@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************************************************************************
TRAINING UPDATE
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 8 courses and bonus evening presentations, including Social Zombies: Your Friends Want to Eat Your Brains
https://www.sans.org/appsec-2010/
-- SANS Phoenix, February 14 -February 20, 2010 6 courses and bonus evening presentations, including The Art of Incident Response and Advanced Forensic Techniques: Catching Hackers on the Wire
https://www.sans.org/phoenix-2010/
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
https://www.sans.org/sans-2010/
-- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
https://www.sans.org/reston-2010/
-- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
https://www.sans.org/security-west-2010/
Looking for training in your own community?
Save on On-Demand training (30 full courses) - See samples at https://www.sans.org/ondemand
Plus Tokyo, Bangalore, Oslo and Dublin all in the next 90 days.
For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Microsoft Internet Explorer contains multiple vulnerabilities in its handling of HTML objects and cached content. A specially crafted web page could trigger one of these vulnerabilities using specially crafted HTML or scripts. The first flaw is a XSS filter bypass vulnerability caused by an error in Internet Explorer 8 in the way it disables HTML attributes in a filtered HTTP response data. Successful exploitation might lead to information disclosure. The second flaw is caused by an error in Internet Explorer in the way it handles specially crafted URL. There are four Uninitialized Memory Corruption vulnerabilities in Internet Explorer caused by Internet Explorer inappropriately accessing objects that have not been initialized or that have been deleted. There two more HTML Object Memory Corruption vulnerabilities caused by Internet Explorer attempting to access incorrectly initialized memory. Successful exploitation in the cases of these vulnerabilities might allow an attacker to execute arbitrary code in the context of logged-on user. Some technical details are publicly available for some of these vulnerabilities.
Status: Vendor confirmed, updates available.
Description: Google Chrome, a web browser from Google, is the fourth most popular browser with 4.63% usage share among all the web browsers. Multiple vulnerabilities have been reported in Google Chrome in the way it handles various inputs. The vulnerabilities reported include information disclosure, cross-domain scripting, memory corruption errors, cross-domain access, and security bypass. Successful exploitation of some of the vulnerabilities might allow an attacker to execute arbitrary code. Full technical details for these vulnerabilities are publicly available via source code analysis.
Status: Vendors confirmed, updates available.
Description: CiscoWorks Internetwork Performance Monitor (IPM) is a troubleshooting application primarily used for evaluating network response time and availability. A buffer overflow vulnerability has been reported in CiscoWorks IPM. The specific flaw is caused by a boundary error while processing Common Object Request Broker Architecture (CORBA) GIOP requests. A specially crafted getProcessName GIOP request can be used to trigger this vulnerability. Authentication is not required to carry out this attack. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendors confirmed, no updates available.
Description: GNU gzip, the GNU project's popular compression tool, has been reported with multiple vulnerabilities. The first flaw is caused by an integer underflow error in the way gzip decompresses files that were compressed using Lempel-Ziv-Welch (LZW) compression algorithm. The second flaw is an input validation error in the way GNU gzip decompresses data blocks for dynamic Huffman codes. Successful exploitation in both cases might allow an attacker to either affect a crash or execute arbitrary code. In order to carry out an attack, the unsuspecting user will have to be tricked into decompressing a specially crafted file or archive. Full technical details for these vulnerabilities may be obtained via source code analysis.
Status: Vendors confirmed, updates available.
Description: Lotus Domino is a popular enterprise groupware and mail system developed by IBM. A buffer overflow vulnerability has been reported in IBM Lotus Domino. A specially crafted LDAP message can be used to trigger this vulnerability and cause a heap overflow. The flaw is caused by a boundary error while processing specially crafted LDAP messages. Successful exploitation might lead to a denial-of-service condition or system compromise. Full technical details for the vulnerability are publicly available along with proof-of-concept.
Status: Vendors confirmed, no updates available.
Description: InterBase SMP 2009 is a relational database management system (RDBMS) from Embarcadero Technologies. Two buffer overflow vulnerabilities have been reported in Interbase SMP 2009. The flaws are boundary errors caused by inadequate bounds checking while processing specially crafted packets to TCP port 3050. Successful exploitation might lead to a denial-of-service condition or allow an attacker to execute arbitrary code in the context of the affected application. Technical details for these vulnerabilities are not available publicly.
Status: Vendors confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7880 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.