@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored By Trusted Computer Solutions ****************
OS hardening is risky business when relying on manual scripts to secure your enterprise. Security Blanket automates this error prone process for consistent hardening to guidelines such as DISA STIGs and SANS CAG Top 20 Critical Controls. Saving time and complying with policy is what Security Blanket is all about. Try it for FREE today!
http://www.sans.org/info/57893
*************************************************************************
TRAINING UPDATE
- -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
- -- SANS Secure Europe Amsterdam 2010, June 21-July 3, 2010 8 courses.
http://www.sans.org/secure-amsterdam-2010/
- -- SANS Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
- -- SANS Boston 2010, August 2-8, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Geneva, Toronto, Singapore and Canberra all in the next 90 days.
For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
*************************************************************************
************************ Sponsored Link: *************************
1) SIEM 2.0 - VIEW Demo of SC Magazine's Best Buy and Innovator of the Year. http://www.sans.org/info/57898
******************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Multiple vulnerabilities have been identified in Microsoft's Server Message Block (SMB) implementation, a standard protocol for resource, file, and printer sharing in Microsoft Windows installations. The first issue is a denial of service vulnerability caused by an error in the way Microsoft SMB client handles incomplete SMB responses. The second issue is a code execution vulnerability caused by an error in the way Microsoft SMB client allocates memory while parsing specially crafted SMB responses. Authentication is not required to exploit this vulnerability. The third issue is a code execution vulnerability caused as a result of Microsoft SMB client improperly validating fields in the SMB transact response. The fourth issue is a code execution vulnerability caused as a result of Microsoft SMB client incorrectly parsing specially crafted SMB transaction responses. The fifth issue is code execution vulnerability caused as a result of Microsoft SMB client incorrectly parsing specially crafted SMB responses and authentication is not required to exploit this vulnerability. Some technical details are provided for these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: A buffer overflow vulnerability has been reported in Microsoft MPEG Layer-3 audio codec, a software that is used to compress or decompress a media file. A specially crafted AVI file that contains the malformed MPEG Layer-3 audio stream can be used to trigger this vulnerability. MPEG Layer-3 Audio Codec for Microsoft DirectShow "l3codecx.ax" and the Fraunhofer IIS MPEG Layer-3 ACM codec's "L3codeca.acm" and "L3codecp.acm" are the vulnerable audio codec's. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Technical details for this vulnerability are not publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Media Player, a feature of Windows operating system, is used to play audio and video files. A code execution vulnerability has been identified in the Windows Media Player ActiveX control. The issue is caused by an error while retrieving a codec for an unknown fourCC compression code. Successful exploitation might allow an attacker to execute arbitrary code in the context of the user using the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Office Publisher, a popular Desktop Publishing (DTP) application and Microsoft Office component, contains a buffer overflow vulnerability. A specially crafted Publisher file can be used to trigger this vulnerability. The issue is caused by a boundary error in the code, responsible for converting files from the Publisher 97 format, while processing a TextBox item. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details about the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Visio is a diagramming software from Microsoft and has been identified with two vulnerabilities. A specially crafted Visio file can be used to trigger this vulnerability. The first issue is caused by an error in Microsoft Office Visio in its validation of certain attributes while processing specially crafted Visio files. The second issue is caused by an error in Microsoft Office Visio in its calculation of indexes while processing specially crafted Visio files. Successful exploitation in both the cases might allow an attacker to execute arbitrary code in the context of the affected application. Technical details for these vulnerabilities are not available in public.
Status: Vendor confirmed, updates available.
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe reader and Acrobat have been reported to have multiple vulnerabilities, which could be triggered by opening a specially crafted PDF file. The first issue is caused by a memory corruption error in "3difr.x3d", which is a plug-in used to display 3D material. The second issue is a heap overflow error in "CoolType.dll". The third issue is caused by an error while parsing embedded fonts inside a PDF document. There are other unspecified errors in the application that causes buffer overflows, memory corruption and cross site scripting vulnerabilities. Successful exploitation in most of the cases might result in remote code execution. Technical details for these vulnerabilities are not available publicly.
