More critical vulnerabilities than anytime in years, all in Microsoft products. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************** Sponsored By SANS ***************************
Join Computer Incident Response professionals at the Incident Detection Summit December 9-10. Hear about the latest tools, tactics and techniques to detect incidents. Learn how to advise clients and upper management on successful incident detection programs.
https://www.sans.org /info/49869"> https://www.sans.org /info/49869
************************************************************************* TRAINING UPDATE
- -- SANS Chicago North Shore, Oct. 26-Nov. 2, https://www.sans.org /chicago09/"> https://www.sans.org /chicago09/
- -- SCADA Security Summit, Stockholm, Oct. 27-30, https://www.sans.org /euscada09_summit/"> https://www.sans.org /euscada09_summit/
- -- SANS Middle East, October 31-November 11, https://www.sans.org /middleeast09/"> https://www.sans.org /middleeast09/
- -- SANS San Francisco, November 9-14, https://www.sans.org /sanfrancisco09"> https://www.sans.org /sanfrancisco09
- -- SANS Sydney, Nov.9-14 https://sans.org/sydney09/
- -- SANS London, UK, Nov.28-Dec. 9, https://sans.org/london09/
- -- SANS CDI, Washington DC, Dec. 11-18, https://www.sans.org /cyber-defense-initiative-2009"> https://www.sans.org /cyber-defense-initiative-2009
- -- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations https://www.sans.org /security-east-2010/"> https://www.sans.org /security-east-2010/
Looking for training in your own community?
Save on On-Demand training (30 full courses) - See samples at https://www.sans.org /ondemand"> https://www.sans.org /ondemand
Plus Hong Kong, Oslo and Vancouver, all in the next 90 days. For a list of all upcoming events, on-line and live: https://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Internet Explorer contains multiple vulnerabilities that could lead to remote code execution. The first issue is an error in the way Internet Explorer processes a specially crafted data stream header. The second issue is caused by improper validation of arguments under specific circumstances. The third and fourth issues are errors in the way Internet Explorer accesses objects that have not been initialized or have been deleted thereby leading to memory corruption. All the vulnerabilities can be leveraged by an attacker to execute arbitrary code remotely via a specially crafted web site. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: The GDI is the Graphics Device Interface, the portion of the Microsoft Windows operating system that handles graphical operations on behalf of applications. Multiple vulnerabilities have been identified in GDI+ in the way it handles certain files. There are integer overflow vulnerabilities in the way it handles WMF, PNG and BMP image files. There are buffer overflow vulnerabilities in the way it handles PNG and TIFF files. There is an error in the way it processes malformed graphic control extensions in TIFF files which can be used by attackers to corrupt memory. An integer overflow vulnerability has been reported in certain GDI+ API's that are accessible from .NET Framework applications. A memory corruption vulnerability has been reported caused by improper parsing of Office Art Property Tables by Microsoft Office. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the current user. Depending upon configuration, WMF and EMF files may be opened upon receipt without first prompting the user. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Active Template Library (ATL) is a set of C++ classes developed by Microsoft to make programming of Component Object Model (COM) objects easier. Multiple vulnerabilities have been reported in the Microsoft Visual Studio ATL which might lead to arbitrary remote code execution or information disclosure. The first issue is an error in ATL headers which might allow an attacker to call VariantClear() on a variant that has not been correctly initialized. The second issue is a remote code execution vulnerability caused by errors in the ATL headers in the way they handle instantiation of objects from data streams. This could allow an attacker to bypass certain security policies such as kill bits within Internet Explorer and thereby facilitate code execution. The third issue is an information disclosure vulnerability caused as a result of some ATL headers reading string data with no ending NULL bytes. A specially crafted web page can be used to trigger these vulnerabilities. Some technical details on these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Active Template Library (ATL) is a set of C++ classes developed by Microsoft to make programming of Component Object Model (COM) objects easier. A code execution vulnerability exists in the Microsoft ActiveX controls which were compiled using the vulnerable Microsoft Active Template Library. The specific flaws are errors in the way ATL headers handles instantiation of an object from data streams. A specially crafted web page that instantiates the vulnerable ActiveX control can be used to trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the current user. MS09-055 Microsoft bulletin provides a Cumulative Security update of ActiveX Kill Bits.
