterprise Strategy Group (ESG) provides a unique perspective on the evolution of security information and event management (SIEM) solutions from niche firewall log analyzers to highly strategic security management solutions. How can organizations like yours identify and leverage the newest, most sophisticated tools in the next phase of the Evolution?
*************************************************************************
TRAINING UPDATE - SCADA Security Summit, Stockholm, Oct. 27-30, https://www.sans.org /euscada09_summit/"> https://www.sans.org /euscada09_summit/ - SANS Chicago North Shore, Oct. 26-Nov. 2, https://www.sans.org /chicago09/"> https://www.sans.org /chicago09/ - SANS San Francisco, November 9-14, https://www.sans.org /sanfrancisco09"> https://www.sans.org /sanfrancisco09 - SANS CDI, Washington DC, Dec. 11-18, https://www.sans.org /cyber-defense-initiative-2009"> https://www.sans.org /cyber-defense-initiative-2009 - Looking for training in your own community? https://sans.org/community/
- Save on On-Demand training (30 full courses) - See samples at: https://www.sans.org /ondemand/"> https://www.sans.org /ondemand/ - For a list of all upcoming events, on-line and live: https://www.sans.org
*************************************************************************
**************************** Sponsored Links: **************************
1) Register Today and receive 10% off for SANS vLive course SEC542, Web App Penetration Testing and Ethical Hacking, November 2nd - November 9th.
Please use the code @Risk542 when registering.
https://www.sans.org/info/49353
2) Free SANS Audiocast!!! Security Buzz from MX Logic, Episode 37 featuring Scott Chasin, CTO of MX Logic & Erik Boles, Senior Systems Engineer, sponsored by MX Logic.
http://www.sans.org/info/49358
3) REGISTER NOW for the upcoming webcast: Ask the Expert Webcast: Top 10 Ways to Get the Most Out of Your Log Data.
http://www.sans.org/info/49363
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Google Apps, a service from Google for using several Google products including Gmail, Google Calendar, Google Talk, Docs with custom domain names, is vulnerable to remote command injection vulnerability. A specially crafted web page can used to trigger this vulnerability. The specific flaw is an error in "googleapps.exe" in the way it handles arguments e.g. "--renderer-path" argument received via the "googleapps.url.mailto:" URI. Successful exploitation might allow an attacker to execute malicious binaries or applications from a remote location. Technical details for this vulnerability are publicly available along with a Proof-of-Concept.
Status: Vendor not confirmed, no updates available.
Description: The "SuperBuddy" ActiveX control, shipped with American Online (AOL) software package, has been identified with a vulnerability which could be triggered by a malicious web page that instantiates this control. The specific flaw is a memory corruption error in the "SetSuperBuddy()" ActiveX method in the "Sb.SuperBuddy.1" (sb.dll) ActiveX control. By passing malformed arguments to "SetSuperBuddy()" ActiveX method, an attacker might exploit this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for this vulnerability are publicly available along with a Proof-of-Concept.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the control via Microsoft's "kill bit" mechanism for CLSID 189504B8-50D1-4AA8-B4D6-95C8F58A6414.
Description: IBM Informix Client Software Development Kit (CSDK) is used for packaging application programming interfaces (APIs) that are used for developing applications for Informix servers. IBM Informix Connect is a runtime connectivity product that has the libraries of IBM Informix CSDK. A buffer overflow vulnerability has been discovered in IBM Informix CSDK and IBM Informix Connect, which can be triggered by a specially crafted ".nfx" file. The specific flaw is a boundary error in SetNet32 utility in the way it processes an ".nfx" file that has a malformed field e.g. an over long "Hotlist" entry. Successful exploitation might allow an attacker to execute arbitrary code. Technical details for the vulnerability are publicly available via a public exploit.
Status: Vendor not confirmed, no updates available.
Description: Omni-NFS Enterprise from Xlink Technologies is a popular NFS (Network File System) solution for integrating files from Windows or UNIX platform. Multiple buffer overflow vulnerabilities have been reported in Omni-NFS Enterprise, which can be triggered by a specially crafted FTP request or response. The first issue is a boundary error in "ntpd.exe" in the way it handles FTP requests to TCP port 21. The second issue is a boundary error in "wftp.exe" in the way it processes FTP responses from a malicious FTP server. In both the cases successful exploitation might allow an attacker to execute arbitrary code in the context of the user running the vulnerable application. Technical details for this vulnerability are publicly available via the public proof-of-concepts.
Status: Vendor not confirmed, no updates available.
Description: IBM AIX (Advanced Interactive eXecutive) an operating system from IBM is a UNIX operating system based on System V running on the PowerPC (PPC) architecture. A buffer overflow vulnerability has been identified in IBM AIX which can be triggered by sending a specially crafted request to Calendar Manager Service Daemon "rpc.cmsd". The specific flaw is a buffer overflow error in calendar daemon library "libcsa.a" since it doesn't handle requests with overly long argument for remote procedure 21 to "rpc.cmsd". Successful exploitation might allow an attacker to execute arbitrary code with superuser privileges. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7499 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.