Cisco TelePresence Supervisor MSE 8050 Denial of Service Vulnerability, (Thu, May 16th)

 SANS Internet Storm Center, Security Alerts  Comments Off on Cisco TelePresence Supervisor MSE 8050 Denial of Service Vulnerability, (Thu, May 16th)
May 162013
 

Cisco TelePresence Supervisor MSE 8050 contains a vulnerability that may allow an unauthenticated, remote attacker to cause high CPU utilization and a reload of the affected system.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130515-mse

— Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Microsoft April 2013 Black Tuesday Overview, (Tue, Apr 9th)

 SANS Internet Storm Center, Security Alerts  Comments Off on Microsoft April 2013 Black Tuesday Overview, (Tue, Apr 9th)
Apr 092013
 

Overview of the April 2013 Microsoft patches and their status.

# Affected Contra Indications – KB Known Exploits Microsoft rating(**) ISC rating(*)
clients servers
MS13-028 The usual monthly MSIE cumulative patch, adding fixes for two more vulnerabilities. Both are "use after free" memory management issues and they both allow random code execution.  
Replaces MS13-021.
MSIE
CVE-2013-1303
CVE-2013-1304
KB 2817183 No publicly known exploits Severity:Critical
Exploitability:2
Critical Important
MS13-029 A memory management problem with the Remote Desktop Connection ActiveX control allows random code execution.
Replaces MS09-044 and MS11-017.
RDP

CVE-2013-1296

KB 2828223 No publicly known exploits Severity:Critical
Exploitability:1
Critical Important
MS13-030 A vulnerability in the default access control lists (ACL) that sharepoint applies to lists allows unauthorized access to lists on a sharepoint server. 
Sharepoint

CVE-2013-1290

KB 2827663 Microsoft claims the vulnerability CVE-2013-1290 was publicly disclosed. Severity:Important
Exploitability:3
N/A Important
MS13-031 Two kernel race conditions allow privilege escalation and read access to kernel memory.
Replaces MS13-017.
Kernel

CVE-2013-1284
CVE-2013-1294

KB 2813170 No publicly known exploits. Severity:Important
Exploitability:2
Important Important
MS13-032 A denial of service vulnerability exists in the LDAP services provided by Active Directory. Also affects services such as ADAM and AD LDS.
Active Directory

CVE-2013-1282

KB 2830914 No publicly known exploits. Severity:Important
Exploitability:3
N/A Important
MS13-033 A memory corruption vulnerability in CSRSS (Client/Server Runtime SubSystem) allows for privilege escalation to the context of the local system and/or Denial of Service. 
Replaces MS12-003.
CSRSS

CVE-2013-1295

KB 2820917 No publicly known exploits Severity:Important
Exploitability:3
Important Important
MS13-034 Improper path names used by the Microsoft Anti-malware Client (MSAC) allow privilege escalation to the LocalSystem account.   
Affects Windows Defender on Windows 8 and Windows RT.

The update also contains functional updates.

MSAC

CVE-2013-1285
CVE-2013-1286
CVE-2013-1287

KB 2823482 No publicly known exploits Severity:Important
Exploitability:1
Important Less Urgent
MS13-035 HTML validation is not done properly in Microsoft Office (InfoPath), Sharepoint Server, Groove Server, Sharepoint Foundation resulting in what looks like an XSS exploit resulting in privilege escalation.
Replace MS12-066.
HTML sanitization

CVE-2013-0078

KB 2821818 Microsoft claims "limited, targeted attacks" against the vulnerability. Severity:Important
Exploitability:3
N/A Important
MS13-036 Multiple vulnerabilities in the windows kernel mode drivers allow privilege escalation and read access to kernel memory as well as Denial of Service. 
Replaces MS13-016.
Kernel Mode Drivers

CVE-2013-1283
CVE-2013-1991
CVE-2013-1292
CVE-2013-1293

KB 2829996 No publicly known exploits Severity:Important
Exploitability:1
Important Important
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating

  • We use 4 levels:

    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.
  • The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
  • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
  • Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
  • All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them.

(**): The exploitability rating we show is the worst of them all due to the too large number of ratings Microsoft assigns to some of the patches.


Swa Frantzen — Section 66

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Microsoft January 2013 Black Tuesday Update – Overview, (Tue, Jan 8th)

 SANS Internet Storm Center, Security Alerts  Comments Off on Microsoft January 2013 Black Tuesday Update – Overview, (Tue, Jan 8th)
Jan 092013
 

Overview of the January 2013 Microsoft patches and their status.

#

Affected

Contra Indications – KB

Known Exploits

Microsoft rating(**)

ISC rating(*)

clients

servers

MS13-001

Print Spooler Remote Code Execution

Print Spooler

CVE-2013-0011

KB 2769369

No.

Severity:Critical

Exploitability: 1

N/A ***

Critical

MS13-002

Microsoft XML Core Services Remote Code Execution Vulnerability

(ReplacesMS12-043 )

XML Core Services

CVE-2013-0006

CVE-2013-0007

KB 2756145

No.

Severity:Critical

Exploitability: 1

Critical

Important

MS13-003

System Center Operations Manager XSS Vulnerability

(Replaces )

System Center Operations Manager

CVE-2013-0009

KB 2748552

No.

Severity:Important

Exploitability: 1

N/A

Important

MS13-004

.Net Elevation of Privileges

(ReplacesMS12-074 MS12-035 MS12-025 MS12-016 MS10-041 MS10-077 MS12-038 )

.Net Framework

CVE-2013-0001

CVE-2013-0002

CVE-2013-0003

CVE-2013-0004

KB 2769324

No.

