@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
Part I for this issue has been compiled by Josh Bronson at TippingPoint, a division of HP, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft has recently released patches for vulnerabilities in Microsoft Internet Explorer, some of which may be used for code execution. Vulnerabilities exist in the "OnPropertyChange_Src()" function, which does not handle malformed HTML and JavaScript appropriately, and the "boundElements" property, which can be compromised by a malicious web site. Vulnerabilities only affecting Internet Explorer 6 include a use-after-free vulnerability in the handling of "CIframeElement" objectss, a memory corruption vulnerability related to Internet Exporer's handling of table elements, and another memory corruption vulnerability. In order to exploit these vulnerabilities, an attacker must entice a target to navigate to a malicious web site.
Status: vendor confirmed, updates available
Description: Adobe Flash Media Server is a data and media server that uses the proprietary Real Time Messaging Protocol (RTMP) to deliver data and media to clients using Adobe Flash Player. Using RTMP, both the client and the server can send remote procedure calls (RPCs) to one another. Adobe has recently patched two unspecified vulnerabilities that could be exploited by an attacker in order to execute arbitrary code on a system running Adobe Flash Media Server.
Status: vendor confirmed, updates available
Description: Adobe has recently released a patch for Flash Player, which is susceptible to multiple code-execution vulnerabilities. Two of the errors errors exist in the ActionScript virtual machine's handling of the "ActionPush" command and the "connect" method of ActionScript native object 2200. Both of these, and other unspecified vulnerabilities, can be used to corrupt memory and potentially execute arbitrary code. An attacker must entice a target to view a malicious flash file in order to exploit these vulnerabilities.
Status: vendor confirmed, updates available
Description: Microsoft Windows has recently patched two code-execution vulnerabilities. The vulnerabilities exist in Windows' handling of MPEG layer-3 audio and Cinepak Codec media.
Status: vendor confirmed, updates available
Description: Microsoft Silverlight is a web application framework that is similar to Adobe Flash. Microsoft's XML Core Services (MSXML) is a set of servicse used by native Windows programs to manipulate XML. Both Silverlight and MSXML are vulnerable to code-execution vulnerabilities. The MSXML vulnerability is due to a logic error in parsing malformed HTTP responses. One Silverlight vulnerability is due to a pointer-handling error, and another, which only affects Silverlight 3, is due to an error in the way the .NET Common Runtime Library (CLR) handles delegate methods. Note that this second vulnerability also affects the .NET framework more generally. All of these vulnerabilities can be exploited by enticing a target to visit a malicious web page.
Status: vendor confirmed, updates available
Description: Microsoft has recently released patches for Microsoft Office that address multiple code-execution vulnerabilities. Two of the vulnerabilities exist in Microsoft Word's handling of Word files; they involvee errors parsing "sprmCMajority" and "plcffldMom" records. Two other vulnerabilities exist in Microsoft Word's handling of Rich Text Format (RTF) files. One error in Microsoft Excel is due to improper handling of records following a malformed PivotTable Cache Data (SXDB) record.
Status: vendor confirmed, updates available
Part II -- Comprehensive List of Newly Discovered Vulnerabilitis from Qualys (www.qualys.com <http://www.qualys.com> <http://www.qualys.com> This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 9832 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.