@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************************** Sponsored By SANS ***************************
Join Computer Incident Response professionals at the Incident Detection Summit December 9-10. Hear about the latest tools, tactics and techniques to detect incidents. Learn how to advise clients and upper management on successful incident detection programs.
https://www.sans.org/info/50343
*************************************************************************
TRAINING UPDATE
- -- SANS San Francisco, November 9-14
https://www.sans.org/sanfrancisco09
- -- SANS Sydney, November 9-14
- -- SANS Hong Kong, November 9-14
https://www.sans.org/hong-kong-forensics-2009/
- -- SANS Vancouver, November 14-19
https://www.sans.org/vancouver09/
- -- SANS London, UK, November 28-December 9
- -- SANS CDI, Washington DC, December 11-18
https://www.sans.org/cyber-defense-initiative-2009
- -- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations.
https://www.sans.org/security-east-2010/
Looking for training in your own community?
Save on On-Demand training (30 full courses) - See samples at:
https://www.sans.org/ondemand/spring09.php
For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
**************************** Sponsored Links: ***************************
1) REGISTER NOW for the upcoming webcast Straight Talk with NSS Labs on Evaluating a Network IPS.
https://www.sans.org/info/50348
2) IN CASE YOU MISSED IT...Special Webcast: Professional Incident Detection
https://www.sans.org/info/50353
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Adobe Shockwave Player, with over 450 million users, is a multimedia player that allows Adobe Director applications to be published and viewed by a browser that is installed with a Shockwave plug-in. Multiple vulnerabilities have been reported in Adobe Shockwave Player, which be triggered by a specially crafted Shockwave content. There is a error in the way the invalid index is used. There are also a couple of issues caused by the inappropriate use of the invalid pointer. And the last issue is a memory corruption error when processing string lengths. In all the cases successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. There is not enough public information about these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: BlackBerry Desktop Software is the desktop software used to manage a BlackBerry handheld device. A vulnerability has been discovered in Blackberry Desktop Software which can be triggered specially crafted website, when visited by an unsuspecting user. The specific issue is an unspecified error in the Lotus Notes Intellisync component made available by "lnsresobject.dll". Part of Blackberry Desktop Software functionality is provided Lotus Notes Intellisync ActiveX control. Successful exploitation might allow an attacker to execute arbitrary code in the context of the vulnerable application. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism.
Description: Sun's implementation of the Java Runtime Environment (JRE) and Java Web Start contains multiple vulnerabilities. A specially crafted Java application, an audio or image file or an applet could trigger one of these vulnerabilities, with consequences ranging from arbitrary code execution with the privileges of the current user to denials-of-service and security restriction bypass. Note that, depending upon configuration, Java applets embedded in web pages may be opened automatically upon the loading of the page. One of the error is that the update mechanism does not update JRE to the new version when running on non-English Windows versions. There are errors in decoding DER encoded data and the parsing of HTTP headers which might lead to memory exhaustion. There is an authentication bypass vulnerability in JRE while verifying HMAC digests. Multiple buffer overflow and integer overflow vulnerabilities have been reported in JRE while processing specially crafted audio and image files. There is a command execution vulnerability in JRE which could be triggered by a specially crafted web page. There is a flaw in the implementation of security model permissions in the Java Web Start Installer. Some technical details for some of these vulnerabilities are publicly available.
Status: Vendor not confirmed, no updates available.
Description: Symantec Altiris is a service-oriented management software used by organizations for managing their information technology assets. A vulnerability has been reported in Symantec Altiris which be triggered by viewing a specially crafted malicious website. There is a buffer overflow error in the ConsoleUtilities ActiveX control "AeXNSConsoleUtilities.dll", which is installed on visiting the Management website initially. The specific flaw is a stack based buffer overflow in the "BrowseAndSaveFile()" method and can be exploited by passing an overly long argument to that method. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism.
Description: IBM Tivoli Storage Manager is IBM's centralized, policy-based, enterprise storage management solution. The client component of this application contains multiple vulnerabilities. The first issue is a stack-based buffer overflow error caused by inadequate checks by client acceptor daemon (CAD) scheduler on user supplied inputs. The second issue is a boundary error in traditional client scheduler. Both these issues if successfully exploited, might allow an attacker to inject malicious code or crash the TSM client. The third issue is an unauthorized access error in the UNIX and Linux backup-archive clients. This might allow an attacker to read, copy, delete unauthorized files on the client machines. Some technical details about these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: EMC Documentum eRoom, OpenText Hummingbird and OpenText Search Server have been reported with a vulnerability. The specific flaw is in the "STRlib.dll" module used in the Hummingbird STR service "STRsvc.exe". This service listens by default on TCP port 10500 and the "STRlib.dll" module receives data from the network into a static buffer. A specially crafted over long packet sent to TCP port 10500 might trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the SYSTEM user. Authentication is not required to exploit this vulnerability. Some technical details about the vulnerability are publicly available.
Status: Vendors confirmed, some updates available.
Description: RhinoSoft Serv-U File Server is a FTP, SFTP and HTTP server for Windows platforms. A vulnerability has been discovered in Serv-U File server which could be triggered by a specially crafted HTTP request. The specific flaw is a buffer overflow vulnerability in the included HTTP server in the way it processes cookies in HTTP requests. By sending an overly long Session Cookies to the Serv-U web client this vulnerability will be triggered. Successful exploitation might allow an attacker to execute arbitrary code in the context of the vulnerable application. Full technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7571 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.