@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored By Breaking Point **********************
5 Keys to Harden Security Devices Against Evasions
Evasions techniques separate the professional hacker from the vandal and are used to bypass security measures on every type of device. Are you 100% confident your IPS, firewall and other security devices will stand up to increasingly sophisticated evasions? Join BreakingPoint security researchers for this free webcast.
https://www.sans.org/info/52089
*************************************************************************
************************************************************************* TRAINING UPDATE - -- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations: Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more https://www.sans.org/security-east-2010/
- -- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 https://www.sans.org/appsec-2010/
- -- SANS Phoenix, February 14 -February 20, 2010 https://www.sans.org/phoenix-2010/
- -- SANS 2010, Orlando, March 6 - March 15, 2010 https://www.sans.org/sans-2010/
Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses)
- See samples at : https://www.sans.org/ondemand/
Plus Ottawa, Tokyo and Bangalore all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Microsoft Internet Explorer contains multiple vulnerabilities that could lead to remote code execution. The first issue is a vulnerability in ActiveX controls that are built with vulnerable Microsoft Active Template Library (ATL) headers. There are three uninitialized memory corruption vulnerabilities caused by Internet Explorer attempting to use an uninitialized or deleted object. The last issue is an HTML Object memory corruption vulnerability again caused by Internet Explorer accessing object that has not been initialized or that has been deleted. A specially crafted web page can be used to trigger these vulnerabilities. In all these cases successful exploitation might allow as attacker to execute arbitrary code with the privileges of the logged on user. Some technical details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Office Project, a project management software package, has a vulnerability that can be trigger by specially crafted Project files. The vulnerability is caused due to improper validation of memory allocation resources while opening malicious Project files. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. To exploit this flaw, an attacker can take any of the following actions: (a) Create a webpage that downloads a malicious Microsoft Project file from a server, and entice an attacker to visit this webpage. (b) Send an email with a specially crafted Microsoft Project file as an attachment and convince the user to open it. Full technical details for this vulnerability are not publicly available.
Status: Vendor confirmed, updates available.
Description: Indeo video, a codec from Intel, is used to decompress media files that are used in Windows Media Player. Multiple vulnerabilities have been reported in Indeo which can be triggered by a video stream with malicious data. There are a couple of boundary errors in Indeo41 codec which will result in buffer overflows. And some unspecified errors have been reported that might result in memory corruption. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the logged on user. Some technical details of some of the vulnerabilities are publicly available.
Status: Vendor confirmed, no updates available.
Description: Internet Authentication Service (IAS), a Microsoft implementation of Remote Authentication Dial-in User Service (RADIUS) server, has been reported with two vulnerabilities. The first issue is caused by an error in handling Protected Extensible Authentication Protocol (PEAP) authentication requests. This might lead to memory corruption and thus allow an attacker to execute arbitrary code remotely. The second issue is an escalation of privilege vulnerability and can be triggered by a specially crafted Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) authentication request. Some technical details for the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Novell iPrint is a network printing system for multiple networks and operating systems. Two vulnerabilities have been reported in Novell iPrint Client and they can be triggered by a specially crafted web page. The first issue is a stack-buffer overflow vulnerability caused by an error in "ienipp.ocx" while parsing "target-frame" parameter. The second issue is a buffer overflow vulnerability caused by an error while parsing certain time related information. Successful exploitation in each of the cases might lead to arbitrary code execution. Some technical details for the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Text Converter in WordPad is on systems that are not installed with Microsoft Office, to open Microsoft Word document file formats. A memory corruption vulnerability has been reported in the text converter for Word 97 in the way it parses Word 97 document. A specially crafted Word 97 document can be used to trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the logged on user. To exploit this flaw, an attacker can take any of the following actions: (a) Create a webpage that downloads a malicious Word 97 file from a server, and entice an attacker to visit this webpage. (b) Send an email with a specially crafted Word 97 file as an attachment and convince the user to open it. Some technical details for the vulnerability are publicly available.
Status: Vendor not confirmed, updates available.
Description: Adobe Flash Player, an application from Adobe, is used to view animations and movies using a web browser. Multiple vulnerabilities have been reported in Adobe Flash Player. The first issue is buffer overflow error while parsing JPEG dimensions in an SWF file. The second issue is an unspecified error in "getProperty()" which might lead to memory corruption. The third issue is an unspecified error which allows data injection and eventually code execution. The fourth issue is an integer overflow error in the ActionScript exception handlers. There are some more unspecified errors which can be used by attackers to corrupt memory and execute arbitrary code. A specially crafted web page or a malicious SWF file can be used by attackers to exploit these vulnerabilities. Technical details for these vulnerabilities are not publicly available.
Status: Vendor confirmed, updates available.
Description: HP Application Recovery Manager (AppRM) is a software to backup and restore business application data in the event of an outage. A buffer overflow vulnerability has been reporter in AppRM and it can be triggered by a specially crafted MSG_PROTOCOL packets. The flaw is in the OmniInet process as it does not properly handle MSG_PROTOCOL (0x010b) packets. Successful exploitation might allow an attacker to execute arbitrary code. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Active Directory Federation Services (AD FS) is Web single-sign-on (SSO) technology that is used to authenticate a user to multiple Web application over a single session. Two vulnerabilities have been identified in AD FS and one of them can be triggered by a specially crafted HTTP request to an server with ADFS enabled. The first issue is a spoofing vulnerability caused by insufficient session management validation in ADFS. Successful exploitation might allow an attacker to impersonate another user. The second issue is an error in ADFS caused by improper validation of HTTP requests coming from authenticated clients. Successful exploitation might allow an attacker execute arbitrary code in the context of the affected application. Some technical details for the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Local Security Authority Subsystem Service (LSASS) is used for managing local security and domain authentication for the client and the server. A denial of service vulnerability has been reported in Microsoft Windows LSASS and it can be triggered by a specially crafted ISAKMP message. The specific flaw is in LSASS as it does not handle malformed ISAKMP messages that are communicated through IPsec correctly. Successful exploitation might allow an attacker to consume CPU resources. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7743 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.