@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** Sponsored By Splunk *********************
Forrester Webcast: SIM Overview and Market Drivers Based on user surveys and first-hand inquiries, Forrester Security and Compliance Analyst John Kindervag provides an overview of what issues are driving SIM adoption and some of the key capabilities end users should look for when evaluating a SIM solution. Mark Seward, Director of Marketing at Splunk, then highlights the ways Splunk customers are approaching Security and Compliance to be more flexible and proactive than traditional SIM and Log Management approaches often allow.
Watch it now: http://www.sans.org/info/55794
******************************************************************
TRAINING UPDATE
- -- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
http://www.sans.org/sans-2010/
- -- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
http://www.sans.org/reston-2010/
- -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
- -- SANSFIRE Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
- -- SANS Boston 2010, June 6-14, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Dublin, Dubai, Geneva, Toronto and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: https://www.sans.org
*************************************************************************
********************** Sponsored Links: *************************
1) Attend an Online Demo of iPrism Web Filter and Get a $20 Amazon Giftcard! http://www.sans.org/info/55799
2) Register for Department of Homeland Security Control Systems Cyber Security Trainings. SANS Process Control and SCADA Summit March 29-30. http://www.sans.org/info/55804
3) SANS Inquires... Which information security products, services and providers would you like to hear more about? Answer a short 3 question survey and be automatically entered to win a $50 Amazon gift card. http://www.sans.org/info/55809
******************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: IBM Lotus iNotes, formerly known as Lotus Domino Web Access, is a popular Web-based email software for enterprises. It enables users to manage business information both online and offline. Part of Lotus iNotes's web-based functionality is provided by Lotus iNotes ActiveX Control and this is reported to contain a buffer overflow vulnerability. A specially crafted web page that instantiates this ActiveX control can be used to trigger this vulnerability. The specific flaw resides in the dwa8.dll, dwa8w.dll libraries caused by inadequate boundary checks on the length of user-controlled URL. An attacker can pass an overly long URL to the function and trigger the vulnerability which might also lead to remote code execution. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's kill bit mechanisms for CLSID {3BFFE033-BF43-11d5-A271-00A024A51325, 983A9C21-8207-4B58-BBB8-0EBC3D7C5505, E008A543-CEFB-4559-912F-C27C2B89F13B, 75AA409D-05F9-4f27-BD53-C7339D4B1D0A}. Note that this may affect normal application functionality
Description: IBM Informix Dynamic Server (IDS) is a Relational Database Management System from IBM Software Group and is known for its high online transaction processing performance. Multiple stack-based buffer overflow vulnerabilities have been reported in IBM Informix Database Server. The flaw resides in "librpc.dll", which is a RPC protocol parsing library used by ISM Portmapper service "portmap.exe" and listens on default TCP port 36890. The flaw is caused by inadequate bounds checking on the user supplied data. Successful exploitation might allow an attacker to execute arbitrary code remotely. Some technical details for the vulnerability are available publicly.
Status: Vendor confirmed, updates available.
Description: A signedness error has been reported within "librpc.dll", which is an RPC protocol parsing library utilized by ISM Portmapper service "portmap.exe". This service by default is bound to TCP port 36890. Multiple vendors like IBM Informix Dynamic Server (IDS) and EMC Legato Networker utilize this library and are hence vulnerable to this vulnerability. The issue is caused by inadequate signedness check on the user supplied parameter sizes. A specially crafted RPC packet sent to TCP port 36890 can trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the SYSTEM user. Some details for the vulnerability are available publicly.
Status: Vendors confirmed, updates available.
Description: A vulnerability has been identified in VBScript, a scripting language supported by Microsoft Internet Explorer like JavaScript. A specially crafted web page in addition to certain activity can trigger this vulnerability. The specific flaw is caused because it is possible to invoke winhlp32.exe from VBScript "MsgBox()" function through Internet Explorer. Thus one can execute or open arbitrary help (.hlp) files which are usually unsafe files. In order for an attack to be successful the user will have to be tricked into pressing the function key F1 while the specially crafted web page displays the dialog box. Full technical details for the vulnerability are publicly available along with a proof-of-concept.
Status: Vendor confirmed, no updates available.
Description: Modo 401 is a 3D modeling, painting, animating and rendering software package from Luxology LLC designed to create different models. An integer overflow vulnerability has been identified in Modo 401. A specially crafted LaserMaster Font ".LXO" file can be used to trigger this vulnerability. The specific flaw is caused by a boundary error in the function "Swap4" in "valet4.dll" in the way it processes LXO files. Successful exploitation might allow an attacker to execute arbitrary code in the context of the vulnerable application. Some technical details for the vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 10, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8115 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.