@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored By SANS *********************
What are the best practices in grid security? What are the most critical vulnerabilities in power systems and other elements of the critical infrastructure? Hear about these important findings at the 2010 SCADA & Process Control Summit. Also register for Pre and Post Summit courses including no-cost training sponsored by DHS on March 31. SANS Process Control and SCADA Summit March 29-30 - Orlando.
http://www.sans.org/info/57264
******************************************************************
TRAINING UPDATE
- -- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
http://www.sans.org/reston-2010/
- -- SANS Security West 2010, San Diego, May 7-15, 2010
23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
- -- SANSFIRE Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
- -- SANS Boston 2010, June 6-14, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Dubai, Geneva, Toronto, Singapore and Amsterdam all in the next 90 days.
For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Several products from the Mozilla Foundation such as its popular web browser Firefox, internet suite SeaMonkey, and email client Thunderbird, contain multiple vulnerabilities. The first issue is caused by an integer overflow error in the WOFF decoder in a font decompression routine. The second issue is caused by Firefox 3.6 versions improper handling of "multipart/x-mixed-replace" images which might result in reuse of deleted image frame. The third issue is a bypass of the same origin policy caused by overriding of "window.location" object. The fourth issue is memory corruption errors in the browser engine used in Firefox and other Mozilla-based products. The fifth issue is a bypass of security restrictions issue caused by an error in the way certain wrapped objects are handled. The sixth issue is a content policy bypass issue caused due to an error while preloading images. The seventh issue can lead to defacement of browser chrome caused due to an error in the handling of stylesheets used in remote XUL documents. The last issue could lead to phishing attacks and is caused due to an error in attaching the asynchronous Authorization Prompt to the wrong window. Technical details for these vulnerabilities are available via source code analysis.
Status: Vendor confirmed, updates available.
Description: Google Chrome, a web browser developed by Google, is the fourth most popular web browser with 2.59% usage share among all the web browsers. Multiple vulnerabilities have been identified in Google Chrome, which can be used attackers to bypass security restrictions, compromise a vulnerable system. The first issue is a race condition and pointer error in the sandbox. The second issue can be used to delete persisted metadata. The third issue is caused by a memory error in the way the application handles specially crafted SVG files. The fourth issue is caused by integer overflow errors while handling WebKit JavaScript objects. The fifth issue is caused by spoofing of HTTP AUTH dialog with the help of long sub domains. The sixth issue if exploited correctly might lead to bypass of download warning dialog. The last issue is caused by an unspecified error and it might lead to bypass of cross-origin policy. Full technical details publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: SeaMonkey is a popular cross-platform Internet suite from Mozilla, and includes web-browser, e-mail client, download manager etc. Multiple vulnerabilities have been reported in SeaMonkey that can be used by attackers to disclose information or compromise a vulnerable system. The first issue is caused by an error in the way SeaMonkey handles scriptable plug-in content, such as Flash objects, which might result in plug-in execution in SeaMonkey mail. The second issue is an error caused when using SSPI authentication and joined to Active Directory under Vista or later and this might result in a crash. The third issue is caused by an error in the certain messages are indexed with attachments. The other issues are previously reported errors in JavaScript engine, errors in BinHex decoder of the browser engine, and integer overflow error in a base64 decoding function. Full technical details for the vulnerabilities are available through source code analysis.
Status: Vendor confirmed, updates available.
Description: Computer Associates ARCserve Backup is a popular enterprise backup solution that provides data deduplication and resource management reporting. Multiple vulnerabilities have been reported in Computer Associates ARCserve Backup. These issues are caused by unspecified errors in the version of JRE that is shipped with ARC serve Backup. Apparently this version of JRE has also reached end of life. No further technical details for the vulnerabilities are available in the public.
Status: Vendor confirmed, updates available.
Description: Liquid XML Studio, a product of Liquid Technologies, is a graphical XML Schema editor for windows and is used by many users around the globe especially popular in schools and universities. A buffer overflow vulnerability has been reported in a ActiveX control used by the Liquid XML Studio 2010 and a specially crafted web page that instantiates this ActiveX control can be used to trigger this vulnerability. The specific flaw is a boundary error in the " LtXmlComHelp8.dll" module and an attacker can exploit this vulnerability by sending an overly long argument to the "OpenFile()" method. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for the vulnerability are publicly available.
Status: Vendor not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable control via Microsoft's kill bit mechanisms for CLSID {E68E401C-7DB0-4F3A-88E1-159882468A79}. Note that this may affect normal application functionality.
Description: VariCAD is a Computer-aided design (CAD) program with features of 3D modeling and 2D drafting. A buffer overflow vulnerability has been reported in VariCAD and VariCAD viewer and a specially crafted DWB file can be used to trigger this vulnerability. The issue is caused by a boundary error in the way the affected application processes DWB files. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for the vulnerability are publicly available via proof-of-concept.
Status: Vendor not confirmed, no updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 13, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8386 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.