@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses. Bonus evening presentations include Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more
https://www.sans.org/security-east-2010/
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 Bonus evening presentations include Social Zombies and Cross-Site AJAX Security
https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 Bonus evening presentations include Advanced Forensic Techniques: Catching Hackers on the Wire
https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
https://www.sans.org/sans-2010/
-- SANS Northern Virginia Bootcamp 2010, April 6-13 https://www.sans.org/reston-2010/
Looking for training in your own community? https://sans.org/community/
Save on On-Demand training (30 full courses)
- See samples at https://www.sans.org/ondemand/
Plus Tokyo, Bangalore, Dublin and Oslo all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: BigAnt is an enterprise instant messaging system and BigAnt Instant Messenger (IM) Server is its server component. A buffer overflow vulnerability has been reported in BigAnt IM server and it can be triggered by a specially crafted "USV" request to TCP port 6660. The specific flaw is a buffer overflow error in "AntServer.exe" module as it does not perform adequate bounds checking on an incoming overly long "USV" request. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for the vulnerability are publicly available along with a proof-of-concept.
Status: Vendor confirmed, no updates available.
Description: Sun Java System Directory Server is an enterprise Lightweight Directory Access Protocol (LDAP) server from Sun Microsystems and is shipped as a component of Directory Server Enterprise Edition (DSEE). Multiple vulnerabilities have been identified in Sun Java System Directory Server which might lead to sensitive information disclosure or denial-of-service. The first issue is an error in Directory Proxy Server that might allow an attacker to run an operation with the privileges of some other clients. The second issue is an error in Directory Proxy Server which can be triggered by specially crafted packets and might lead to an unresponsive server to new client connections. The third issue is an error in Directory Proxy Server which can be triggered by a specially crafted "psearch" client resulting in preventing the affected server from sending results to other "psearch" clients. Very few technical details are available for these vulnerabilities.
Status: Vendors confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7799 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.