Nothing huge this week.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********** Sponsored By Faronics Corporation ***********
How Much is Outdated Security Costing You?
LEARN MORE: https://www.sans.org/info/51639
No single solution is enough to block modern malware threats. Zero-day attacks, "mutating" viruses, or targeted attacks are all high-risk situations that can lead to the high costs and potential headaches of repairing a compromised IT system. A layered security approach includes application whitelisting solutions like Faronics Anti-Executable to provide full protection.
*************************************************************************
TRAINING UPDATE
Two cool new items: (1) SANS India - India's leading industries recently awakening to the fact that cybersecurity is a survival skill and asked SANS to bring its courses over. If you live in India or have ties to the country, we'd love your help in making sure the right courses are offered and for the right folks. Email Suresh at SMustapha@sans.org. The current test plan is posted at: https://www.sans.org/info/51273
(2) Effective presentation class being tested in Washington https://www.sans.org/security-training/technical-communication-and-presentation-
skills-security-professionals-1422-mid
-- SANS CDI, Washington DC, December 11-18, 24 courses, bonus evening presentations, including Future Trends in Network Security
https://www.sans.org/cyber-defense-initiative-2009
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations: Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more https://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 https://www.sans.org/sans-2010/
Looking for training in your own community? https://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at: https://www.sans.org/ondemand
Plus Ottawa, Tokyo and Bangalore all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: The Research In Motion BlackBerry is a popular mobile telephone and messaging device. The BlackBerry handheld devices are integrated with an enterprise's messaging infrastructure through BlackBerry Enterprise Server. This server software and the professional software version of BlackBerry have unspecified vulnerabilities in the BlackBerry Attachment Service, a service used to view different file formats. The errors are within the PDF distiller component of the Attachment Service. A specially crafted PDF file opened on BlackBerry Smartphone could trigger this vulnerability and cause memory corruption. Successful exploitation can lead to arbitrary code execution. Note that a user must first open the PDF on a BlackBerry mobile device for exploitation to occur. No technical details publicly available.
Status: Vendor confirmed, updates available.
Description: Novell's eDirectory, a multi-platform directory service, allows businesses to manage identities and secure access to network resources within a network. It has been reported that Novell eDirectory is exposed to heap-based buffer overflow and it can be triggered by a specially crafted service request. The security flaw is caused by inadequate checks done by the application while processing incoming NDS Verb 0x1 service requests. A very large integer in the request can result in an integer wrap eventually leading to overflow condition. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details of the vulnerability are publicly available.
Status: Vendors confirmed, updates available.
Description: Roxio Creator, a division of Sonic Solutions, is used to capture, save and share photos, audio and video files. An integer overflow vulnerability has been reported in Roxio Creator and this vulnerability can be triggered by a specially crafted image. The issue is due to an error in the product while allocating memory for an image based on its dimension. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: MuPDF is a lightweight PDF parsing application and is used by SumatraPDF, an open-source PDF viewer for Windows. It has been reported that MuPDF is exposed to multiple buffer overflow vulnerabilities which can be triggered by a specially crafted PDF file. The flaw is due to buffer overflow errors in pdf_loadtype4shade()", "pdf_loadtype5shade()", "pdf_loadtype6shade()", and "pdf_loadtype7shade()" functions in"pdf_shade4.c". Since SumatraPDF uses the vulnerable MuPDF library it also is vulnerable. Successful exploitation might lead to arbitrary code execution under the context of the logged in user. User interaction is required in that the victim must either visit a malicious site or open a malicious file. Full technical details for vulnerabilities are publicly available via source code analysis.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7702 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.