Internet Explorer and Exchange Server, both from Microsoft, have critical vulnerabilities reported this week, as does RealPlayer. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Sponsored By The LOG MANAGEMENT Summit **************
Attend the Log Management Summit April 6-7 to find best practices in selecting and implementing the right tools in ways that ensure you meet regulatory requirements and improve your security at the same time. As a bonus you'll hear from organizations that have found they can use log management to improve operational efficiency as well as security. http://www.sans.org/ info/38648"> http://www.sans.org/ info/38648
*************************************************************************
TRAINING UPDATE - - SANS 2009 in Orlando in early March - the largest security training conference and expo in the world. lots of evening sessions: http://www.sans.org/ - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Internet Explorer has multiple vulnerabilities due to improper handling of certain HTML and web scripting constructs. A specially crafted web page could trigger these issues thereby allowing remote attackers to execute arbitrary code with the privileges of the logged in user. User interaction is needed to exploit this vulnerability with the user visiting the malicious page. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Microsoft Exchange Server is a messaging system from Microsoft that is used by enterprises to allow their users to access e-mail, calendars, contacts and tasks. This product is vulnerable to remote code execution and remote denial-of-service attacks. A specially crafted e-mail when viewed by a user could execute arbitrary code with the privileges of the vulnerable process, or a malformed command could allow remote attackers to cause a denial of service. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: RealPlayer is a proprietary media player from RealNetworks desgined to play different multimedia formats. RealPlayer has got multiple vulnerabilities in the way it parses certain Internet Video Recorder (IVR) files. A specially crafted IVR files could trigger either a heap corruption vulnerability or a buffer overflow condition which can overwrite arbitrary memory location with a NULL byte. Successful exploitation of these vulnerabilities may allow an attacker to execute arbitrary code with the privileges of the logged in user. User Interaction is required though the user doesn't have to open the files but a simple preview of the files is enough to trigger these issues.
Status: Vendor has not confirmed, no updates available.
Description: Microsoft Visio, a diagramming software from Microsoft, has multiple vulnerabilities while handling malicious Visio files. A specially crafted Visio file could trigger one of these vulnerabilities, allowing an attacker to execute arbitrary code with the privileges of the current user. User interaction is required, in that an attacker has to convince the unsuspecting user to open the malicious file that is either sent via an e-mail attachment or hosted on a Web site. Some technical details are publicly available for these vulnerabilities.
Status: Vendors confirmed, updates available.
Description: HP Netwok Node Manager (NNM) is used to undertand and realise a network topography. It contains multiple vulnerabilities namely buffer overflow, remote command injection and information disclosure due to lack of proper sanitary checks of user-supplied inputs. A specially crafted request can be used to trigger any one of the mentioned vulnerabilities. Successful exploitation of these vulnerabilities can allow an attacker either to execute code with the privileges of the vulnerable service or to gain access to sensitive information. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.