@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored By SANS *************************
The SANS WhatWorks in Virtualization and Cloud Computing Summit brings together industry leaders to help enterprises realize the enormous benefits of virtualization while addressing the new security challenges that it creates. You'll discuss the latest processes and tools for securing your virtualized systems in open forums designed to bring you together with both industry experts and your peers facing the same day-to-day challenges.
http://www.sans.org/info/59173
******************************************************************
TRAINING UPDATE
-- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
-- SANS Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic Techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
-- SANS Boston 2010, August 2-8, 2010 11 courses. Special Events include Rapid Response Security Strategy Competition
http://www.sans.org/boston-2010/
-- SANS Network Security 2010, Las Vegas, September 19-27, 2010 39 courses. Bonus evening presentations include The Return of Command Line Kung Fu and Cyberwar or Business as Usual? The State of US Federal CyberSecurity Initiatives
http://www.sans.org/network-security-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Singapore, Amsterdam, Canberra and Portland all in the next 90 days.
For a list of all upcoming events, on-line and live: http://www.sans.org/index.php
*************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian and Josh Bronson at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Adobe Shockwave player, a popular multimedia program, has been identified with multiple vulnerabilities. The first issue is caused by a boundary error while processing Shockwave 3D block. The second issue is a memory corruption vulnerability caused by a signedness error while processing malicious Shockwave files. The third issue is a memory corruption vulnerability caused by an array indexing error while processing malicious Shockwave files. The fourth issue is caused by an integer overflow error while processing malicious Shockwave files. The fifth issue is a memory corruption vulnerability caused by an error while processing asset entries. The sixth issue is caused by a buffer overflow error while processing embedded fonts. The seventh issue is caused by a boundary error while parsing Director files. The eight issue is a memory corruption vulnerability caused by an error while processing 4-byte field within record type 0xFFFFFF49 within the 3D objects defined inside Director files. The ninth issue is caused when the application encounters signed values while parsing "pami" RIFF chunks. The tenth issue is caused by an error while processing Director files during a memory dereference. The eleventh issue is caused by a signedness error while processing Director files. There are some more unspecified errors which can be exploited to cause memory corruption.
Status: Vendor confirmed, updates available.
Description: Safari is Apple's web browser for Apple Mac OS X and Microsoft Windows. It contains two vulnerabilities in its handling of a variety of web page and scripting constructs. The first issue is caused by a use-after-free error in the way Apple Safari handles references to window objects. A specially crafted web-page can be used to trigger this vulnerability and successful exploitation might lead to remote code execution. The second issue leads to information disclosure caused by the way Safari handles HTTP basic authentication credentials in an HTTP request. Full technical details for the first issue are publicly available.
Status: Vendor not confirmed, no updates available.
Description: Microsoft Visual Basic for Applications, which is built into most Office programs, is prone to a code execution vulnerability. Microsoft Visual Basic for Applications is an implementation of Microsoft Visual Basic that is embedded in Microsoft Office Applications. Although Microsoft Visual Basic for Applications is designed to run with restricted permissions, an attacker can bypass these restrictions by enticing the user to open and run a specially crafted file for Microsoft Visual Basic for Applications. The attacker can then execute arbitrary code with the permissions of the currently logged-in user.
Status: Vendor confirmed, updates available
Description: Microsoft Outlook Express and Microsoft Mail, two widely deployed email clients, are prone to a code-execution vulnerability. By enticing the user to visit a malicious e-mail server, which could potentially be accomplished by man-in-the-middle attacks or DNS cache poisoning, an attacker could exploit the vulnerability and potentially execute arbitrary code with the permissions of the currently logged-in user.
Status: Vendor confirmed, updates available
Description: HP OpenView Network Node Manager (NNM), a popular enterprise network and system management application, has been identified with multiple vulnerabilities. There are three boundary error issues in "getnnmdata.exe", in the way it copies contents into a fixed length buffer using sprintf() calls. By sending overly long strings to "MaxAge", "iCount", and Hostname" parameters an attacker can cause a stack-based buffer overflow. The first issue is caused by a format string error in "ovet_demandpoll.exe" process and can be exploited by sending a specially crafted string to the "sel" parameter. The second issue is caused by a boundary error in the "netmon.exe" daemon and can be exploited by sending an overly long string to the "sel" parameter. The third issue is caused by a boundary error in the "snmpviewer.exe" daemon and can be exploited by sending an overly long string to the "act" and "app" parameters. Successful exploitation in all the cases might allow an attacker to execute arbitrary code remotely.
Status: Vendor confirmed, updates available.
Description: IrfanView is a lightweight viewer/player for Microsoft Windows and is known for its speed and ease of use. Two vulnerabilities have been reported in IrfanView, which can be exploited by a specially crafted PSD file. The first issue is a sign-extension error while parsing some PSD files. An attacker can exploit this issue to cause a heap based buffer overflow. The second issue is caused by a boundary error in the way the affected application processes PSD images that are RLE compressed. Successful exploitation might allow an attacker to execute arbitrary code remotely in the context of the affected application. Some technical details for the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: MySQL, a popular relational database management system (RDBMS), has been identified with multiple vulnerabilities. The first issue is a buffer overflow vulnerability caused by a boundary error, while processing COM_FIELD_LIST command packets. An overly long table name parameter to the COM_FIELD_LIST command can be used to trigger this vulnerability. The second issue is caused by an unspecified error while processing packets that are larger than the maximum size of the packet received. Successful exploitation in this case might lead to a denial of service condition. The third issue is caused by an error while processing table name argument of COM_FIELD_LIST command. A specially crafted table name argument can be used to trigger this vulnerability and successful exploitation in this case might lead to bypass of security restrictions. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Baofeng Storm is a popular Chinese media player with almost 120 million user base in China. It has a buffer overflow vulnerability which can be triggered by a specially crafted "M3U" playlist file. The specific flaw is caused by a boundary error in "medialib.dll" while processing M3U playlist files with overlong entry. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for the vulnerability are publicly available.
Status: Vendor not confirmed, no updates available.
Description: HP LoadRunner is an automated software from Hewlett-Packard to test the performance and load while examining the system behavior. A vulnerability has been identified in this product, which might allow an attacker to execute arbitrary code on vulnerable systems. The issue is caused by a flaw in the process "magentproc.exe". This process listens by default on TCP port 54345, and a specially crafted packet to this port will allow an unauthenticated attacker to execute local commands with System privileges. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 20, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 9510 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.