@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored By SANS *********************
Good security architecture is not vendor- or product driven. It is driven by the processes that support the mission, or business objectives. Find out more about these processes at SANS Security Architecture Summit April 24-26 in Las Vegas
http://www.sans.org/info/58528
******************************************************************
TRAINING UPDATE
-- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
-- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
-- SANS Secure Europe Amsterdam 2010, June 21-July 3, 2010 8 courses.
http://www.sans.org/secure-amsterdam-2010/
-- SANS Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
-- SANS Boston 2010, August 2-8, 2010 11 courses. Special Events include Rapid Response Security Strategy Competition
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Geneva, Toronto, Singapore and Canberra all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
*************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Joshua Bronson at TippingPoint as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Windows Media Service, a platform for streaming live or on-demand content over a network, does not perform proper boundary checks on user-supplied data. A remote attacker can exploit this vulnerability in order to overflow a buffer and potentially execute arbitrary code. Microsoft released a patch in MS10-025 that did not fix the vulnerability but later updated the patch to fully address the issue.
Status: Vendor confirmed, update available
Description: Adobe Download Manager, a product to help users download updates to Adobe Reader and other Adobe files, is prone to buffer overflow vulnerability. The vulnerability exists in an ActiveX control, making it remotely exploitable: by enticing a user to visit a malicious site, an attacker can exploit this vulnerability in order to execute arbitrary code with the permissions of the currently logged-in user.
Status: Vendor confirmed, update available
Description: Multiple vulnerabilities have been reported in Google Chrome, the third most widely used web browser. Three of these vulnerabilities are unspecified memory corruption vulnerabilities, dealing with Chrome's handling of HTML5 media, fonts, and JavaScript. While Google has not provided details about the vulnerabilities, it has assigned a rating of HIGH. It should be noted that memory corruption vulnerabilities sometimes allow the execution of arbitrary code.
Status: Vendor confirmed, updates available
Description: A memory corruption vulnerability exists in Opera, a popular web browser. By continuously writing to a page using a the JavaScript method document.write(), an attacker can execute arbitrary code with the permissions of the currently logged-in user. There is currently no update available from the vendor.
Status: No vendor confirmation or updates available
Description: MIT Kerberos, a tool for authenticating client-server applications, is prone to a double free vulnerability. An remote authenticated attacker can exploit this vulnerability in order to terminate the KDC (key distribution center) in Kerberos. It may theoretically be possible to use this vulnerability to execute arbitrary code.
Status: Vendor confirmed, update available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 18, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 9196 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.