@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored By Microsoft *********************
Windows 7 Security Talk webcast (part 1 of 5) with Paul Cooke, Microsoft Director of Enterprise Security Paul Cooke, Director of Enterprise Security discusses the core security technologies that make the Windows 7 operating system the most secure version of Windows to date, including technologies like Data Execution Prevention, Mandatory Integrity Levels, Windows Biometric Framework, and many more.
http://www.sans.org/info/55453
******************************************************************
TRAINING UPDATE
- -- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
http://www.sans.org/sans-2010/
- -- SANS Northern Virginia Bootcamp 2010, April 6-13 Bonus evening presentations include Safe Surfing: How to Surf the Net Without Getting PWND
http://www.sans.org/reston-2010/
- -- SANS Security West 2010, San Diego, May 7-15, 2010 23 courses. Bonus evening presentations include Killer Bee: Exploiting ZigBee and the Kinetic World
http://www.sans.org/security-west-2010/
- -- SANSFIRE 2010, Baltimore, June 6-14, 2010 38 courses. Bonus evening presentations include Software Security Street Fighting Style and The Verizon Data Breach Investigations Report
http://www.sans.org/sansfire-2010/
- -- SANSFIRE Rocky Mountain 2010, Denver, July 12-17, 2010 8 courses. Bonus evening presentations include Hiding in Plain Sight: Forensic techniques to Counter the Advanced Persistent Threat
http://www.sans.org/rocky-mountain-2010/
- -- SANS Boston 2010, June 6-14, 2010 11 courses
http://www.sans.org/boston-2010/
Looking for training in your own community? http://sans.org/community/
Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/spring09.php
Plus Dublin, Dubai, Geneva, Toronto and Singapore all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org
*************************************************************************
*************************** Sponsored Links: ****************************
1) Attend an Online Demo of iPrism Web Filter and Get a $20 Amazon Giftcard!
http://www.sans.org/info/55458
2) Join Control System Security peers to learn current issues - Process Control and SCADA Summit March 29-30.
http://www.sans.org/info/55463
3) Get real-world forensic techniques from industry-recognized experts at the 2010 European Community Digital Forensics & Incident Response Summit April 19-20 in London.
http://www.sans.org/info/55468
*************************************************************************
PART I Critical Vulnerabilities Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Several products from the Mozilla Foundation such as its popular web browser Firefox, internet suite SeaMonkey, and email client Thunderbird, contain multiple vulnerabilities. The first issue is caused by a memory corruption error in the browser engine and this might result in arbitrary code execution. The second issue is a heap corruption error in the Mozilla's Web Workers implementation caused by improper handling of array data types while processing posted messages. The third issue is a use-after-free error in HTML parser caused by incorrect freeing of already used memory. The fourth issue is a same origin policy violation caused by inadequate restriction of read access to object passed to showModalDialog and can be triggered by a specially crafted dialogArguments values. The fifth issue is caused by an error in the way SVG documents, that are served with Content-Type: application/octet-stream, are processed and eventually leading to bypassing the same-origin policy. Full technical details for the vulnerabilities are publicly available via source code analysis.
Status: Vendor confirmed, updates available.
Description: Mozilla Firefox, an open source web-browser from the Mozilla Application Suite, is the second most popular browser with a 24.43% usage share. It reportedly contains a flaw caused by unspecified error and it can be exploited to execute arbitrary code. Technical details for this vulnerability are not available publicly and there are reportedly no public proof-of-concepts or exploits circulating in the wild. There is reportedly a working commercial exploit from the VulnDisco Pack.
Status: Vendor confirmed, updates available.
Description: NOS Microsystems getPlus Download and Installation Manager is distributed in the form of an ActiveX control, which is also used by Adobe Systems Inc to install Adobe Reader. One of its features is to download and execute applications from preconfigured sites, so in the case of Adobe it is adboe.com and its subdomains. A vulnerability has been reported in getPlus Downloader caused by improper validation of the domain from which the applications are supposed to be downloaded and executed from. The specific flaw is that getPlus Downloader thinks that the requested domain is a subdomain and this leads to a logic error. Successful exploitation might allow an attacker to execute arbitrary code in the context of the logged on user. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Multiple Symantec products like Symantec Antivirus and Symantec Client Security are vulnerable to a buffer overflow vulnerability. A specially crafted web page, upon viewing, can be used to trigger this vulnerability. The issue is caused by a boundary error in the Symantec Client Proxy, CLIproxy.dll, ActiveX control. The specific flaw lies in the "SetRemoteComputerName()" method since it fails to perform adequate bounds checking of the supplied inputs. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism. Note that this could impact normal application functionality.
Description: Google Picasa, a free photo editing software has an integer overflow vulnerability. A specially crafted JPEG file, when opened and zoomed in by a user, can be used to trigger this vulnerability. The specific flaw is an integer overflow error in "PicasaPhotoViewer.exe", when it processes malformed JPEG files. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are available publicly.
Status: Vendors confirmed, updates available.
Description: Multiple Symantec products like Norton 360, Norton Internet Security, Norton Antivirus, Norton SystemWorks, Norton Confidential are vulnerable to a buffer overflow vulnerability. A specially crafted web page, upon viewing, can be used to trigger this vulnerability. The specific flaw lies in the SYMLTCOM.dll ActiveX control, which is caused by an input validation error. Successful exploitation might lead to a stack-based buffer overflow and eventually to remote code execution. The impact of this threat is reduced since it is limited for use against specific domains. Full technical details for this vulnerability are not available publicly.
Status: Vendor confirmed, updates available. Users can mitigate the impact of this vulnerability by disabling the affected control via Microsoft's "kill bit" mechanism. Note that this could impact normal application functionality.
Description: IBM Lotus Notes is the client side of the collaboration software, developed by IBM and is used for email, instant messaging, calendars, web browsing. IBM Lotus Notes enjoys a significant share of the e-mail client market with a large number of enterprise deployments. A buffer overflow vulnerability has been identified in Lotus Notes and is reported to be caused by an unspecified error. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Technical details for the vulnerability are not available publicly.
Status: Vendor confirmed, no updates available.
Description: EMC HomeBase Server is used to provide server recoveries and migrations across different hardware. A directory traversal vulnerability is reported in EMC Homebase Server. The specific flaw is an input validation error in the HomeBase SSL Service caused by its failure to sanitize certain parameters. This vulnerability can be exploited by attackers to upload files in arbitrary locations with the help of directory traversal attacks. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected service. Authentication is not required to exploit this vulnerability. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Part II -- Comprehensive List of Newly Discovered Vulnerabilities from Qualys (www.qualys.com) Week 09, 2010 This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 8057 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.