@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** Sponsored By Trusted Computer Solutions ****************
Is your IT organization struggling to keep your enterprise servers in compliance with security policy? Could your organization pass a surprise security audit today? Security Blanket performs fast, consistent, and repeatable operating system lock down to industry or custom security settings in minutes, not days. Audit ready, all the time! Try Security Blanket for FREE.
http://www.sans.org/info/56073
*************************************************************************
TRAINING UPDATE
-- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
http://www.sans.org/reston-2010/
-- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
-- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
-- SANSFIRE Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic Techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
-- SANS Boston 2010, June 6-14, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Dubai, Geneva, Toronto, Singapore and Brisbane all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
**************************** Sponsored Links: **************************
1) Get real-world forensic techniques from industry-recognized experts at the 2010 European Community Digital Forensics & Incident Response Summit April 19-20 in London. http://www.sans.org/info/56078
2) Rediscover Orlando and hear about Process Control Security issues. Process Control & SCADA Summit March 29-30. http://www.sans.org/info/56083
*************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian and Joshua Bronson at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Status: Vendor confirmed, no updates available.
Description: Microsoft Excel contains multiple vulnerabilities in its parsing of Excel documents. A specially crafted Excel file that has a malformed record object could trigger one of these vulnerabilities when an unsuspecting user opens it with the affected application. The first issue is caused by a memory corruption error in the way Microsoft Excel processes certain malformed records. The second issue is caused by a type confusing error while parsing multiple Excel records. The third issue is a heap overflow vulnerability which is caused by an error in the way Microsoft Excel parses an MDXTUPLE record in a Workbook global stream. The fourth issue is a heap overflow vulnerability which is caused by an error in the way Microsoft Excel parses an MDXSET record in a Workbook global stream. The fifth issue is memory corruption vulnerability caused by incorrect parsing of FNGROUPNAME records which might result in use of uninitialized memory. The sixth issue is caused by an error in the decompression of XLSX files which might result in execution of uninitialized memory. The seventh issue might lead to memory corruption because of an error in the parsing of DbOrParamQry records. Successful exploitation of most of these vulnerabilities might lead to remote code execution. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: windows Movie Maker is a video editing and creating, and audio editing software from Microsoft and is included by default in most of Windows Operating Systems. A buffer overflow vulnerability has been identified in Windows Movie Maker, which can be triggered by a specially crafted Movie Maker or Producer 2003 project files. The issue is a boundary error in the "IsValidWMToolsStream()" function caused by inadequate bounds checking on values of the size read from a malicious file. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. User interaction in order to carry out this attack, in that the user has to be convinced to open the malicious file. Some technical details of the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Autonomy KeyView Software Developer's Kit (SDK) is a collection of many file parsing libraries and is used by many popular vendors such as Lotus Notes and Symantec. This SDK is used to automatically parse and display different document formats, such as PowerPoint, Excel, Word, as well as other OLE document formats. An integer overflow vulnerability has been identified in Autonomy's KeyView Filter SDK which can be triggered by a specially crafted OLE document. The issue is caused by an integer overflow error in the "kvolefio.dll" while processing OLE document, since the software doesn't perform adequate input validation checks while reading integer value from a file. This integer is used to calculate the amount of memory required to be allocated, and if the supplied value is large it will result in an overflow. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Opera is a popular cross-platform web browser. A buffer overflow vulnerability has been identified in Opera which can be triggered by specially crafted HTTP response. The specific flaw is caused by an error in the way Opera handles HTTP responses that contain an overly large number in the "Content-Length" header field. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for the vulnerability are publicly available along with a proof-of-concept.
Status: Vendor confirmed, updates available.
Description: Authentium Command On Demand is a web-based free virus scanner and it scans for more than half a million threats on the Internet daily. Multiple buffer overflow vulnerabilities have been identified in the CSS Web Installer ActiveX control that is present in Authentium Command On Demand online scanner. The issues are caused by buffer overflow errors in the "InstallProduct()", "InstallProduct1()" or "InstallProduct2()" methods, while processing arguments passed to these methods. A specially crafted web page, which contains overlong arguments passed to the vulnerable methods, can be used to trigger these vulnerabilities. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for these vulnerabilities are publicly available along with proof-of-concepts.
Status: Vendor not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's kill bit mechanisms for CLSID 6CCE3920-3183-4B3D-808A-B12EB769DE12. Note that this may affect normal application functionality.
Description: HP Performance software is a solution that is used to measure, compare and possibly improve the performance of the systems and networks in a service. A remote command execution vulnerability has been identified in HP Performance Insight and it can be triggered by a specially crafted requests. The issue is caused by inadequate input validation and authentication of the requests to the "helpmanager" servlet running on the server. An attacker can exploit this vulnerability to execute arbitrary commands by uploading malicious JSP pages. Authentication is not required to exploit this vulnerability. Some technical details for the vulnerability are publicly available.
Status: Vendors confirmed, updates available.
Description: Apache HTTP Server is a popular open source web server, and it was the first web server software to surpass 100 million web sites. A memory corruption vulnerability has been identified in Apache HTTP server, which can be triggered by a specially crafted request followed by a reset packet to the vulnerable server. The issue is caused by an error in "mod_isapi", a core module in Apache package, as it incorrectly unloads the target ISAPI module from memory before completing the request processing. This results in dangling function pointers still in memory. Successful exploitation might allow an attacker to execute arbitrary code with system privileges. Full technical details for this vulnerability are publicly available along with a proof-of-concept.
Status: Vendor confirmed, updates available.
Description: A buffer overflow vulnerability has been identified in Yahoo! Player. The specific flaw is caused by a boundary error while processing playlists, such as ".m3u", ".pls", entries. A specially crafted .m3u or .pls file with overlong entries, when loaded by an affected player, can be used to trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for the vulnerability are publicly available along with proof-of-concept.
Status: Vendor not confirmed, no updates available.
Description: VLC media player is an open source, cross-platform media player developed by the VideoLAN project. A buffer overflow vulnerability has been identified in VLC media player. A specially crafted .mp3 file, when loaded by a vulnerable player, can be used to trigger this vulnerability. The specific flaw is caused by boundary errors while creating bookmarks while playing a malicious media file. Successful exploitation might lead to system access or denial-of-service condition. Full technical details and proof-of-concept for this vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 11, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8177 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.