@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************** Sponsored By SANS ***************************
Participation is needed! Be a part of this years 2010 SANS Log Management Report by completing the survey and have a chance to win a $250 AMEX Card.
Click here to complete the survey an be automatically registered. https://www.sans.org/info/52269
*************************************************************************
*************************************************************************
TRAINING UPDATE
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations: Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more https://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style https://www.sans.org/sans-2010/
-- SANS Northern Virginia Bootcamp 2010, April 6-13 https://www.sans.org/reston-2010/
-- SANS Security West 2010, San Diego, May 7-15, 2010 https://www.sans.org/security-west-2010/
Looking for training in your own community? https://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at: https://www.sans.org/ondemand/
Plus Tokyo, Bangalore, Oslo and Dublin all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe reader and Acrobat have been reported with a vulnerability, which could be triggered by opening a specially crafted PDF file. The specific flaw is a use-after-free error in the " newplayer()" method of the "Doc.media" object. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. This vulnerability is currently exploited in the wild. Note that the PDF documents are often opened automatically by the vulnerable application without the consent of the user. Technical details for this vulnerability are publicly available along with a public proof-of-concept.
Status: Vendor confirmed, no updates available.
Description: Several products from the Mozilla Foundation such as its popular web browser Firefox, internet suite SeaMonkey, and email client Thunderbird, have been reported with multiple vulnerabilities. There are multiple errors in the JavaScript and browser engine which can cause memory corruption. There are multiple memory corruption errors in "liboggplay" caused by improper processing of malicious audio and video data. There is an integer overflow error in the "Theora library" which can be triggered by a specially crafted video file. Location bar spoofing vulnerabilities have been reported which can allow an attacker to place invalid URL in the location bar that looks legitimate to a user and further facilitate a spoofing attack. A privilege escalation vulnerability that can be caused via an error in the chrome window.opener has been reported. There is an NTLM reflection vulnerability which might allow an attacker to forward credentials from one application to another random application via a browser. An error while generating "GeckoActiveXObject()" exception messages has been reported and this might allow an attacker access to a list of COM objects installed on the affected system. Details for these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, updates available.
Description: HP OpenView Network Node Manager (OV NNM) is a suite of applications that manages enterprise networks and large-scale systems. Multiple vulnerabilities have been identified in the HP OpenView Network Node Manager. The following executables "snmp.exe", "nnmRptConfig.exe", "ovlogin.exe", "ovsessionmgr.exe", "webappmon.exe", "OvWebHelp.exe", "ovalarm.exe", "snmpviewer.exe", "ovwebsnmpsrv.exe" are prone to buffer overflow vulnerabilities. They can be exploited by sending an overly long string to "Oid" parameter, "Template" parameter, "userid" and "passwd" parameters (ovlogin.exe and ovsessionmgr.exe), "Host" HTTP header, "Topic" parameter, "Accept-Language" HTTP header, "Host" HTTP header, and " arg" parameter respectively. Certain Perl CGI executables in NNM HTTP server does not do proper sanitization of the data passed to "hostname" HTTP header. Plus there is some unspecified error that might cause a buffer overflow and it can be exploited via a specially crafted HTTP request. Successful exploitation of these vulnerabilities might allow an attacker to execute arbitrary code in the context of the vulnerable application. Some technical details for some of these vulnerabilities are publicly available.
Status: Vendors confirmed, updates available.
Description: Multiple Symantec Products have been identified with a vulnerability. The issue is caused by an error in the "VRTSweb.exe" Web Server component which is shipped with multiple Symantec products. The error in this component, which listens by default on port 14300, is that it does not validate the incoming authentication requests made to this port properly. A specially crafted request might allow an attacker to bypass security restrictions. Successful exploitation might allow an attacker to execute arbitrary code with administrative privileges. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Sun Ray Server Software is a solution that delivers virtual Windows, Linux, Solaris operating system to Sun ray thin clients. Multiple vulnerabilities have been identified in the Sun Ray server. The first issue is a denial of service condition to Sun ray services caused by an unspecified error in the Authentication Manager. The second issue is a flaw in the way encryption keys are generated for Sun Ray firmware. This might allow an attacker to predict the private key and then decrypt the traffic (like mouse, keyboard and display) between Sun Ray DTU and the Sun Ray Server.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7764 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.