@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************* Sponsored By Faronics Corporation *******************
Are You Missing a Layer of Security?
LEARN MORE: https://www.sans.org/info/50644
Neither definition-based anti-virus nor any other single solution is enough to block modern threats. Zero-day attacks, "mutating" viruses, or targeted attacks are all high-risk situations requiring an additional layer of protection. Application whitelisting solutions like Faronics Anti-Executable provide this if its not on the whitelist, its not going to run!
*************************************************************************
TRAINING UPDATE
-- SANS London, UK, November 28-December 6, 16 courses, bonus evening sessions: Hex Factor, Forensics Mini Summit and more https://sans.org/london09/
-- SANS CDI, Washington DC, December 11-18, https://www.sans.org/cyber-defense-initiative-2009
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations https://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 https://www.sans.org/sans-2010/
Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses)
- See samples at https://www.sans.org/ondemand/spring09.php
For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
**************************** Sponsored Links: ***************************
1) Be sure to REGISTER NOW for the upcoming webcast: A Day In The Life Of A Configuration Compliance Exception
https://www.sans.org/info/50654
2) Learn network- and host-centric methods to detect intruders at the Incident Detection Summit December 9-10.
https://www.sans.org/info/50659
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Microsoft Windows Kernel-Mode Drivers (Win32k.sys), the core of the Windows subsystem that contains the window manager, has been reported with multiple vulnerabilities. The first issue is a Null Pointer dereferencing vulnerability caused by inadequate validation of an argument passed to a Windows kernel system call. The second issue is an elevation of privilege vulnerability cause by inadequate validation of data passed from user mode through the kernel component of graphics device interface (GDI). Both these vulnerabilities can be leveraged by an attacker to gain privilege escalation and/or execute arbitrary code. The third issue is a memory corruption error in Windows kernel-mode drivers caused by improper parsing of Embedded OpenType (EOT) font code when building a table of directory entries. Successful exploitation in this case might allow an attacker to execute arbitrary code.
Status: Vendor confirmed, updates available.
Description: Apple Mac OS X contains multiple vulnerabilities in several of its components. Improper handling of user and network requests, and several file, document, and media formats, can cause memory corruption and/or buffer overflows, integer overflows leading to arbitrary remote code execution with the privileges of the vulnerable process. Other logical flaws can lead to arbitrary information disclosure, denial of service, file overwrites, null pointer dereference, escalation of privileges, cross-site scripting attacks, log injection, use-after-free issues, race condition, man-in-the-middle attacks. Several of these vulnerabilities stem from flaws in included third-party applications and components. Some technical details for some of these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Web Services on Device (WSD) is used by Windows client to scan and access remote devices across a network and Web Services on Device Application Programming Interface (WSDAPI) is used for implementing the Devices profile. A memory corruption vulnerability has been reported in WSDAPI which can be triggered by a specially crafted WSD message. The specific flaw is caused by incorrect validation of some headers of a received WSD message by the WSDAPI on both client and servers. This API is available by default, however for an attack to be successful an application must use the API over TCP port 5357 or 5358. Successful exploitation might allow an attacker to execute arbitrary code.
Status: Vendors confirmed, updates available.
Description: Microsoft Windows License Logging Service is a tool to help users manage licenses of Microsoft Server products licensed in the Server Client Access license model. A heap-based overflow vulnerability has been reported in Microsoft License Logging Server software. The specific flaw is License Logging Service in the way it handles RPC calls. A character array, while processing arguments to "LlsrLicenseRequestW" method, is expected to a terminating null byte. But if the data supplied doesn't contain the null byte a heap overflow condition can be reached. Successful exploitation might allow an attacker to execute arbitrary code. Authentication is not required to carry out this attack. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Excel contains multiple vulnerabilities in its parsing of Excel documents. The issues include memory corruption errors, heap overflow errors, pointer overwrite errors and array indexing. A specially crafted Excel file that has a malformed record object could trigger one of these vulnerabilities when an unsuspecting user opens it with Microsoft Excel. With successful exploitation an attacker could execute arbitrary code with the privileges of the current user. To exploit these flaws, an attacker can take any of the following actions: (a) Create a webpage that downloads a malicious Microsoft Excel file from a server, and entice an attacker to visit his webpage. (b) Send an email with a specially crafted Microsoft Excel file as an attachment and convince the user to open it. Note that, on recent versions of Microsoft Office, documents are not opened upon receipt without first prompting the user. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Microsoft Word contains a stack based buffer overflow vulnerability which could be triggered by a specially-crafted Word document file. The specific flaw is an error in the way Microsoft Word parses the a specially-crafted malformed File Information Block (FIB) structure inside a Word document. Successful exploitation leads to memory corruption in such a way that an attacker can execute arbitrary code with the privileges of the current user. To exploit these flaws, an attacker might take one of the following actions: (a) Create a webpage that downloads a malicious Word document from a server, and entice an attacker to visit his webpage. (b) Send an email with a specially crafted Word document as an attachment and convince the user to open it. Note that, on recent versions of Microsoft Office, Word documents are not opened upon receipt without first prompting the user. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Active Directory in Windows is used to provide authorization services to windows-based computers. A denial-of-service vulnerability has been reported in Active Directory, Active Directory Application Mode (ADAM) and Active Directory Lightweight Directory Service (AD LDS). This flaw is the result of improper parsing of certain malformed LDAP or LDAPS requests. Successful exploitation might lead to stack space exhaustion and a denial-of-service condition. Technical details for this vulnerability are not available publicly.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7596 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.