@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010
http://www.sans.org /appsec-2010/"> http://www.sans.org /appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010
http://www.sans.org /phoenix-2010/"> http://www.sans.org /phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
http://www.sans.org /sans-2010/"> http://www.sans.org /sans-2010/
-- SANS Northern Virginia Bootcamp 2010, April 6-13
http://www.sans.org /reston-2010/"> http://www.sans.org /reston-2010/
-- SANS Security West, San Diego, May 7-15, 2010 23 courses and bonus evening presentations
http://www.sans.org /security-west-2010/"> http://www.sans.org /security-west-2010/
Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at
http://www.sans.org /ondemand/spring09.php"> http://www.sans.org /ondemand/spring09.php
Plus Tokyo, Bangalore, Oslo and Dublin all in the next 90 days. For a list of all upcoming events, on-line and live:
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Windows Embedded OpenType (EOT) fonts are compact form of OpenType fonts embedded in documents or webpage's. A remote code execution vulnerability has been identified in Microsoft Windows Embedded OpenType (EOT) Font Engine, which can be triggered by a specially crafted EOT fonts. The specific flaw is an integer overflow error in Embedded OpenType Font Engine in the way it decompresses files and contents that has malicious embedded fonts. To exploit this flaw, an attacker can take any of the following actions: (a) Create a webpage that contains specially crafted embedded fonts, and entice an attacker to visit his webpage or (b) Send an email with an attached Microsoft Office file containing a specially crafted embedded fonts and convince the user to open it.
Status: Vendor confirmed, updates available.
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe reader and Acrobat have been reported to have multiple vulnerabilities, which could be triggered by opening a specially crafted PDF file. The first issue is an array boundary error in the U3D module. The second issue is a use-after-free error in the Multimedia.api. The third issue is an integer overflow error in the U3D module. The fourth issue is an error in the 3D module which might allow attackers to load malicious DLLs. The fifth issue is an unspecified script injection vulnerability. The sixth issue is an unspecified memory corruption vulnerability. The seventh flaw is a null pointer dereference error which might lead to a denial-of-service condition. The eight flaw is a buffer overflow vulnerability in the Download Manager, and successful exploitation in this case might lead to arbitrary code execution. Note that the PDF documents are often opened automatically by the vulnerable application without the consent of the user. Some details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Oracle has released a cumulative security patch for a wide range of its products on January 12, 2010. This Critical Patch Update contains 24 new security fixes across different products. Flaws addressed in this update include remote command execution vulnerabilities, denial of service issues, information disclosure vulnerabilities, SQL injection vulnerabilities, security restrictions bypass issues. There still are some issues whose impacts are yet unknown. Authentication is not required to exploit some of these vulnerabilities while for some authentication is required.
Status: Vendor confirmed, updates available.
Description: Adobe Flash Player 6, a browser plug-in used to play interactive content and video, was shipped with Windows XP and is reported to contain multiple vulnerabilities. One of the vulnerabilities is a use-after-free error in the Flash Player in the way it unloads Flash objects and it might lead to memory corruption. A specially crafted web page can be used to trigger this vulnerability. The other vulnerabilities are disclosed and fixed previously by Adobe Flash Player but note that the current version of Flash Player bundled in Windows XP is still vulnerable to them. Some technical details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: MIT Kerberos is the reference implementation of the Kerberos authentication protocol, a protocol used for secure authentication across potentially insecure networks. Integer underflow vulnerabilities have been reported in the crypto libraries of the MIT Kerberos software and a specially crafted ciphertext can be used to trigger these issues. The specific flaw is caused by integer underflow errors in the RC4 and AES decryption operations while handling malicious ciphertexts. Successful exploitation might allow an attacker to execute arbitrary code. Full technical details for these vulnerabilities is publicly available via source code analysis.
Status: Vendors confirmed, updates available.
Description: Novell iManager is a web-based administration console for various Novell products. A buffer overflow vulnerability has been reported in Novell iManager and it can be triggered by a specially crafted schema information. The specific flaw is in the way iManager handles importing and exporting of schema information. Specifically during importing and exporting, the sub-application does not do adequate bounds check on user-supplied data. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendors confirmed, updates available.
Description: PowerDNS is a popular cross-platform Domain Name System (DNS) server and PowerDNS Recursor is a resolving DNS server. Two Vulnerabilities have been reported in PowerDNS Recursor. The first flaw is a buffer overflow vulnerability caused by unspecified error and it can be triggered by specially crafted packets. Successful exploitation might lead to remote code execution. The second flaw is a spoofing vulnerability caused by unspecified errors and can be triggered by specially crafted zones. Successful exploitation might fool the affected application into accepting wrong data. No technical details are provided for these vulnerabilities.
Status: Vendors confirmed, updates available.
Description: Apple Mac OS X, an operating system from Apple Inc, is exposed to a memory corruption vulnerability. The specific flaw is an error in the way "strtod()" function handles floating point numbers passed to it. A specially crafted flowing point number passed by an application to the "strtod()" function will trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code. Full technical details for this vulnerability are publicly available along with proof-of-concept.
Status: Vendors confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7833 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.