Status: Vendor confirmed, updates available.
Description: Oracle has released a cumulative security patch for a wide range of its products on April 13, 2010. This Critical Patch Update contains 41 new security fixes across different products. Of these 41 new fixes, there are 7 fixes for the Oracle Database Server, 5 security fixes for Oracle Fusion Middleware, 1 security fix for the Oracle Collaboration Suite, 8 new security fixes for Oracle Applications, 4 new security fixes for the Oracle PeopleSoft and JDEdwards Suite, 6 new security fixes for Oracle Industry Applications and 16 new security fixes for the Oracle Sun Product Suite. Flaws addressed in this update include remote command execution vulnerabilities, denial of service issues, information disclosure vulnerabilities, SQL injection vulnerabilities, security restrictions bypass issues. There still are some issues whose impacts are yet unknown. Authentication is not required to exploit some of these vulnerabilities while for some authentication is required.
Status: Vendor confirmed, updates available.
Description: VMware, a virtualization software available for a variety of platforms, has multiple vulnerabilities. The first issue is a code execution vulnerability caused by an error in the way VMware libraries are referenced, and this issue affects only Windows Guest Operating Systems. The second issue is a code execution vulnerability caused by an error in the way VMware executables are loaded, and this issue affects only Windows Guest Operating Systems. The third issue is a privilege escalation issue because of an error in the USB service. The fourth issue is an uninitialized-memory-read error in the libpng libraries through 1.2.35. The fifth issue is heap overflow errors in the VMware movie decoder, which can be triggered by a malicious video file. The sixth issue is a format string error in the VMware Remote Console "VMrc", an application that is installed when the VMrc browser plug-in is installed. The seventh issue is a denial of service vulnerability on Windows based systems caused by an error in vmware-authd. The eight issue is an information disclosure vulnerability caused by an error in the virtual networking stack of VMware's different products. The last issue is a format string vulnerability in "vmrun". Some technical details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Windows Media Services is a platform that is used for streaming live or on-demand audio and video. A buffer overflow vulnerability has been identified in Windows Media Services. The specific flaw is in the Windows Media Unicast Service "nsum.exe" caused as a result of incorrect handling of specially crafted transport information packets. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for this vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: A code execution vulnerability has been identified in Microsoft Windows Authenticode Signature Verification function, which is used to perform verification of trust on a specified object. The specific flaw is caused by an error while processing fields from the file digest, while signing and verifying a portable executable (PE) and a cabinet file. A specially crafted PE or cabinet file can be used to trigger this vulnerability. The second issue is code execution vulnerability in the Microsoft Windows Authenticode Signature Verification for cabinet (.cab) file formats. The specific flaw is caused by an error while processing fields from the file digest, while signing and verifying a cabinet file. A specially crafted cabinet file can be used to trigger this vulnerability. No further details are available for these vulnerabilities in the public.
Status: Vendor confirmed, updates available.
Description: Two vulnerabilities have been identified in Microsoft Windows Simple Mail Transfer Protocol (SMTP) component, which is installed as part of Internet Information Services. The first issue is a denial of service vulnerability and is caused because the component does not parses a specially crafted DNS Mail Exchanger (MX) record correctly. The second issue is an information disclosure vulnerability caused as a result of incorrect allocation of memory by the SMTP component. A specially crafted SMTP command response can be used to trigger this vulnerability. No further details are available for these vulnerabilities in the public.
Status: Vendor confirmed, updates available.
Description: The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is used to provide IPv6 connectivity within IPv4 intranet. An IP address spoofing vulnerability has been identified in the ISATAP component of Microsoft Windows. The specific flaw is that there is an error in the ISATAP component in the way it checks the inner packet's IPv6 source address in a tunneled ISATAP packet. Some technical details for the vulnerability are provided publicly.
Status: Vendor confirmed, updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 16, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 9106 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.