@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses. EBonus evening presentations include Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more http://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 Bonus evening presentations include Social Zombies and Cross-Site AJAX Security http://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 Bonus evening presentations include Advanced Forensic Techniques: Catching Hackers on the Wire http://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style http://www.sans.org/sans-2010/
-- SANS Northern Virginia Bootcamp 2010, April 6-13 http://www.sans.org/reston-2010/ Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Tokyo, Bangalore, Dublin and Oslo all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
**************************** Sponsored Link: ****************************
1) Participation is needed! Be a part of this year's 2010 SANS Log Management Report by completing the survey and have a chance to win a $250 AMEX Card. Click here to complete the survey and be automatically registered. http://www.sans.org/info/52623
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Multiple vulnerabilities have been reported in NullSoft Winamp which is a popular media player for Microsoft Windows. The first issue is multiple buffer overflow vulnerabilities in Module Decoder Plug-in "IN_MOD.DLL" while parsing instrument definitions in a specially crafted Impulse Tracker file. The second issue is a buffer overflow error in Module Decoder Plug-in "IN_MOD.DLL" while parsing samples and can be exploited by a specially crafted Impulse Tracker file. The third issue is a boundary error in Module Decoder Plug-in "IN_MOD.DLL" while parsing Ultratracker file. The fourth vulnerability is caused by an integer overflow error in Module Decoder Plug-in "IN_MOD.DLL" while parsing Oktalyzer files. The fifth issue is caused by multiple integer overflow errors while parsing a specially crafted media file that contains malformed PNG or JPEG data. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for some of these vulnerabilities are publicly available.
Status: Vendors confirmed, updates available.
Description: Cisco WebEx is used to manage WebEx meeting service which is a multimedia conferencing solution. The WebEx Recording Format ".wrf" is used to store the WebEx meeting recordings that are recorded offline and Cisco WebEx WRF player is used to play these ".wrf" files. Multiple buffer overflow vulnerabilities have been identified in Cisco WebEx WRF player. The flaw is in the way the WRF player processes ".wrf" files and so a specially crafted ".wrf" file can be used to exploit these vulnerabilities. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Note that WRF player can be installed manually and automatically too. No technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: HP OpenView Storage Data Protector is a solution that automates backup and recovery from disk or tape and thereby facilitates continuity. Two buffer overflow vulnerabilities have been identified in HP OpenView Storage Data Protector. The first issue is a boundary error in the backup client service daemon "OmniInets.exe" while handling "MSG_PROTOCOL" commands, which listens on TCP port 5555. The second issue is a boundary error in the Cell Manager Database Service "rds.exe" and it binds to TCP port 1530. An attacker, on successful exploitation, might be able to execute arbitrary code. Some technical details for some these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Ghostscript is an open source interpreter engine for the PostScript (PS) and Portable Document Format (PDF). A buffer overflow vulnerability has been reported in Ghostscript and it can be triggered by a specially crafted PDF or PS file printed through CUPS. The specific flaw is caused by a boundary error in the "errprintf()" (base/gsmisc.c) function while processing malformed PDF or PS files. Successful exploitation might lead to a denial-of-condition or allow an attacker to execute arbitrary code in the context of the logged on user. Depending upon configuration, Ghostscript may be used to open PostScript documents upon receipt, without further user interaction. Full technical details for this vulnerability are publicly available via source code analysis.
Status: Vendor confirmed, no updates available.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.