@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By Qualys **************************
How many security controls does it take to screw in a light bulb? Government agencies and industry experts recommend thousands of important controls to protect information, but which controls can make the biggest impact? How do audit groups know which controls make the biggest impact and should be the priorities of their assessments? A new initiative by leading US government and private sector groups was formed in 2009 to address these issues via the Top 20 Critical Controls. Join SANS instructor James Tarala and sponsor Qualys for an informative webcast on how to prioritize a security audit program using these automated controls.
https://www.sans.org/info/54698
**************************************************************************
TRAINING UPDATE
- -- SANS Phoenix, February 14 -February 20, 2010 6 courses and bonus evening presentations, including The Art of Incident Response and Advanced Forensic Techniques: Catching Hackers on the Wire
https://www.sans.org/phoenix-2010/index.php
- -- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
https://www.sans.org/sans-2010/index.php
- -- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
https://www.sans.org/reston-2010/index.php
- -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
https://www.sans.org/security-west-2010/index.php
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses
https://www.sans.org/sansfire-2010/index.php
Looking for training in your own community?
https://sans.org/community/index.php
Save on On-Demand training (30 full courses) - See samples at
https://www.sans.org/ondemand/index.php
Plus, Oslo and Dublin all in the next 30 days. For a list of all upcoming events, on-line and live:
*************************************************************************
**************************** Sponsored Link: ****************************
1) Get real-world forensic techniques from industry-recognized experts at the 2010 European Community Digital Forensics & Incident Response Summit April 19-20 in London. http://www.sans.org/info/54699 *************************************************************************
Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft Office PowerPoint, a presentation program from Microsoft, has multiple remote code execution vulnerabilities which can be triggered by a specially crafted malicious PowerPoint file. The first issue is a buffer overflow error in the way PowerPoint handles file paths. The second issue is a heap overflow error caused by the way PowerPoint processes "LinkedSlideAtom" records. The third issue is an Array Indexing error caused by the way PowerPoint processes "placementId" field value in OEPlaceholderAtom records. The fourth issue is a Use After Free vulnerability caused by an error while processing OEPlaceholderAtom records. The fifth issue is a stack-based buffer overflow error in PowerPoint Viewer caused by improper processing of TextBytesAtom records. The sixth issue is a stack-based buffer overflow error in PowerPoint Viewer caused by improper processing of TextCharsAtom records. Successful exploitation of these vulnerabilities might allow an attacker to execute arbitrary code. User interaction is needed to exploit these vulnerabilities since, in most configurations; users will be prompted before opening the potentially malicious PowerPoint files. Some technical details are publicly available for some of the vulnerabilities.
Status: Vendors confirmed, updates available.
Description: ShellExecute, a part of Windows Shell application programming interface (API) functions, is used to perform different operation on the given file. A vulnerability has been identified in ShellExecute API, which can exploited by attackers to execute binaries on the local client system. The specific flaw is caused by ShellExecute API incorrectly validating the data streams sent to the ShellExecute API function. An application like Web browser uses the ShellExecute API function and so an attacker can use a specially crafted web page to trigger this vulnerability and execute binaries of their choice. Some technical details for this vulnerability are available publicly.
Status: Vendor confirmed, updates available.
Description: Microsoft DirectShow is an architecture for streaming media on Microsoft Windows platform and is used for capture and playback of multimedia streams. A heap overflow vulnerability has reported been in Microsoft DirectShow which can be triggered by a specially crafted .AVI file. The specific flaw is caused by an error in that way a certain type of video stream contained in .AVI file is decompressed. This might lead to heap overflow, memory corruption and potential remote code execution. Some technical details for the vulnerability are available publicly.
Status: Vendor confirmed, updates available.
