There's a critical zero-day vulnerability in older versions of Internet Explorer. Vulnerable versions (6 and 7) account for more than 40% of the market. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE
-- SANS London, UK, November 28-December 6 16 courses, bonus evening sessions: Hex Factor, Forensics Mini Summit and more.
-- SANS CDI, Washington DC, December 11-18 24 courses, bonus evening presentations, including Future Trends in Network Security.
https://www.sans.org/cyber-defense-initiative-2009
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations: Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more.
https://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010. https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 https://www.sans.org/sans-2010/'
Looking for training in your own community?
Save on On-Demand training (30 full courses) - See samples at:
https://www.sans.org/ondemand/
Plus Ottawa, Tokyo and Bangalore all in the next 90 days.
For a list of all upcoming events, on-line and live:
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Microsoft Internet Explorer contains a vulnerability in its handling of HTML objects. A specially crafted web page could trigger one of these vulnerabilities using specially crafted HTML or scripts. The specific flaw is because of an error in the layout parsing done by Internet Explorer. An unsuspecting user will have to be enticed to visit the malicious web page to carry out this attack. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged in user. Full technical details for the vulnerability are publicly available along with Proof-of-Concepts.
Status: Vendor confirmed, no updates available.
Description: A buffer overflow vulnerability has been reported in an ActiveX control that Symantec ships in Symantec Altiris Notification Server, Symantec Altiris Deployment Solution, and Symantec Management Platform. The vulnerable ActiveX control is Altiris eXpress NS Console Utilities ActiveX control (AeXNSConsoleUtilities.dll), which is downloaded during the initial connection to the web console on the management server. The specific flaw is a boundary error in the second argument of the "RunCmd()" method and the vulnerability can be exploited by sending an overly long string to that argument. Specially crafted web pages, when viewed with Internet Explorer, might instantiate this ActiveX control and exploit this vulnerability to allow an attacker to execute arbitrary code in the context of the application using the ActiveX control. Technical details about this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: The Opera Web Browser, a popular multiplatform web browser, contains a remotely-exploitable memory corruption vulnerability. S specially crafted web page can be used to trigger this vulnerability. The specific flaw is an error in Opera in the way it converts string to number using JavaScript. By passing overly long strings an attacker might cause a heap based buffer overflow. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: HP Operations Manager, a product of Hewlett-Packard (HP), is primarily used for consolidated infrastructure monitoring to reduce IT costs. A vulnerability has been reported in HP Operations Manager that can exploited to gain unauthorized access. The specific flaw is due to presence of an undocumented account within the Tomcat users XML file. An attacker can use this account to gain access into the "org.apache.catalina.manager.HTMLManagerServlet" class, which is defined within the "catalina-manager.jar" file. An attacker might be able to execute arbitrary code by uploading some malicious content via a POST request to /manager/html/upload and then accessing and executing it on the server. Some technical details for the vulnerability are publicly available.
Status: Vendors confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7653 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.