@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
TRAINING UPDATE
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 8 courses and bonus evening presentations, including Social Zombies: Your Friends Want to Eat Your Brains
https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 6 courses and bonus evening presentations, including The Art of Incident Response and Advanced Forensic Techniques: Catching Hackers on the Wire
https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
https://www.sans.org/sans-2010/
-- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
https://www.sans.org/reston-2010/
-- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
https://www.sans.org/security-west-2010/
Looking for training in your own community? https://sans.org/community/
Save on On-Demand training (30 full courses)
- See samples at
https://www.sans.org/ondemand/spring09.php
Plus Tokyo, Bangalore, Oslo and Dublin all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Microsoft Internet Explorer (IE) has been reported with a remote code execution vulnerability. A specially crafted web page can be used to trigger this vulnerability. The vulnerability is caused by a use-after-free error in the way IE handles events, when the element triggering the event is removed. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application and there are evidence that this vulnerability is actively exploited in the wild. Microsoft has suggested some workarounds to mitigate this issue and one of them is to enable Data Execution Protection (DEP) for all versions of Internet Explorer that has provision for the same. Full technical details for the vulnerability are publicly available along with proof-of-concepts.
Status: Vendors confirmed, updates should be available on January 21st 2010.
Description: Adobe Shockwave Player is a multimedia player installed on approximately 450 million machines. Multiple overflow vulnerabilities have been identified in Adobe Shockwave Player. The first issue is a buffer overflow error in Shockwave player in the way in processes Shockwave 3D models. The second issue is two integer overflow errors in Shockwave player in the way in processes Shockwave 3D models. The third issue is four integer overflow errors caused by improper processing of a certain block type. The fourth issue is an integer overflow error caused by improper processing of a certain Shockwave 3D block. All these issues can be triggered by a specially crafted Shockwave file. Successful exploitation in these cases might allow an attacker to execute arbitrary code. Some technical details for these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: RealPlayer is a proprietary multi platform media player from RealNetworks designed to play different multimedia formats. Multiple vulnerabilities have been reported in RealNetworks RealPlayer. There are heap-based overflow errors in the way RealPlayer processes a malformed ASM Rulebook, a malformed GIF file, a malformed IVR file, a malformed compressed GIF file, a malformed SMIL file, and a malformed Skin. There is a buffer overflow error in the way RealPlayer handles a malformed media file, a malformed IVR file. An array overflow error has been reported caused by the way RealPlayer parses a malformed ASM RuleBook. There is a buffer overflow error in the RealPlayer rtsp "set_parameter" and a heap overflow error in the way RealPlayer handles SIPR codec. Successful exploitation of these vulnerabilities might allow an attacker to execute arbitrary code. Technical details for these vulnerabilities are not available publicly.
Status: Vendor confirmed, updates available.
Description: Google SketchUp is a 3D modeling program developed by Google for game developers, architects etc. Two vulnerabilities have been identified in Google SketchUp. The first issue is a memory corruption error in the "lib3ds" library, a library used for processing 3DS files. A specially crafted 3DS file can be used to trigger this vulnerability. The second issue is caused by an integer overflow error in the way Google SketchUp processes SKP file s. A specially crafted SKP file can be used to trigger this vulnerability. Successful exploitation in both cases might allow an attacker to execute arbitrary code in the context of the logged on user. Full technical details for the 3DS vulnerability are publicly available along with a proof-of-concept.
Status: Vendors confirmed, updates available.
Description: Sun java System Web Server is a web server from Sun Microsystems designed for medium and large businesses. Multiple vulnerabilities have been reported in Sun Java System Web Server. The first issue is a boundary error in the way the web server processes the "OPTIONS" requests and an over long http request can be used to trigger this vulnerability. The second flaw is a boundary error in the way the web server processes "TRACE" requests . A malformed TRACE request can be used to trigger this vulnerability and cause a heap-based buffer overflow. The third issue is a boundary error in the way the web server handles "Authorization" header in a http request. A malformed http request with an overlong "Authorization" header can be used to trigger this vulnerability. Successful exploitation in the case of some these vulnerabilities might allow an attacker to execute arbitrary code. Full technical details for these vulnerabilities are publicly available.
Status: Vendors confirmed, no updates available.
Description: Zeus Web Server is a scalable and high performance web server developed by Zeus Technology for Unix and Unix-like platforms. Two vulnerabilities have been reported in Zeus Web Server. The first issue is a buffer overflow vulnerability caused by a boundary error in Zeus Web Server SSL2 implementation (SSL2_CLIENT_HELLO). Successful exploitation in this case might allow an attacker to carry out remote code execution. The second issue is an error in the TLS protocol, specifically in the way it handles session re-negotiations. This can be exploited to insert arbitrary data via Man-in-the-Middle attacks. Technical details for these vulnerabilities are available publicly along with proof-of-concepts.
Status: Vendor confirmed, updates available.
Description: BS.Player, a popular multimedia player used by more than 70 million users, has been reported with a buffer overflow vulnerability. A specially crafted BSPlayer Configuration file (BSI) file can be used to trigger this vulnerability. The specific flaw is a boundary error caused while processing a malformed BSI file that has an over long "Skin" parameter in the "Options" field. The user will have to be tricked by an attacker to open malicious BSI files in order to exploit this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details about the vulnerability are publicly available along with a proof-of-concept.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7863 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.