Description: Microsoft Server Message Block (SMB) is a network file sharing protocol used in Microsoft Windows and multiple vulnerabilities have been identified in SMB Client. The first issue is caused by an error in Microsoft SMB client-side in the way it improperly handles race condition that might happen during the handling of SMB Negotiate responses. Successful exploitation of this vulnerability might lead to remote code execution on Windows 7 and Windows Server 2008 R2, but on Windows Vista and Windows Server 2008 it might lead to elevation of privilege. The second issue is caused by an error in Microsoft client implementation, in the way it improperly validates some fields in the SMB responses. Successful exploitation might lead to pool corruption and eventually to remote code execution. Full technical details for some of these vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Data Analyzer ActiveX Control can be used to allow programmatic controls of Data Analyzer from COM based development applications. A vulnerability has been identified in Microsoft Data Analyzer ActiveX Control that may lead to corruption of the system state. A specially crafted web page, when accessed by Internet Explorer, can be used to trigger this vulnerability. Successful exploitation of this vulnerability might allow an attacker to execute arbitrary code in the context of the logged on user. The vendor has released an update that effectively disables the Microsoft ActiveX controls by setting a killbit to the Class Identifier (E0ECA9C3-D669-4EF4-8231-00724ED9288F). Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Multiple vulnerabilities have been identified in Microsoft's TCP/IP stack, a set of networking protocols used widely on the Internet. The first issue is a boundary error in the TCP/IP stack caused by the way it improperly processes specially crafted ICMPv6 Router Advertisement packets. The second issue is an error in TCP/IP stack caused by the way it improperly handles specially crafted Encapsulating Security Payloads (ESP) over UDP datagram fragments. The third issue is a boundary error in the TCP/IP stack caused by the way it improperly processes specially crafted ICMPv6 Route Information packets. The fourth issue is a denial of service vulnerability in the TCP/IP stack caused by improper handling of malformed TCP Selective Acknowledgement (SACK) values. Some technical details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Office, especially Excel 9 (Office 2000) and Excel 10 (Office XP), has a buffer overflow vulnerability. A malformed Office file can be used to trigger this vulnerability. The specific flaw is a boundary error in "MSO.DLL" in the way it parses "OfficeArtSpgr" (recType 0xF003) containers, as it may lead to class pointers being interpreted incorrectly. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. User interaction is needed to exploit this vulnerability since, in most configurations; users will be prompted before opening the potentially malicious Office files. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Two vulnerabilities have been reported in Oracle Database, relational database management system developed by Oracle corporation. The first issue allows attackers to grant arbitrary Java permissions. The specific flaw is in PL/SQL package called DBMS_JVM_EXP_PERMS, which is used for importing and exporting Java permissions and is executable by PUBLIC. So an attacker can create their own policy table via a procedure IMPORT_JVM_PERMS within the package. The second issue can allow an attacker to carry out SQL Injection attacks. The specific flaw is in the two functions, SET_OUTPUT_TO_JAVA and SET_OUTPUT_TO_SQL, in DBMS_JAVA package since they take SQL statements as some parameters. Successful exploitation might allow an attacker to gain DBA user privileges. Full technical details for the vulnerabilities are available publicly.
Status: Vendor confirmed, no updates available.
Description: Microsoft Server Message Block (SMB) is a network file sharing protocol used in Microsoft Windows and multiple vulnerabilities have been identified in it. The first issue is a buffer overflow vulnerability caused by Microsoft SMB implementation inadequately validating malformed SMB requests that have overlong Pathname. The second issue is a denial of service vulnerability caused by Microsoft SMB improperly handling a race condition that occurs while parsing specially crafted SMB packets during the Negotiate phase. The third issue is a denial of service vulnerability caused by improper verification of the share and server name fields in SMB packets. The fourth issue is privilege escalation vulnerability caused by the lack of cryptographic entropy when the SMB server generates challenges during authentication. Technical details for some of the vulnerabilities are publicly available.
Status: Vendor confirmed, updates available.
Description: Microsoft Paint is a graphics painting program developed by Microsoft and included in all versions of Windows. An integer overflow vulnerability has been identified in Microsoft paint and a specially crafted JPEG image can be used to trigger this vulnerability. The specific flaw is an integer overflow error in the way Microsoft paint decodes malformed JPEG images. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Technical details for the vulnerability are not available publicly.
Status: Vendors confirmed, updates available.
Description: HP Network Node Manager (NNM) is a suite of applications that manages enterprise networks and large-scale systems. A vulnerability has been identified in HP Network Node manager that is caused by an unspecified error. This vulnerability can be exploited remotely by attackers to execute arbitrary commands. No technical details for this vulnerability are available publicly.
Status: Vendors confirmed, updates available.
Description: Novell Netstorage acts as a bridge between the Internet and a company's protected Novell network. A remote code execution vulnerability has been identified in Novell Netstorage which is caused by an unspecified error. Authentication is not required to exploit this vulnerability. No technical details are provided for this vulnerability.
Status: Vendor confirmed, updates available.
Description: Kerberos, a network authentication protocol, has been reported with a denial of service vulnerability in the Microsoft Windows implementations. The specific flaw is a NULL pointer dereference error caused by improper handling of Ticket-Granting-Ticket renewal requests that come from a client on a remote, non-Windows realm and in a mixed-mode Kerberos implementation. A specially crafted renewal requests can be used to trigger this vulnerability. Some technical details for this vulnerability are available publicly.
Status: Vendor confirmed, updates available.
-- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 07, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7982 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.