@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** Sponsored By St. Bernard Software ****************
Is your IT organization struggling to keep your enterprise servers in compliance with security policy? Could your organization pass a surprise security audit today? Security Blanket performs fast, consistent, and repeatable operating system lock down to industry or custom security settings in minutes, not days. Audit ready, all the time! Try Security Blanket for FREE.
http://www.sans.org/info/57453
******************************************************************
TRAINING UPDATE
- -- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
http://www.sans.org/reston-2010/
- -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
- -- SANSFIRE Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
- -- SANS Boston 2010, June 6-14, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Dubai, Geneva, Toronto, Singapore and Amsterdam all in the next 90 days.
For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
******************************************************************
************************** Sponsored Link ************************
1) Get real-world forensic techniques from industry-recognized experts at the 2010 European Community Digital Forensics & Incident Response Summit April 19-20 in London.
http://www.sans.org/info/57458
******************************************************************
Part I for this issue has been compiled by Joshua Bronson at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Several remote code execution vulnerabilities have been reported in Microsoft Internet Explorer, the most widely-used web browser. Six vulnerabilities are due to an uninitialized memory corruption, one is due to a race condition, and one is due to a buffer overflow. All of these vulnerabilities require the user to navigate to a maliciously crafted web page. Successful exploitation might allow an attacker to execute arbitrary code with the permissions of the current user. There is also an unspecified vulnerability that was disclosed at a recent Pwn2Own contest. It is not known to have been patched or confirmed by the vendor. Various other vulnerabilities in Internet Explorer have also been reported and patched.
Status: vendor confirmed, updates available
Description: Multiple vulnerabilities have been reported in Apple's Macintosh OS X, an operating system widely deployed on Apple computers. Successfully exploiting one of these vulnerabilities would allow an attacker to create a variety of exploit conditions. The vulnerabilities range from buffer overflows, bypass of security restrictions, privilege escalation, memory corruption, to denial of services. The vulnerabilities affect a number of Mac OS X applications. Some of these vulnerabilities may be used by attackers to execute arbitrary code on the vulnerable machine.
Status: vendor confirmed, updates available
Description: Multiple vulnerabilities have been reported in Mozilla Foundation products, including Firefox, the second most widely-used web browser. Three of these vulnerabilities could result in remote code execution. The first involves recently discovered bugs that crash Firefox. In the process of reproducing these bugs, evidence of memory corruption was discovered. It is possible, therefore, that an attacker may be able to exploit some of these vulnerabilities for code execution. Two other use-after-free vulnerabilities may also be exploitable for code execution. There is also an unspecified vulnerability that was disclosed at a recent Pwn2Own contest. It is not known to have been patched or confirmed by the vendor.
Status: vendor confirmed, updates available
Description: Sun's Java Runtime Environment, a virtual machine environment that operates on many platforms, is prone to multiple remote code-execution vulnerabilities. Two buffer overflow vulnerabilities exist in Java's handling of MIDI soundbanks. In addition, an input validation error exists in the processing of certain image files. All of these vulnerabilities can be exploited by enticing the user to visit a web page containing a malicious applet and accompanying data files. Various other vulnerabilities in the JRE have also been reported and patched. Some technical details for these vulnerabilities are publicly available.
Status: vendor confirmed, updates available
Description: Multiple code execution vulnerabilities have been discovered in QuickTime, a popular media player developed by Apple. The vulnerabilities involve insufficient validation of user input and might lead to memory corruption and buffer overflows. A specially crafted PICT or BMP image or malicious video file can be used to trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 14, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8652 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.