@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************* Sponsored By Lightwave Security ********************
Download our NEW Whitepaper: Continuous Compliance in the PCI World SecureAware® helps retailers create and oversee a corporate program of data security excellence and PCI compliance. Automated IT-GRC solutions are now used by leading organizations to integrate Governance, Risk Management, and Compliance for many regulatory mandates including PCI, SOX (COBIT), and HIPAA.
https://www.sans.org/info/54369
**************************************************************************
TRAINING UPDATE
- -- SANS Phoenix, February 14 - February 20, 2010
6 courses and bonus evening presentations, including The Art of Incident Response and Advanced Forensic Techniques: Catching Hackers on the Wire
https://www.sans.org/phoenix-2010/
- -- SANS 2010, Orlando, March 6 - March 15, 2010
38 courses and bonus evening presentations, including Software Security Street Fighting Style
https://www.sans.org/sans-2010/
- -- SANS Northern Virginia Bootcamp 2010, April 6-13
Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
https://www.sans.org/reston-2010/
- -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
https://www.sans.org/security-west-2010/
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses
https://www.sans.org/sansfire-2010/
Looking for training in your own community?
Save on On-Demand training (30 full courses)
- See samples at https://www.sans.org/ondemand/
Plus Oslo and Dublin all in the next 60 days.
For a list of all upcoming events, on-line and live: http://www.sans.org
*************************************************************************
**************************** Sponsored Link: ****************************
1) Check out the Spring 2010 WhatWorks Poster: Top 35 Secure Development Techniques
https://www.sans.org/info/54373
Download the NetWiness Whitepaper- NetWitness at Financial Services Companies
https://www.sans.org/info/54378
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: Apple iPhone and Apple iPod contain multiple vulnerabilities in their handling of certain inputs like audio files, image files, USB control message, FTP directory listings, and web page contents. The first issue is a buffer overflow error in the way the affected products handles mp4 audio files. The second issue is a buffer underflow error in the way ImageIO handles TIFF images. The third issue is a memory corruption vulnerability caused due to improper handling of certain USB control message. The fourth issue is caused by improper handling of FTP directory listings. The fifth issue is caused by Webkit improperly handling HTML 5 Media Element pointing to an external resource and eventually leading to requests sent to remote servers automatically. Successful exploitation in most cases might lead to remote code execution. Technical details for some of the vulnerabilities are publicly available.
Status: Vendors confirmed, updates available.
Description: IBM DB2 is a relational database model developed by IBM. Two vulnerabilities have been reported in IBM DB2. The first issue is a heap overflow vulnerability caused by improper handling of specially crafted SQL commands. Successful exploitation of this vulnerability might allow an attacker to execute arbitrary code with the privileges of the affected application. The second issue is a denial-of-service vulnerability caused by an error in "kuddb2" agent in the way it handles certain malformed packets. Technical details for these vulnerabilities are publicly available vial proof-of-concepts.
Status: Vendor confirmed, no updates available.
Description: Mod_proxy is a module for Apache, a multi-platform HTTP server, that implements proxy/cache and proxying capability for different protocols like FTP, SSL etc. An integer overflow vulnerability has been identified in the mod_proxy module of Apache. The specific flaw is an integer overflow error in the "ap_proxy_send_fb()" function in "src/modules/proxy/proxy_util.c". This vulnerability only exists on 64 bits systems when the server directly converts from type 'long' to type 'int'. Successful exploitation might allow an attacker to execute arbitrary code remotely. Full technical details for the vulnerability are publicly available via source code analysis and proof-of-concept.
Status: Vendor confirmed, updates available.
Description: A buffer overflow vulnerability reportedly exists in various multiple products of Hitachi, a large Japanese multinational company specializing in high technology. Cosminexus, Processing Kit for XML, Hitachi's Developer Kit for Java are some of the products reported to be vulnerable to this vulnerability. The flaw is caused by boundary error when Java applications processes malicious image files and a specially crafted image file can be used to trigger it. Successful exploitation might lead to remote code execution or a denial-of service condition. Technical details are not available for this vulnerability.
Status: Vendors confirmed, updates available.
Description: yaSSL is a dual licensing Secure Sockets Layer (SSL) library used by programmers to build security functionality into their applications. A suffer overflow vulnerability has been reported in yaSSL library caused by an error in the way it processes SSL certificates. A specially crafted SSL certificate can be used to trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for the vulnerability are publicly available via source code analysis and public proof-of-concepts.
Status: Vendors confirmed, updates available.
Description: Wireshark is a packet sniffer application, similar to tcpdump, that is used for network troubleshooting and analysis. Multiple buffer overflow vulnerabilities have been identified in Wireshark. The flaws are caused by boundary errors in the LWRES dissector and they can be triggered by either a specially crafted packet capture file or a malicious network packet. The public proof-of-concepts show that the error is in "dissect_getaddrsbyname_request" function and it is believed that other functions might be vulnerable too. Successful exploitation of these vulnerabilities might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details are available publicly along with proof-of-concepts.
Status: Vendor confirmed, updates available.
Description: Ingres Database, a popular enterprise database engine, contains a heap overflow vulnerability. The issue is caused by an error in the Ingres Database Server in the way it processes data packets sent to the "iidbms" port. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the affected application. Technical details for the vulnerability are publicly available via public proof-of-concept.
Status: Vendor confirmed, no updates available.
Description: A couple of Internet Relay Chat Daemons (ircd) such as IRCD-Hybrid and ircd-ratbox, are vulnerable to integer underflow vulnerability. The specific flaw is caused by an integer underflow error while processing "LINKS" command. A specially crafted LINKS command can be used to trigger this vulnerability. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7930 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.