@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************* Sponsored By Lightwave Security ********************* Download our NEW Whitepaper: Continuous Compliance in the PCI World SecureAware® helps retailers create and oversee a corporate program of data security excellence and PCI compliance. Automated IT-GRC solutions are now used by leading organizations to integrate Governance, Risk Management, and Compliance for many regulatory mandates including PCI, SOX (COBIT), and HIPAA. http://www.sans.org/info/55069
************************************************************************* TRAINING UPDATE - -- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style http://www.sans.org/sans-2010/ - -- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND http://www.sans.org/reston-2010/ - -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World http://www.sans.org/security-west-2010/ - -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses http://www.sans.org/sansfire-2010/ Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php Plus Bangalore, Dublin, Dubai, Toronto and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org *************************************************************************
**************************** Sponsored Link: ****************************
1) Listen to ETM LogRhythm in the Hotseat - SIEM 2.0 Interview with Chris Petersen at http://www.sans.org/info/55074
*************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF's. Both Adobe reader and Acrobat have been reported to have two vulnerabilities. The first issue is a cross domain vulnerability and it actually affects multiple adobe products including Adobe Reader and Acrobat. The flaw can allow attackers to subvert the domain sandbox restrictions and make cross-domain requests via unspecified vectors. The second flaw is caused by an unspecified error and it can be exploited by an attacker to cause a denial-of-service condition or execute arbitrary code remotely. Technical details for these vulnerabilities are not available publicly.
Status: Vendor confirmed, updates available.
Description: Google Chrome, a web browser developed by Google, is the fourth most popular web browser with 5.22% usage share among all the web browsers. Multiple vulnerabilities have been identified in Google chrome which can lead to information disclosure, remote code execution, data leakage, and phishing attacks. The first issue is caused by errors in DNS and the way proxy lists are interpreted and this could lead to disclosure of sensitive data. The second issue is caused by a integer overflow errors in the v8 engine. The third issue is caused by an error in the way "<ruby>" tags are processed. The fourth issue is an error in the way "href" in "iframe" tags are processed and this might lead to disclosure of redirection targets. The fifth issue is an error in the password manager since it incorrectly pre-fills the HTTP authentication dialog box of one domain with credentials of another domain, and this might lead to a phishing issue. The last issue is an integer overflow error in the way sandbox message is deserialized and this might lead to remote code execution. Full technical details are publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: OpenOffice.org is a popular open source office suite. It is included by default in most Unix, Unix-like, and Linux operating system distributions and is also available for Microsoft Windows and Mac OS X. It contains multiple vulnerabilities in its handling of different documents. The first issue is caused due to its use of a 3rd party library (libxml2) which is known to be vulnerable according to CVE-2006-4339 and it might lead to improper verification of signatures. The second issue is caused due to the use of third party libraries (libxmlsec) which are prone to XML signature HMAC truncation authentication bypass issue. The third flaw is an error in the MSVC Runtime according to CVE-2009-2493, and is shipped with OpenOffice.org. The fourth issue is caused by an error in the way OpenOffice.org processes malformed XPM file, which can also be embedded in other file formats. The fifth issue is caused by improper handling of malicious GIF files, which can also be embedded in other documents. The sixth issue is caused by an error in the way OpenOffice.org processes malformed Word documents. Details on these vulnerabilities is available via source code analysis.
Status: Vendor confirmed, updates available.
Description: Adobe Flash Player is a multimedia application used to play Flash media files for Microsoft Windows, Mozilla, and Apple technologies. Two vulnerabilities have been reported in Adobe Flash Player. The first issue is a cross domain vulnerability and it actually affects multiple adobe products including Adobe Flash Player. The flaw can allow attackers to subvert the domain sandbox restrictions and make cross-domain requests via unspecified vectors. The second issue is a denial-of-service flaw caused by unspecified errors and it could be triggered by a specially crafted .SWF file. Some technical details for these vulnerabilities are available publicly.
Status: Vendor confirmed, updates available.
Description: Juniper Installer service is a manual installer from Juniper Networks that needs to be installed by a user with Administrative rights on the PC. It is used to allow a user with no Administrative rights to install client components that require Administrative rights. A buffer overflow vulnerability has been identified in Juniper Installer Service. The specific flaw is in the "DSSETUPSERVICE_CMD_UNINSTALL" command as it does not perform adequate checks on the user supplied inputs. Thus a specially crafted "DSSETUPSERVICE_CMD_UNINSTALL" command with an overly large string can be used to trigger this vulnerability. An attacker needs to have access to "\Device\\LanmanRedirector\\%SERVERNAME%\\pipe\\NeoterisSetupService" named pipe to carry out this attack. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendors confirmed, updates available.
Description: Cisco IronPort is an email and web security appliance. Three vulnerabilities have been identified in Cisco IronPort, two of which are information disclosure vulnerabilities and the third is an remote code execution vulnerabilities. The information disclosure vulnerabilities are caused by unspecified errors in the administrative interface and the WebSafe DistributorServlet of HTTPS server that is embedded on the Cisco IronPort Encryption Appliance. The last issue is caused by an unspecified error in the HTTPS server that is embedded on the Cisco IronPort Encryption Appliance. Successful exploitation in this case might lead to arbitrary code execution. Technical details for these vulnerabilities are not available publicly.
Status: Vendor confirmed, updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 08, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8007 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.