Though there are only two big ones this week, they are vulnerabilities that cause huge epidemics of infection - through remote exploits in Microsoft Excel and Adobe Reader and Acrobat. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored By Prolexic ****************************
Prolexic Technologies Stops DDoS Attacks Distributed Denial of Service (DDoS) attacks are a growing threat to Internet-based businesses, and Prolexic Technologies offers in the cloud services to mitigate the effects DDoS attacks of all types and sizes - passing along clean Internet traffic, seamlessly. Learn how Prolexic's global DDoS solutions can ensure the reliability of your online business - - http://www.sans.org/ info/39223"> http://www.sans.org/ info/39223
*************************************************************************
TRAINING UPDATE - - SANS 2009 in Orlando in early March - the largest security training conference and expo in the world. lots of evening sessions: http://www.sans.org/ - - Looking for training in your own Community? http://sans.org/community/ For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
************************ SPONSORED LINKS ****************************** 1) Come see the best tools for your pen test toolbox at the Penetration Testing and Ethical Hacking Summit June 1-2 - Las Vegas. See what works. http://www.sans.org/info/39228
2) Join professionals to learn about Log Management tools at the Log Management Summit April 6-7. http://www.sans.org/info/39233 *************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Excel, a spreadsheet-application from Microsoft, has a remote code execution vulnerability because of improper handling of certain Excel files. A specially crafted Excel file could trigger this vulnerability, allowing an attacker either to execute arbitrary code with the privileges of the current user, or cause a denial-of-service condition. User interaction is needed to exploit this vulnerability since, in most configurations; users will be prompted before opening the potentially malicious Excel files. This vulnerability is currently being exploited in the wild and is reportedly not mitigated by the most recent set of Microsoft patches.
Status: Vendor confirmed, no updates available.
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe Acrobat and Reader have buffer overflow vulnerability in the handling of JBIG2 streams which could be triggered by a specially crafted PDF file. Successful exploitation can lead to arbitrary code execution with the privileges of the current user. Note that the PDF documents are often opened automatically by the vulnerable application without the consent of the user. This vulnerability is reportedly exploited actively in the wild. The vendor plans to release the updates by March 11th, 2009 for Adobe Acrobat 9 and reader 9, and for the earlier versions by March 18th, 2009. Note that though disabling JavaScript does help in providing protection against some of the current attacks, it does not protect against the real vulnerability. Some technical details are publicly available for this vulnerability.
Status: Vendor confirmed, no updates available as yet.
Description: Adobe Flash Player is an application used to play Flash media files. It has multiple vulnerabilities which upon exploitation can lead to denial-of-service condition, information disclosure, clickjacking attacks, and remote code execution with the privileges of the user running the application. Specially crafted Shockwave Flash (SWF) files could trigger some of these vulnerabilities and user interaction is required, in that these files must be loaded in the Flash Player. Some technical details are publicly available for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Orbit Downloader is a download manager for the Microsoft Windows operating system. It has a buffer overflow vulnerability caused due to insufficient checks on user-supplied data. This vulnerability can exploited by enticing the user to download files from a malicious HTTP server or clicking on a specially crafted HTTP URL. Successful exploitation can lead to arbitrary code execution with the privileges of the logged on user or denial-of-service condition. Some technical details are publicly available for this vulnerability.
Status: Vendors confirmed, updates available.
Description: KSquirrel is an image viewer for the K Desktop Environment (KDE), a desktop environment for Unix-like systems. ksquirrel-libs, a set of codecs for the KSquirrel, has multiple vulnerabilities caused due to boundary errors while handling certain specially crafted Radiance RGBE (*.hdr) files. Successful exploitation may allow the attackers to execute arbitrary code with the privileges of the application using the library. User interaction is required, in that the user has to open the malicious file. Some technical details are publicly available for these vulnerabilities.
Status: Vendor notified, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2009. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.