Status: Vendor confirmed, updates available.
Description: Server Message Block (SMB), a file sharing protocol from Microsoft with SMBv2 as an update, has been reported with multiple vulnerabilities. The first issue is a denial of service vulnerability caused by insufficient sanity checks of fields while parsing SMv2 packets by Server Message Block (SMB) Protocol software. The second flaw is an error in the SMB implementation in the way it improperly handles SMB Multi-Protocol Negotiate Request packets. The third issue is an error in SMB in the way it improperly handles specially crafted SMB packets. Authentication is not required to exploit these vulnerabilities. Full technical details of these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: The Microsoft .NET framework contains multiple vulnerabilities caused by improper verification of verifiable code. There is an error in Microsoft .NET framework which could be exploited by a .NET application to obtain a pointer to stack memory that is no longer used. The second error in .NET framework could allow a malicious .NET application to bypass equality check. The third issue is an error in .NET framework which could be leveraged by a malicious .NET application or Silverlight application to change memory eventually leading to code execution. Successful exploitation in each of the three cases might allow an attacker to execute arbitrary code. A specially crafted XAML browser application (XBAP), or a specially crafted ASP.NET application or a malicious Microsoft .NET application can be used to trigger one of these errors. Some technical details on these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Indexing Service is used to extract content, both text and property information, from files and to construct an indexed catalog to facilitate efficient and rapid searching. A remote code execution vulnerability has been reported in Microsoft Indexing Service. The specific issue is with an ActiveX control included with the Indexing Service, since it does not handle specially crafted Web content properly. Successful exploitation of this vulnerability might allow an attacker to execute arbitrary code in the context of the logged on user. Some technical details of the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Media Runtime is used to provide information and tools to applications that use Windows media content. Multiple vulnerabilities have been reported in Microsoft Windows Media Runtime. The first issue is a memory corruption error in Windows Media Runtime caused by incorrect processing of Advanced Systems Format (ASF) files. A specially crafted ASF file can be used to trigger this vulnerability. The second issue is a heap corruption vulnerability in Windows Media Runtime caused by improper handling of certain functions in compressed audio files. A malicious media file can be used to trigger this vulnerability. Successful exploitation in both cases might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details about these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Media Runtime is used to provide information and tools to applications that use Windows media content. Multiple vulnerabilities have been reported in Microsoft Windows Media Runtime. The first issue is a memory corruption error in Windows Media Runtime caused by incorrect processing of Advanced Systems Format (ASF) files. A specially crafted ASF file can be used to trigger this vulnerability. The second issue is a heap corruption vulnerability in Windows Media Runtime caused by improper handling of certain functions in compressed audio files. A malicious media file can be used to trigger this vulnerability. Successful exploitation in both cases might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details about these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Local Security Authority Subsystem Service (LSASS) is a security mechanism that handles local security, login policies and domain authentication. A denial of service vulnerability has been reported in LSASS. The specific flaw is an error in the Windows NTML implementation in LSASS, in the way it handles specific packets during authentication process. A specially crafted authentication packet can be used to trigger this vulnerability. Successful exploitation may cause the server-side LSASS process to stop responding and restart the computer. Some technical details about the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Windows CryptoAPI enables developers to add authentication features like digital certificates, encryption and decryption mechanisms and encoding to and decoding from Abstract Syntax Notation One (ASN.1). Two vulnerabilities have been reported in Windows CryptoAPI. The first issue is a spoofing vulnerability caused due to Windows CryptoAPI incorrectly parsing a null terminator as the end of any values identified by an Object Identifier (OID). A specially crafted certificate e.g. with a NULL byte in the Common Name field can be used to trigger this vulnerability. The second flaw is an integer overflow error in Windows CryptoAPI in the way it parses ASN.1 object identifiers from X.509 certificates. A specially crafted certificate can be used to trigger this vulnerability. Successful exploitation might allow attackers to conduct spoofing attacks. Some technical details of these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Week 43, 2009 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7553 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.