@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************* Sponsored By Faronics Corporation *******************
Join Computer Incident Response professionals at the Incident Detection Summit December 9-10. Hear about the latest tools, tactics and techniques to detect incidents. Learn how to advise clients and upper management on successful incident detection programs.
https://www.sans.org/info/50343
************************************************************************* TRAINING UPDATE
-- SANS London, UK, November 28-December 6, 16 courses, bonus evening sessions: Hex Factor, Forensics Mini Summit and more: https://sans.org/london09/
-- SANS CDI, Washington DC, December 11-18, 24 courses, bonus evening presentations, including Future Trends in Network Security https://www.sans.org/cyber-defense-initiative-2009
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations: Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more https://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 https://www.sans.org/sans-2010/
Looking for training in your own community? https://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at https://www.sans.org/ondemand/
Plus New Delhi, Geneva and Tokyo all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
**************************** Sponsored Link: ****************************
1) REGISTER TODAY for the upcoming webcast: Content-Aware SIEM Thursday, December 03 at 1:00 PM EST (1800 UTC/GMT)
https://www.sans.org/info/51009
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Safari is Apple's web browser for Mac OS X and Microsoft Windows. It contains multiple vulnerabilities in its handling of a variety of web page, scripting constructs and malicious images. The first issue is an integer overflow error caused by improper handling of images with an embedded color profile. The second issue is an application termination caused while parsing specially crafted XML content. The third issue is an information disclosure issue caused by an error in Safari's handling of navigations, which a specially crafted HTML file might use to load a local file. The fourth issue is in the way Cross-Origin Resource Sharing is implemented in WebKit which can result in cross-site request forgery. The fifth issue is in the way WebKit handles FTP directory listings and this might lead to arbitrary code execution, information disclosure or application termination.
Status: Vendor confirmed, updates available.
Description: RhinoSoft Serv-U File Server is a FTP, SFTP and HTTP server for Windows platforms. A stack-based buffer overflow vulnerability has been reported in RhinoSoft Serv-U FTP server and it can triggered via a specially crafted request. The specific flaw is a boundary error while processing hexadecimal representation of a string using a TEA decoding algorithm. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details of the vulnerability are publicly available.
Status: Vendors confirmed, updates available.
Description: A denial of service vulnerability has been reported in Microsoft Windows 7 and Microsoft Windows Server 2008 R2. A specially crafted Server Message Block (SMB) response from a malicious SMB server can be used to trigger this vulnerability. The issue is caused due to improper handling of an SMB packet, which can then be used to trigger an infinite loop on SMB client. The unsuspecting user will have to be tricked into connecting to a malicious SMB share. Full technical details for the vulnerability are publicly available along with proof-of-concept.
Status: Vendor confirmed, no updates available.
Description: GNU Image Manipulation Program (GIMP) is a multi-platform raster graphics editor. Two integer overflow vulnerabilities have been reported in GIMP and it can be triggered by a specially crafted BMP or PSD file. The first issue is an integer overflow error in "ReadImage()" function in "plug-ins/file-bmp/bmp-read.c". The second issue is an integer overflow error in "read_channel_data()" function in "plug-ins/file-psd/psd-load.c". A user will have to tricked into opening the malicious PSD or BMP file. Successful exploitation might allow an attacker to execute arbitrary code within the context of the affected application. Full technical details about these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7616 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.