Severity:Important

Exploitability: 1

Important

Important

MS13-005

Kernel-Mode Driver Elevation of Privilege

(ReplacesMS12-078 )

win32k.sys Kernel Mode Driver

CVE-2013-0008

KB 2778930

No.

Severity:Important

Exploitability: 1

Important

Important

MS13-006

SSL 3.0/TLS Security Feature Bypass

(Replaces )

Windows SSL

CVE-2013-0013

KB 2785220

No.

Severity:

Exploitability: 1

Important

Important

MS13-007

Open Data Protocol Denial of Service Vulnerability

(Replaces )

.Net Framework and IIS

CVE-2013-0005

KB 2769327

No.

Severity:Important

Exploitability: 1

N/A

Important

We will update issues on this page for about a week or so as they evolve.

We appreciate updates

US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY

(*): ISC rating

We use 4 levels:

PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.

Critical: Anything that needs little to become interesting for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.

Important: Things where more testing and other measures can help.

Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.

The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.

The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.

Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.

All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them.

(**): The exploitability rating we show is the worst of them all due to the too large number of ratings Microsoft assigns to some of the patches.

——

(***): N/A for pure clients. Any client acting as a print server or sharing a printer should consider this critical.

——

Post suggestions or comments in the section below or send us any questions or comments in the contact form

Richard Porter

richard /at/ pedantictheory.com

For Hire, LinkedIn Profile. Posted with Permission

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Microsoft October 2012 Black Tuesday Update – Overview, (Tue, Oct 9th)

 SANS Internet Storm Center, Security Alerts  Comments Off on Microsoft October 2012 Black Tuesday Update – Overview, (Tue, Oct 9th)
Oct 092012
 

Overview of the October 2012 Microsoft patches and their status.

#
Affected
Contra Indications – KB
Known Exploits
Microsoft rating(**)
ISC rating(*)

clients
servers

MS12-064
Remote Code Execution Vulnerability in Microsoft Word

(ReplacesMS12-029 MS10-079 MS12-050 )

Word

CVE-2012-0182

CVE-2012-2528
KB 2742319
No.
Severity:Critical

Exploitability: 1
Critical
Important

MS12-065
Remote Code Execution Vulnerability in Microsoft Works

(ReplacesMS12-028 )

Works

CVE-2012-2550
KB 2754670
No.
Severity:Important

Exploitability: 2
Critical
N/A

MS12-066
Elevation of Privilege Vulnerability via XSS in HTML Sanitation Component

(ReplacesMS12-039 )

HTML Sanitation

CVE-2012-2520
KB 2741517
Yes (limited).
Severity:Important

Exploitability: 1
Important
Important

MS12-067
Oracle outside/in and advanced filter pack for FAST Search Server Code Execution Vulnerabilities

FAST Search Server 2010 (SharePoint)

CVE-2012-1766

CVE-2012-1767

CVE-2012-1768

CVE-2012-1769

CVE-2012-1770

CVE-2012-1771

CVE-2012-1772

CVE-2012-1773

CVE-2012-3106

CVE-2012-3107

CVE-2012-3108

CVE-2012-3109

CVE-2012-3110
KB 2742321
Yes.
Severity:Important

Exploitability: 1
Important
Critical

MS12-068
Privilege Escalation in Windows Kernel

(ReplacesMS09-058 MS10-021 MS11-068 MS11-098 MS12-042 )

Kernel

CVE-2012-2529
KB 2724197
No.
Severity:Important

Exploitability: 3
Important
Important

MS12-069
Denial of Service Vulnerability in Kerberos

(ReplacesMS11-013 )

Word

CVE-2012-2551
KB 2743555
No.
Severity:Important

Exploitability: 1
Important
Important

MS12-070
Reflective XSS Vulnerability in SQL Server

(ReplacesMS09-062 MS11-049 )

Word

CVE-2012-0182

CVE-2012-2528
KB 2754849
No.
Severity:Important

Exploitability: 1
N/A
Important

We will update issues on this page for about a week or so as they evolve.

We appreciate updates

US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY

(*): ISC rating

We use 4 levels:

PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
Critical: Anything that needs little to become interesting for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
Important: Things where more testing and other measures can help.
Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.

The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them.

(**): The exploitability rating we show is the worst of them all due to the too large number of ratings Microsoft assigns to some of the patches.

——

Johannes B. Ullrich, Ph.D.

SANS Technology Institute

Twitter

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Cisco Security Advisories 20 JUN 2012, (Thu, Jun 21st)

 SANS Internet Storm Center, Security Alerts  Comments Off on Cisco Security Advisories 20 JUN 2012, (Thu, Jun 21st)
Jun 202012
 

Cisco issued three security advisories today, 20 JUN 2012; two are new, one is an update.

NEW: Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module Denial of Service Vulnerability

Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco Catalyst 6500 Series ASA Services Module (Cisco ASASM) contain a vulnerability that may allow an unauthenticated, remote attacker to cause the reload of the affected device.

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-asaipv6
NEW: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client

The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities:

Cisco AnyConnect Secure Mobility Client VPN Downloader Arbitrary Code Execution Vulnerability

Cisco AnyConnect Secure Mobility Client VPN Downloader Software Downgrade Vulnerability

Cisco AnyConnect Secure Mobility Client and Cisco Secure Desktop HostScan Downloader Software Downgrade Vulnerability

Cisco AnyConnect Secure Mobility Client 64-bit Java VPN Downloader Arbitrary Code Execution Vulnerability

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac

UPDATED: Cisco Application Control Engine Administrator IP Address Overlap Vulnerability

A vulnerability exists in Cisco Application Control Engine (ACE) software. Administrative users may be logged into an unintended context (virtual instance) on the ACE when running in multicontext mode.

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ace

Russ McRee | @holisticinfosec

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

%d bloggers like this: