@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
PART I Critical Vulnerabilities Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Two vulnerabilities exist in certain versions of Microsoft Access. By enticing the user to visit a malicious site, an attacker can exploit these vulnerabilities in order to execute arbitrary code in the context of the currently logged-in user. The first vulnerability has to do with three specific ActiveX controls. Loading all three controls in a particular order causes a memory corruption that can be leveraged for code execution. The second has to do with the use of an uninitialized variable in an ActiveX control.
Status: vendor confirmed, updates available
Description: Microsoft Outlook is susceptible to a remote code-execution vulnerability. By enticing the user to double click on a malicious attachment, an attacker can exploit this vulnerability in order to execute arbitrary code on the target's machine. Ordinarily, Microsoft Outlook will treat attachments as a security threat and display appropriate warnings to the user. Due to an error handing attachments that are only attached by reference, however, these threats can be bypassed. Although an attacker may not specify command-line arguments in the attached references, limiting the potential for attacks using local executables, a remote file may be referenced. That file will not be treated as a security threat.
Status: vendor confirmed, updates available
Description: Nullsoft Winamp, a popular proprietary media player available freely for download, is susceptible to multiple stack-based buffer overflow vulnerabilities. By enticing the user to open a Flash Video (FLV) file with malicious codec information, an attacker can exploit this vulnerability in order to execute arbitrary code with the permissions of the currently logged-in user.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com <http://www.qualys.com> <http://www.qualys.com> This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 9725 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.