@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored By SANS **********************
Join other professionals of the EU forensic community and meet local experts at the 2010 European Community Digital Forensics & Incident Response Summit April 19-20. Discuss the latest processes and technologies for effective incident response and mitigation, forensic analysis, and recovery as a result of a data breach in any size
organization.
http://www.sans.org/info/56333
******************************************************************
TRAINING UPDATE
-- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
http://www.sans.org/reston-2010/
-- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
-- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
-- SANSFIRE Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
-- SANS Boston 2010, June 6-14, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Dubai, Geneva, Toronto, Singapore and Amsterdam all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
************************************************************************
*************************** Sponsored Link ***********************
1) Hear the experts talk about the Advanced Persistent Threat at the Process Control and SCADA Summit March 29-30.
http://www.sans.org/info/56338
******************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Safari, Apple's web browser for Mac OS X and Microsoft Windows, contains multiple vulnerabilities in its handling of a variety of inputs. The first issue is an integer overflow vulnerability in ColorSync and it can triggered by a specially crafted image with an embedded color profile. The second issue is a buffer underflow vulnerability in ImageIO in the way it handles TIFF images. The third issue is an uninitialized memory access error in ImageIO and it can be triggered by a specially crafted BMP image. The fourth issue is a memory corruption error while handling certain TIFF images. The fifth issue is an implementation error in the way cookies, that are set by RSS and Atom feeds, are handled. The sixth issue is an error in the handling of the external URL schemes, which might result in opening of a local file. The seventh issue is a use-after-free error in WebKit in the way it handles HTML object element fallback content. The eight issue is a use-after-free error in WebKit in the way it parses XML documents. The ninth issue is a use-after-free error in WebKit in the way it handles HTML elements that has right-to-left text. the tenth issue is a use-after-free error in WebKit in the way it incorrectly handles nested HTML tags. The eleventh issue is an implementation error in WebKit when it handles cross-origin stylesheet requests. The twelfth issue is a use-after-free error in WebKit in the way it handles callbacks for certain HTML elements. The thirteenth issue is a use-after-free error in WebKit in the way it renders content with CSS display property set to "run-in". The fourteenth issue is a use-after-free error in WebKit in the way it handles HTML image elements. In most of the cases, successful exploitation might result in remote code execution. Some technical details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: SAP MaxDB is a popular enterprise database system. A buffer overflow vulnerability is identified in this product which can be triggered by a specially crafted request packet to TCP port 7210. The issue is caused by inadequate sanity checks done by "serv.exe" process on incoming handshake packets. The "serv.exe" process listens on TCP port 7210 by default. Successful exploitation might allow an attacker to execute arbitrary code with SYSTEM privileges. Authentication is not required to exploit this vulnerability. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: RemoteExec is a Microsoft Windows Network Management application from IS Decisions. A buffer overflow vulnerability has been reported in RemoteExec, which can be triggered by tricking a user into loading a specially crafted RemoteExec Computer List file. The specific flaw is a boundary error while processing ".rec" (RemoteExec Computer List) files with an overlong line. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Skype from Skype Technologies is a popular software application that provides for Internet-based voice communications. A vulnerability has been identified in Skype that might allow an attacker to bypass security restrictions and gain knowledge of certain sensitive information. This is caused by an error in the way Skype parses arguments that are passed by the 'skype:' protocol handler. The vulnerable application does not perform sufficient sanity checks on the "/datapath" arguments, and if the crafted argument is pointing to a malicious remote SMB share then the attacker might be able to manipulate and gain access to sensitive information. Full technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: A remote command execution vulnerability has been confirmed in MS HTML Help ActiveX control. It has a method which is used to open CHM files from the same directory where the application resides. This can be used by an attacker to load incorrect CHM files residing in the same directory as the application invokes help from, for e.g. a specially crafted notepad.chm file and execute arbitrary commands. User interaction is required to exploit this vulnerability. The user has to be tricked into opening a file, followed by pressing F1 in the document to invoke a help file and finally followed by clicking on a topic in the left pane of the Help window. Full technical details for the vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Description: Skype from Skype Technologies is a popular software application that provides for Internet-based voice communications. A vulnerability has been identified in Skype that might allow an attacker to delete arbitrary XML files from vulnerable Skype installations. The issue is caused by an error in the way Skype handles 'skype-plugin:' protocol. A specially crafted URI with a 'save_pxml' command can be used by an attacker to trigger this vulnerability. User interaction is required to carry out this attack since the user will have to be tricked into clicking on the crafted URI. Some technical details for the vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 12, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8320 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.